Archive

Category Archives for "Networking"

Apple rebuts DOJ’s appeal in N.Y. meth dealer’s iPhone case

Apple last week opposed the Department of Justice's renewed demand that it assist investigators in accessing a drug dealer's iPhone, arguing that the government has not proved the company's help is required."The government has utterly failed to satisfy its burden to demonstrate that Apple’s assistance in this case is necessary," lawyers for the Cupertino, Calif., company said in a brief filed with a federal court in New York on Friday. "The government has made no showing that it has exhausted alternative means for extracting data from the iPhone at issue here, either by making a serious attempt to obtain the passcode from the individual defendant who set it in the first place ... or by consulting other government agencies and third parties known to the government."To read this article in full or to leave a comment, please click here

EU investigating Google’s contracts with phone makers, operators

The European Commission is still investigating whether Google’s Android operating system and Amazon’s contracts with e-book publishers have broken antitrust rules, its Competition Commissioner said Monday in Amsterdam.Margrethe Vestager’s remarks come amid reports that the European Commission could formally press charges in the form of a "statement of objections "against Google as early as this week. Her speech suggests that formal charges into both Google’s Android operating system and Amazon could still take some time.To read this article in full or to leave a comment, please click here

Send in the Microsoft Surface clones

Copy catsSeveral new Windows 10 tablet computers have either been released, or announced to be released soon, that copy the industrial design of Microsoft’s Surface Pro 3 and Pro 4. Like the Surface tablets, most of these clones have a kickstand that you flip out to prop them up on a flat surface; and they use a keyboard which can fold over onto the tablet’s display to protect it. While the Surface Pro 4 starts at $899 and can cost as much as $2,699, these clones are generally less expensive.To read this article in full or to leave a comment, please click here

10 whaling emails that could get by an unsuspecting CEO

WhalingWhaling threats or CEO fraud continues to grow with 70 percent of firms seeing an increase in these email-based attacks designed to extort money. There has been an uptick of activity lately as fraudsters spend the first few months of the year taking advantage of tax season, targeting finance departments with emails that look like they are coming from a company’s senior executive. Case in point are Snapchat and Seagate as companies that inadvertently gave up employees’ personal information.To read this article in full or to leave a comment, please click here

How a giant like GE found home in the cloud

For Jim Fowler, CIO of General Electric, there’s a simple reason he is marching the company toward the cloud: “I’m not going to sell another aircraft engine because I run a global compute factory very well; I’m not going to sell another locomotive because I figured out how to engineer the user experience really well for my developers; I’m not going to sell an oil and gas pump because I’ve figured out how to do self-service,” he said at last year's Amazon Web Service’s re:Invent conference. “That’s AWS’s differentiator. That's what they do well.”  GE, the 123-year-old staple of the global industrial sector, is going all in on the cloud. The company plans to migrate 9,000 applications to public IaaS over the next three years. It is reducing its data centers from more than 30 to the single digits.To read this article in full or to leave a comment, please click here

Reinventing the WAN

While some organizations continue to make use of WAN services such as Frame Relay and ATM, the use of those services is quickly diminishing. As a result, we are rapidly approaching a time when IT organizations will have only two WAN services to choose from: MPLS and the Internet. Given that trend, a key question facing network organizations is how to best design a branch office WAN using just those two services.Location of functionality Abogado states that security in the branch will evolve from a model that relies on the perimeter approach to a multi-layered model that requires embedding security into all branch technologies. The philosophy behind this change is that administrators will have to make the “trust" zone an “untrust” zone, since attacks can come from any vector, including inside the branch. He believes that a single layer of encryption is probably insufficient, and that IT organizations should consider encryption at both the application and network layers. Increased branch deployment of network and data segmentation are also key technologies that will support the multi-layer security model.To read this article in full or to leave a comment, please click here(Insider Story)

Reinventing the WAN

While some organizations continue to make use of WAN services such as Frame Relay and ATM, the use of those services is quickly diminishing. As a result, we are rapidly approaching a time when IT organizations will have only two WAN services to choose from: MPLS and the Internet. Given that trend, a key question facing network organizations is how to best design a branch office WAN using just those two services.Location of functionality Abogado states that security in the branch will evolve from a model that relies on the perimeter approach to a multi-layered model that requires embedding security into all branch technologies. The philosophy behind this change is that administrators will have to make the “trust" zone an “untrust” zone, since attacks can come from any vector, including inside the branch. He believes that a single layer of encryption is probably insufficient, and that IT organizations should consider encryption at both the application and network layers. Increased branch deployment of network and data segmentation are also key technologies that will support the multi-layer security model.To read this article in full or to leave a comment, please click here(Insider Story)

New products of the week 4.18.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Altify MaxKey features: Altify Max is the first "augmented intelligence" platform that combines human and machine intelligence. Altify Max includes more than 30 years of sales knowledge built-in and combines the deep muscle memory of a million sales engagements, knowledge of the world’s best sales methodologies and insights from each individual business to create instant, real-time recommendations about how to progress each opportunity. More info.To read this article in full or to leave a comment, please click here

