Archive

Category Archives for "Networking"

Report: Security teams plagued by poorly managed identity data

Security teams handling Identity and access management (IAM) are hampered by dirty data and need management help from a chief data officer, according to a new report by TechVision Research.IAM is typically defined as a “security discipline that enables the right individuals to access the right resources at the right times for the right reasons.” But identity data is riddled with errors, which ultimately raise security and privacy risks, the report says.The problems include multiple versions of employee names and titles in various systems — and even “ghost” employees. “We find a plethora of identity data challenges, including multiple authoritative sources of data, inconsistent data, redundant data, old data and misclassification of data,” the report says.To read this article in full or to leave a comment, please click here(Insider Story)

Boost your security: Get IT and HR to collaborate

Ask what department is responsible for data security in an organization and the most likely answer is, “IT.” But some experts are saying it shouldn’t be IT alone – that better security requires a closer collaboration with Human Resources (HR).One example, they say, is a breach this past Feb. 26 at the Federal Deposit Insurance Corporation (FDIC), when a departing employee inadvertently downloaded 44,000 customer records, including personally identifiable information (PII), to a USB thumb drive.To read this article in full or to leave a comment, please click here

Boost your security: Get IT and HR to collaborate

Ask what department is responsible for data security in an organization and the most likely answer is, “IT.” But some experts are saying it shouldn’t be IT alone – that better security requires a closer collaboration with Human Resources (HR).One example, they say, is a breach this past Feb. 26 at the Federal Deposit Insurance Corporation (FDIC), when a departing employee inadvertently downloaded 44,000 customer records, including personally identifiable information (PII), to a USB thumb drive.To read this article in full or to leave a comment, please click here

ZeroStack offers a private ‘cloud in a box’

If you’re in my age bracket, you might remember this clip of Yosemite Sam yelling at his camel to slow down. He kept yelling, “Whoa, Camel,” but the headstrong camel wouldn’t stop until Yosemite Sam jumped off and hit him on the head. (For you millennials, it used to be OK for kids to watch this stuff.)A similar trend is happening in IT today. The cloud, specifically public cloud has become all the rage. We’re moving everything to the cloud—storage, apps, compute cycles, communications tools. You name it, there’s a cloud service for it. But are we moving too fast? Should CIOs be yelling, “Whoa cloud, whoa!” And then hitting their IT architects in the head with something?To read this article in full or to leave a comment, please click here

IRS kills electronic filing PIN feature due to repeated attacks

After repeated attacks, the U.S. Internal Revenue Service has decided to retire a Web-based tool for obtaining PINs that taxpayers could use to file tax returns electronically.The Electronic Filing (E-file) PINs Web application is no longer available on the IRS website "because of questionable activity," the agency announced last week.In February, the IRS disclosed that hackers used stolen taxpayer information like names, Social Security numbers, dates of birth and full addresses in order to obtain E-file PINs through its website.To read this article in full or to leave a comment, please click here

IRS kills electronic filing PIN feature due to repeated attacks

After repeated attacks, the U.S. Internal Revenue Service has decided to retire a Web-based tool for obtaining PINs that taxpayers could use to file tax returns electronically. The Electronic Filing (E-file) PINs Web application is no longer available on the IRS website "because of questionable activity," the agency announced last week. In February, the IRS disclosed that hackers used stolen taxpayer information like names, Social Security numbers, dates of birth and full addresses in order to obtain E-file PINs through its website.To read this article in full or to leave a comment, please click here

New products of the week 6.27.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.eSentire Training DayKey features: The security awareness training solution combines microlearning and gamification to arm your employees against the latest social engineering, spear phishing attacks, and more. More info.To read this article in full or to leave a comment, please click here

New products of the week 6.27.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.eSentire Training DayKey features: The security awareness training solution combines microlearning and gamification to arm your employees against the latest social engineering, spear phishing attacks, and more. More info.To read this article in full or to leave a comment, please click here

