As James Bond has shown, even a sophisticated MI6 operative with a nearly limitless budget and an array of hi-tech gadgets has to take into account existing security measures when formulating a plan to infiltrate a building or system. And while online criminal organizations don’t have Bond’s resources, they are sophisticated and well funded, which means you have to continually up your efforts to reduce the threat surface of your business.As you begin planning for 2016, here are 007 tips for bringing your business closer to an MI6 level of security, without a nation-state budget:1. Auto expiring credentials for new recruits: While we hope your corporate hiring process isn’t as intense as that of a secret agent, at the end of the day not everyone who signs up ends up making the final cut. To minimize your risk of rogue access, implement a policy that requires system admins to always create expiring credentials for new hires. It’s best practice to implement this for any temporary hires, but if your company offers an employment grace period, consider applying the expiration for the end of that time period, just in case. It’s always easier to re-implement than revoke once things Continue reading
1. It's the spectrum that's unlicensed, not the LTE.The acronyms are flying: LTE-U, LAA, MuLTEfire. They're all forms of LTE tweaked to send signals over unlicensed frequencies, which are open to Wi-Fi, Bluetooth, and any other technology that plays fair. Carriers could use it as soon as 2016 to add frequencies without spending billions to license them. At first, unlicensed LTE will only be used to supplement a carrier's own bands to make downloads faster. Later, it might send traffic both directions and even be used by enterprises that have no licensed spectrum.To read this article in full or to leave a comment, please click here
Here are five things you should know about unlicensed LTE, the concept of sending 4G cell traffic over channels also used by Wi-Fi and other networks.1. It's the spectrum that's unlicensed, not the LTE.The acronyms are flying: LTE-U, LAA, MuLTEfire. They're all forms of LTE tweaked to send signals over unlicensed frequencies, which are open to Wi-Fi, Bluetooth, and any other technology that plays fair. Carriers could use it as soon as 2016 to add frequencies without spending billions to license them. At first, unlicensed LTE will only be used to supplement a carrier's own bands to make downloads faster. Later, it might send traffic both directions and even be used by enterprises that have no licensed spectrum.To read this article in full or to leave a comment, please click here
Hardly trivialImage by Mahender G/FlickrAs computers grow ever more powerful, we humans have to figure out where we still remain superior. Here's one suggestion: although the Internet is full of endless reams of data, it takes a human mind to suss through it all and determine what qualifies as interesting to other humans. Thus, we at ITworld present you with the following anecdotes about technology and the Internet, guaranteed to have been selected by the human hand and eye to pique your interest. Hopefully robots won't take this job for another few years.To read this article in full or to leave a comment, please click here
One of the fundamental best practices of cyber supply chain security is IT vendor risk management. When organizations purchase and deploy application software, routers, servers, and storage devices, they are in essence placing their trust in the IT vendors that develop and sell these products. Unfortunately, this trust can be misplaced. Some IT vendors (especially startups) focus on feature/functionality rather than security when they develop products resulting in buggy vulnerable products. In other cases, hardware vendors unknowingly build systems using malicious components sourced through their own supply chain. IT products are also often purchased through global networks of third-party distributors that have ample opportunity to turn innocent IT products into malicious confederates for cybercrime.To read this article in full or to leave a comment, please click here
The National Institute of Standards and Technology (NIST) is funding creation of a heat map visualization tool that will show where cybersecurity jobs are open across the country. The first rendition should be out late next year.The project, funded through NIST’s National Initiative for Cybersecurity Education (NICE), will provide data to help employers, job seekers, policy makers and others sync up. NETWORK JOBS ARE HOT: Salaries expected to rise in 2016Some 230,000 cybersecurity jobs are open across the U.S., according to the Department of Commerce, and the number of openings has roughly doubled over the past 4 or 5 years.To read this article in full or to leave a comment, please click here
They are inescapable on the Internet. Most are awful. A few are not, so we have started publishing a selection of memes that amuse me. One every week. Here’s the archive.Pool Wi-FiImage by ImgurTo read this article in full or to leave a comment, please click here
Gamers are used to living in a virtualized world. Battling imaginary villains and taking castle towers. However, this is not the only virtualized world that exists today. Our computer addicted world is going virtualized in virtual machines. Like with any...
Ransomware creators have taken their extortion one step further: in addition to encrypting people's private files and asking for money before releasing a key, they now threaten to publish those files on the Internet if they're not paid.This worrying development has recently been observed in a new ransomware program dubbed Chimera that was documented by the Anti-Botnet Advisory Centre, a service of the German Association of the Internet Industry.The attackers behind this new threat target mainly businesses by sending rogue emails to specific employees that masquerade as job applications or business offers. The emails contain a link to a malicious file hosted on Dropbox.To read this article in full or to leave a comment, please click here
Companies are increasingly reliant on digital spaces and the continuing stream of high-profile data breaches means cybersecurity topics – often in the form of cyber liability questions – are now a part of board and senior management discussions instead of only being discussed at the IT level. Security, following “ethical issues,” is the second-leading risk to a company’s brand.Although getting hacked has a huge impact on the bottom line, NYSE Governance Services and Vercode found that “the extent of the brand damage caused by breaches is often linked to boards’ level of preparedness. It is therefore a board’s fiduciary duty to ask the right questions to ensure due care has been followed.”To read this article in full or to leave a comment, please click here
We have just released the Journey to become SDN Warrior v1! Designed with end in mind. Based on today's SDN and NFV real use cases. Clear milestone in every learning step. Transforming Network Engineers' skill while still maintain relevancy with the networking industry that is transforming as well. First Dojo to open in Dubai early 2016. Join us https://www.facebook.com/groups/sdnwarriors/
Sprint Chairman and SoftBank CEO Masayoshi Son told reporters in Tokyo early Wednesday that job cuts at Sprint will be "in the thousands" as part of a restructuring plan.His comments came as SoftBank, which owns more than 70% of Sprint, reported its quarterly earnings."Sprint is now in the position to increase the pace of user acquisition while cutting costs," Son said, according to Bloomberg and other news sources. "We will also cut staff. The cuts will be in the thousands."Son's comments are not out of line with things Sprint CEO Marcelo Claure has been telling Sprint workers for months.To read this article in full or to leave a comment, please click here
Analyzing 200,000 records may not seem like a big task. But when those records are security incidents with potentially hundreds of attributes each -- types of bad actors, assets affected, category of organization and more -- it starts getting a little complex for a spreadsheet. So Verizon's annual security report, which was initially done in Excel, is now generated "soup to nuts" in R.In fact, the Verizon Data Breach Report is somewhat of "a love letter to R," Bob Rudis, managing principal and senior data scientist at Verizon Enterprise Solutions, told the EARL (Effective Applications of the R Language) Boston conference earlier today.To read this article in full or to leave a comment, please click here