BrandPost: Securing Remote Access to Enterprise Applications Behind the Firewall – Complex, but Solvable

In today’s digital era, a mobile, distributed workforce is common—and growing. According to IDC, the number of mobile workers will rise to more than 105 million by 2020—almost three-quarters of the U.S. workforce. While offering employees this flexibility makes it easier to recruit new job candidates, it has also made securing the corporate network and providing access to enterprise applications behind the firewall more complex than ever.The reasons for this growing complexity go beyond just anywhere, anytime, any device access to corporate data and applications, both on premises and in the cloud. The growing number of devices (employees, customers, or partners) accessing the network from beyond the traditional perimeter has increased the attack surface. The number and variety of cyber threats continue to grow. Compliance and regulations, especially for privacy and protecting customer data, are stricter than ever. Add to this the growing volume of newly connected devices, such as the Internet of Things (IoT), and the remote-access challenge becomes even more daunting.To read this article in full or to leave a comment, please click here

Apple to unveil new iPad Pro while axing the iPad Mini

Apple can try and spin it any way it wants, but the harsh reality remains that iPad sales have been slumping for years. In fact, it's been quite a few years since Apple has seen year-over-year iPad sales growth over the course of a quarter, despite Tim Cook's assertions that the iPad remains the future of computing.That debate aside, there do appear to be some shakeups comings to Apple's iPad lineup, a fact that shouldn't be all that surprising given Cook's remarks regarding the iPad earlier this year. "We've got some exciting things coming on iPad and I'm optimistic about where things are headed," Cook said about three months ago.That being the case, there are reports that Apple at WWDC this year will introduce a brand new 10.5-inch iPad Pro with an edgeless display. Now what makes this particularly intriguing is that Apple will reportedly fit said 10.5-inch display into a form factor no bigger than the current 9.7-inch iPad model. While it's perhaps too soon to say with any certainty, Apple's upcoming edgeless iPad may be Apple's last real chance at injecting a bit of life into its tablet lineup.To read this article Continue reading

Using JSONSchema to Validate input

There are a lot of REST APIs out there. Quite a few of them use JSON as the data structure which allows us to get data in and out of these devices. There are a lot of network focused blogs that detail how to send and receive data in and out of these devices, but I wasn’t able to find anything that specifically talked about validating the input and output of the data to make sure we’re sending and receiving the expected information.

Testing is a crucial, and IMO too often overlooked, part of the Infrastructure as Code movement. Hopefully this post will help others start to think more about validating input and output of these APIs, or at the very least, spend just a little more time thinking about testing your API interactions before you decide to automate the massive explosion of your infrastructure with a poorly tested script. ?

What is JSONSchema

I’m assuming that you already know what JSON is, so let’s skip directly to talking about JsonSchema. This is a pythonlibrary which allows you to take your input/output  and verify it against a known schema which defined the data types you’re expecting to see.

For example, consider Continue reading

Webinar – May 18 – WannaCry Ransomware: Why is it happening and (how) is it going to end?

What is happening with the WannaCry ransomware that has been attacking unpatched Windows computers around the world? How will it all end? What do we need to do collectively to deal with attacks like this? (Hint: Read Olaf's post.)

To learn more and pose questions to a panel of experts, you can join our partners at the Geneva Internet Platform and Diplo Foundation for a webinar on "Decrypting the WannaCry ransomware: Why is it happening and (how) is it going to end?"

Dan York

Worth Reading: IoT devices will never be secure

The biggest problem with IoT security is that most devices are going to be relatively simple and inexpensive connected things. The bandwidth consumption of these devices should be kept to the minimum to save bandwidth. Yet at the same time, security is supposed to be a continuous process. This involves a party that is responsible for keeping an eye on the various security vulnerabilities that emerge from time to time, and another one to make sure that suitable patches are being prepared and applied on timely basis. —CircleID

The post Worth Reading: IoT devices will never be secure appeared first on rule 11 reader.

IDG Contributor Network: Self-propagating ransomware: What the WannaCry ransomworm means for you

The reports came swiftly on Friday morning, May 12—the first I saw were that dozens of hospitals in England were affected by ransomware, denying physicians access to patient medical records and causing surgery and other treatments to be delayed. Said the BBC: The malware spread quickly on Friday, with medical staff in the UK reportedly seeing computers go down "one by one".NHS staff shared screenshots of the WannaCry programme, which demanded a payment of $300 (£230) in virtual currency Bitcoin to unlock the files for each computer.Throughout the day other, mainly European countries, reported infections.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Self-propagating ransomware: What the WannaCry ransomworm means for you

The reports came swiftly on Friday morning, May 12—the first I saw were that dozens of hospitals in England were affected by ransomware, denying physicians access to patient medical records and causing surgery and other treatments to be delayed. Said the BBC: The malware spread quickly on Friday, with medical staff in the UK reportedly seeing computers go down "one by one".NHS staff shared screenshots of the WannaCry programme, which demanded a payment of $300 (£230) in virtual currency Bitcoin to unlock the files for each computer.Throughout the day other, mainly European countries, reported infections.To read this article in full or to leave a comment, please click here

Privacy and Visibility – The dichotomy of encryption and inspection

The encoding or encryption of communications and information is a very old practice. The concept is relatively simple. One of the easiest examples is simply to reverse the alphabet, A for Z, B for X and so on. The reverse function is the ‘key’ to deciphering the message. We needn’t go into the detailed but fascinating history of the evolution of cryptography and the concept and method of the key. Instead we only need to touch on a few key historical milestones and how they have impacted the world today.