Intel is said to mull selling its security business

Intel is considering selling its security business as the company tries to focus on delivering chips for cloud computing and connected devices, according to a news report.The Intel Security business came largely from the company's acquisition for US$7.7 billion of security software company McAfee. Intel announced plans to bake some of the security technology into its chips to ensure higher security for its customers.With the surge in cyberthreats, providing protection to the variety of Internet-connected devices, such as PCs, mobile devices, medical gear and cars, requires a fundamentally new approach involving software, hardware and services, the company said in February 2011, when announcing the completion of the McAfee acquisition.To read this article in full or to leave a comment, please click here

Intel is said to mull selling its security business

Intel is considering selling its security business as the company tries to focus on delivering chips for cloud computing and connected devices, according to a news report.The Intel Security business came largely from the company's acquisition for US$7.7 billion of security software company McAfee. Intel announced plans to bake some of the security technology into its chips to ensure higher security for its customers.With the surge in cyberthreats, providing protection to the variety of Internet-connected devices, such as PCs, mobile devices, medical gear and cars, requires a fundamentally new approach involving software, hardware and services, the company said in February 2011, when announcing the completion of the McAfee acquisition.To read this article in full or to leave a comment, please click here

Intel is said to mull sale of its security business

Intel is considering selling its security business as the company tries to focus on delivering chips for cloud computing and connected devices, according to a news report.The Intel Security business came largely from the company's acquisition for US$7.7 billion of security software company McAfee. Intel announced plans to bake some of the security technology into its chips to ensure higher security for its customers.With the surge in cyberthreats, providing protection to the variety of Internet-connected devices, such as PCs, mobile devices, medical gear and cars, requires a fundamentally new approach involving software, hardware and services, the company said in February 2011, when announcing the completion of the McAfee acquisition.To read this article in full or to leave a comment, please click here

Intel is said to mull sale of its security business

Intel is considering selling its security business as the company tries to focus on delivering chips for cloud computing and connected devices, according to a news report.The Intel Security business came largely from the company's acquisition for US$7.7 billion of security software company McAfee. Intel announced plans to bake some of the security technology into its chips to ensure higher security for its customers.With the surge in cyberthreats, providing protection to the variety of Internet-connected devices, such as PCs, mobile devices, medical gear and cars, requires a fundamentally new approach involving software, hardware and services, the company said in February 2011, when announcing the completion of the McAfee acquisition.To read this article in full or to leave a comment, please click here

Crafting responsive email with CoffeeCup’s RED

If you’ve ever sent bulk email such as newsletters, updates, sales pitches, etc., then you’ll be aware that this isn’t as simple as it used to be. Many moons ago, you could slap some text into a page along with a few links and that was good enough. Then came HTML mail and the ante was upped but you still didn’t have to break a sweat to ensure that the user could read your content. But now …To be competitive these days you have to deliver slick, styled, typographically sophisticated content with color, responsiveness, animation … you name it. And you’ve got to take into account not only how email renders on desktop clients (just consider the horrors of Microsoft Outlook’s eccentric rendering of otherwise valid HTML and CSS content) but also what happens to content in various Webmail services and, most importantly these days, on mobile devices. And just to make it all that little bit harder, many mobile platforms have specific version-dependent quirks that break the best-laid plans o' mice and designers.To read this article in full or to leave a comment, please click here

iPhone 7 Rumor Rollup: 10th anniversary is when the iPhone fun will really start

Much of this past week in iPhone 7 rumorville was occupied with rehashing and debunking a lot of the most popular scuttlebutt (dual cameras, no more 3.5mm headphone jack, etc.) about Apple’s next flagship smartphone, which is expected to debut in September. Plenty continues to be said as well about how boring the new iPhones promise to be (though Apple will need to try really hard to make it duller than its recent Worldwide Developers Conference bounty). Macworld’s Macalope column rips into those who don’t have faith in Apple to do the right thing, including a writer for The Verge who urges Apple shoppers to have “Have some dignity” over buying what Apple is reportedly selling this time around.To read this article in full or to leave a comment, please click here

My SDN Testbed

Over the next few articles, I will write about OpenFlow, Open vSwitch and other SDN related topics. As always, I'm combining the theory part with some hands-on practice and for this, I put this article together describing one way of building such a testing environment.