New products of the week 4.18.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Altify MaxKey features: Altify Max is the first "augmented intelligence" platform that combines human and machine intelligence. Altify Max includes more than 30 years of sales knowledge built-in and combines the deep muscle memory of a million sales engagements, knowledge of the world’s best sales methodologies and insights from each individual business to create instant, real-time recommendations about how to progress each opportunity. More info.To read this article in full or to leave a comment, please click here

New products of the week 4.18.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Altify MaxKey features: Altify Max is the first "augmented intelligence" platform that combines human and machine intelligence. Altify Max includes more than 30 years of sales knowledge built-in and combines the deep muscle memory of a million sales engagements, knowledge of the world’s best sales methodologies and insights from each individual business to create instant, real-time recommendations about how to progress each opportunity. More info.To read this article in full or to leave a comment, please click here

HBO’s Silicon Valley returns this weekend

The last episode of Silicon Valley’s previous season began with the protagonist giving an uplifting talk about why the gang got into this mess in the first place – “to build cool s**t” – as an injured man endured a 127-hours-esque ordeal on a live video stream using software that they had designed.“The quality is great!” enthuses one.+ALSO ON NETWORK WORLD: Catastrophic cyber attack on U.S. grid possible, but not likely + Secretive Intel quietly woos makers in ChinaTo read this article in full or to leave a comment, please click here

IETF Hackathon: Getting TLS 1.3 working in the browser

Over the last few years, the IETF community has been focused on improving and expanding the use of the technical foundations for Internet security. Part of that work has been updating and deploying protocols such as Transport Layer Security (TLS), with the first draft of the latest version of TLS, TLS 1.3, published a bit more than two years ago on 17 April 2014. Since then, work on TLS 1.3 has continued with expert review and initial implementations aimed at providing a solid base for broad deployment of improved security on the global Internet.

CC BY 2.0 image by Marie-Claire Camp

In February of this year, the Internet Society hosted the TRON (TLS 1.3 Ready Or Not) workshop. The main goal of TRON was to gather feedback from developers and academics about the security of TLS 1.3. The conclusion of the workshop was that TLS 1.3 was, unfortunately, not ready yet.

One of the reasons it was deemed not yet ready was that there needed to be more real-world testing of independently written implementations. There were some implementations of the core protocol, but nobody had put together a full browser-to-server test. And some Continue reading

Verodin carries out attacks safely to test network security

A software platform from startup Verodin launches simulated attacks against live networks as a way to check the effectiveness of their defenses and also train security operations personnel.Verodin’s gear includes software probes that are deployed in customer networks to act as both attackers and targets. Data about the effectiveness of the simulated attacks is fed to a Web-based management platform called a controller that shows how well the network defended itself.Verodin’s platform is similar to that from another startup called AttackIQ.To read this article in full or to leave a comment, please click here

Verodin carries out attacks safely to test network security

A software platform from startup Verodin launches simulated attacks against live networks as a way to check the effectiveness of their defenses and also train security operations personnel.Verodin’s gear includes software probes that are deployed in customer networks to act as both attackers and targets. Data about the effectiveness of the simulated attacks is fed to a Web-based management platform called a controller that shows how well the network defended itself.Verodin’s platform is similar to that from another startup called AttackIQ.To read this article in full or to leave a comment, please click here

Network analytics startup provides insight into wireline and wireless traffic

Startup Nyansa Inc. today launched a SaaS-based IT network analytics service that can inspect, analyze and correlate wireline and wireless data to help large campus IT shops speed network problem resolution and create performance baselines that can be used for network tuning, gauging the impact of network changes, and justifying new network investments. The CEO and co-founder of the company, which has raised $12 million in venture backing, is Abe Ankumah, onetime Senior Director of Products and Business Operations at Aruba Networks, who went on to become Director of Client Products and Alliances at Meraki.  When Meraki was acquired by Cisco in 2012 Ankumah became Director of Cisco’s Cloud Networking Group, but left in late 2013 to cofound Nyansa with CTO Anand Srinivas and VP of Engineering Daniel Kan.To read this article in full or to leave a comment, please click here

On getting your WordPress site hacked; pay now or pay more later

In my last post I posed the question of whether it’s time to look for alternatives to the leading publishing platforms such as WordPress, Drupal, Joomla, etc., but, truth be told, finding an alternative that can do everything these products do is practically impossible … that is, unless you’re willing to spend money building a customized solution.And that may be the reality of the future; if you don’t build your own solution paying upfront at perhaps 100x the cost (thanks, Keith) of, say, a simple WordPress installation, you’ll windup paying far more than that when you get hacked. According to IBM’s tenth annual Cost of Data Breach Study:To read this article in full or to leave a comment, please click here