Cryptography is indeed an old practice. The ancient Romans would write encrypted messages on strips of cloth that were wrapped around wooden staffs of various widths. They would then send just the cloth strip with the courier. Only if the right staff was used could the message be deciphered. Here the ‘key’ is the width of the staff. That information would either be known or communicated to the receiver ahead of time so that they would have the right staff on hand to decipher the message. Obviously if anyone intercepted the information regarding the width of the staff, they could also decipher the message if they intercepted that as well. Continue reading

SAP wants to help enterprises learn from their smart devices

SAP has added machine learning to its Leonardo IoT software suite to help businesses handle data gathered from smart devices more intelligently.It unveiled the additions to Leonardo  -- and a cloud of other news -- at its customer conference, Sapphire Now, in Orlando on Tuesday.Leonardo runs on SAP Cloud Platform and provides a number of services to process data from the internet of things, including streaming and predictive analytics. Now, those predictive capabilities will include machine-learning tools tuned to work with the rest of the Leonardo components."It's about adding intelligence to existing business processes and integrating with the core systems of record. Leonardo's capabilities can be infused into SAP applications," said Mike Flannagan, SAP's senior vice president for analytics. "We see Leonardo as something that will help customers transform processes."To read this article in full or to leave a comment, please click here

Top 10 DevOps tools

The world of DevOps is a transformative new trend in the way applications are built and run. A hybrid engineer who both develops code for an app and manages the infrastructure operations the app runs on requires tools geared for multiple aspects of the application lifecycle process.+MORE AT NETWORK WORLD: Serverless Explainer: The next generation of cloud infrastructure | What you need to know about Microservices +To read this article in full or to leave a comment, please click here

Stopping ransomware starts with the security pros

Virtualization-based security software vendor Bromium surveyed security professionals about their behavior toward ransomware. The results were surprising. For example, 10 percent of them admitted to paying a ransom or hiding a breach. More alarming, 35 percent admitted to ignoring their own security protocols.To read this article in full or to leave a comment, please click here(Insider Story)

Stopping ransomware starts with the security pros

Virtualization-based security software vendor Bromium surveyed security professionals about their behavior toward ransomware. The results were surprising. For example, 10 percent of them admitted to paying a ransom or hiding a breach. More alarming, 35 percent admitted to ignoring their own security protocols.After last week’s WannaCry event, these numbers may start to go down as pressure mounts to prevent future attacks. However, Bromium’s data underscores an important point: The security professionals at the front line of defenses against ransomware and other threats need to set a strong example for following proper protocols.To read this article in full or to leave a comment, please click here(Insider Story)

The CSO IoT security basics survival guide

The Internet of Things – the connecting of billions of everyday and industrial devices using tiny sensors that transmit data and share information in the cloud – is revolutionizing the way we live and do business.To read this article in full or to leave a comment, please click here(Insider Story)

The CSO IoT security basics survival guide

The Internet of Things – the connecting of billions of everyday and industrial devices using tiny sensors that transmit data and share information in the cloud – is revolutionizing the way we live and do business.IoT platforms are expected to save organizations money, improve decision-making, increase staff productivity, provide better visibility into the organization and improve the customer experience. Six in ten U.S. companies now have some type of IoT initiative underway – either formal or experimental, according to IT trade association CompTIA.All this potential comes with some big security risks – mainly with the unsecured devices themselves, but also with their ability to join forces to bring down systems. This can leave corporate networks vulnerable.To read this article in full or to leave a comment, please click here(Insider Story)

Troubleshooting: Half Split

The best models will support the second crucial skill required for troubleshooting: seeing the system as a set of problems to be solved. The problem/solution mindset is so critical in really understanding how networks really work, and hence how to troubleshoot them, that Ethan Banks and I are writing an entire book around this concept. The essential points are these—

  • Understand the set of problems being solved
  • Understand a wide theoretical set of solutions for this problem, including how each solution interacts with other problems and solutions, potential side effects of using each solution, and where the common faults lie in each solution
  • Understand this implementation
  • of this solution

Having this kind of information in your head will help you pull in detail where needed to fill in the models of each system; just as you cannot keep all four of the primary systems in your head at once, you also cannot effectively troubleshoot without a reservoir of more detailed knowledge about each system, or the ready ability to absorb more information about each system as needed. Having a problem/solution mindset also helps keep you focused in troubleshooting.
So you have built models of each system, and you have learned Continue reading