IDG Contributor Network: Hacking for the greater good

In Jason’s last post, he discussed how we are apt to see more intricate and complex data integrity attacks this year, with the adversaries’ main motivation being financial gain and/or political manipulation.As the cyber landscape becomes increasingly complex, private enterprises and public entities are looking for ways to better protect information and preserve the integrity of their data, while individuals want to ensure that the internet remains open and provides equal access to information to all. And while there are a number of technologies that are valuable, people are now being recognized as a powerful tool to solve these problems.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Hacking for the greater good

In Jason’s last post, he discussed how we are apt to see more intricate and complex data integrity attacks this year, with the adversaries’ main motivation being financial gain and/or political manipulation.As the cyber landscape becomes increasingly complex, private enterprises and public entities are looking for ways to better protect information and preserve the integrity of their data, while individuals want to ensure that the internet remains open and provides equal access to information to all. And while there are a number of technologies that are valuable, people are now being recognized as a powerful tool to solve these problems.To read this article in full or to leave a comment, please click here

10 things to worry about when your vendor divests

Potentially difficult timesImage by ThinkstockIn tech, divestitures are a fact of life and solutions are bought and sold all the time. But that doesn’t change the fact that when it happens to a solution that your company uses, it can make things difficult for you. Although your vendor’s divestiture is out of your control, you can at least do your due diligence in limiting any negative impact to your company. With that in mind, ZL Technologies lists 10 things you should worry about if your vendor divests.To read this article in full or to leave a comment, please click here

Facebook appeal over New York search warrants fails

Facebook’s appeal against 381 warrants for information from the accounts of its users was rejected by a New York court on the ground that earlier orders refusing to quash the warrants issued in a criminal proceeding could not be appealed.The decision by the New York State Court of Appeals did not address key issues of whether the broad searches were unconstitutional, and whether internet service providers like Facebook have standing to challenge such warrants on behalf of their users, particularly when they are served with ‘gag orders’ that prevent providers from informing subscribers about the warrants.“This case undoubtedly implicates novel and important substantive issues regarding the constitutional rights of privacy and freedom from unreasonable search and seizure, and the parameters of a federal statute establishing methods by which the government may obtain certain types of information,” wrote Judge Leslie E. Stein, writing for the majority.To read this article in full or to leave a comment, please click here

Facebook appeal over New York search warrants fails

Facebook’s appeal against 381 warrants for information from the accounts of its users was rejected by a New York court on the ground that earlier orders refusing to quash the warrants issued in a criminal proceeding could not be appealed.The decision by the New York State Court of Appeals did not address key issues of whether the broad searches were unconstitutional, and whether internet service providers like Facebook have standing to challenge such warrants on behalf of their users, particularly when they are served with ‘gag orders’ that prevent providers from informing subscribers about the warrants.“This case undoubtedly implicates novel and important substantive issues regarding the constitutional rights of privacy and freedom from unreasonable search and seizure, and the parameters of a federal statute establishing methods by which the government may obtain certain types of information,” wrote Judge Leslie E. Stein, writing for the majority.To read this article in full or to leave a comment, please click here

Kansas City: Cloudflare’s 106th Data Center Now Live

CC-BY 2.0 image by Vincent Parsons

Kansas City, Missouri. Home to the Kansas City Royals, Swope Park, over 100 barbeque restaurants, and now, Cloudflare's 106th data center. We are excited to help make 6 million websites even faster in the Midwest, as our newest deployment joins existing United States facilities in Ashburn, Atlanta, Boston, Chicago, Dallas, Denver, Las Vegas, Los Angeles, Miami,
Minneapolis, Nashville, Newark, Omaha, Philadelphia, Phoenix, San Jose, Seattle, St. Louis, and Tampa.

BBQ!

CC-BY 2.0 image by Shelby Bell

Anthony Bourdain said it best with regards to Joe's KC BBQ in his "13 Places to Eat Before You Die" (alongside Michelin 3-star restaurants like French Laundry and Le Bernardin):

"People may disagree on who has the best BBQ. Here, the brisket (particularly the burnt ends), pulled pork, and ribs are all of a quality that meet the high standards even of Kansas City natives. It's the best BBQ in Kansas City, which makes it the best BBQ in the world."

Visit Kansas City to find the world’s largest shuttlecocks outside the Nelson Atkins Art Museum, as Continue reading

Cisco says Arista’s redesign moves not good enough

The legal battle between Cisco and Arista is heating up as the two sides square off again in court this week in a hearing about their technology patent infringement and enforcement case.This hearing is the latest round in an ongoing battle that began in 2014. Most recently,   in January the U.S. Customs and Border Protection (CBP) agency revoked its November 2016 finding that Arista’s redesigned products don’t infringe a key Cisco patent -- as a result Cisco called on Arista to stop importing those products and recall others sold with redesigned software.To read this article in full or to leave a comment, please click here

Cisco says Arista’s redesign moves not good enough

The legal battle between Cisco and Arista is heating up as the two sides square off again in court this week in a hearing about their technology patent infringement and enforcement case.This hearing is the latest round in an ongoing battle that began in 2014. Most recently,   in January the U.S. Customs and Border Protection (CBP) agency revoked its November 2016 finding that Arista’s redesigned products don’t infringe a key Cisco patent -- as a result Cisco called on Arista to stop importing those products and recall others sold with redesigned software.To read this article in full or to leave a comment, please click here

58% off LOOP Worldwide Travel Adapter with Dual USB Charging Ports – Deal Alert

Power and charge in over 150 Countries with US UK EU & AUS/CHINA Plugs. This adapter works in Canada, Russia, Asia, Central America, South America and the Middle East to name a few. Dual USB charging ports for simultaneously charging your USB devices as well. A 6-amp fuse (and built-in spare fuse) is included, as well as an 18-month warranty. LOOP's travel adapter averages 4 out of 5 stars on Amazon from over 580 people (read reviews). It's $39.95 list price has been reduced a generous 58% to just $16.75. To learn more, or to take advantage of this discount, hop over to Amazon. To read this article in full or to leave a comment, please click here

Chinese hackers go after third-party IT suppliers to steal data

Companies that choose to outsource their IT operations should be careful. Suspected Chinese hackers have been hitting businesses by breaching their third-party IT service providers. Major IT suppliers that specialize in cloud storage, help desk, and application management have become a top target for the hacking group known as APT10, security providers BAE Systems and PwC said in a joint report.That's because these suppliers often have direct access to their client's networks. APT10 has been found stealing intellectual property as part of a global cyberespionage campaign that ramped up last year, PwC said on Monday.To read this article in full or to leave a comment, please click here

Chinese hackers go after third-party IT suppliers to steal data

Companies that choose to outsource their IT operations should be careful. Suspected Chinese hackers have been hitting businesses by breaching their third-party IT service providers. Major IT suppliers that specialize in cloud storage, help desk, and application management have become a top target for the hacking group known as APT10, security providers BAE Systems and PwC said in a joint report.That's because these suppliers often have direct access to their client's networks. APT10 has been found stealing intellectual property as part of a global cyberespionage campaign that ramped up last year, PwC said on Monday.To read this article in full or to leave a comment, please click here

How HPE plans to spin out its software assets

After playing a key role in the 2015 bifurcation of Hewlett Packard into the consumer-focused HP Inc. and the enterprise-centric Hewlett Packard Enterprise (HPE), Chris Hsu is busy working on another big split. Hsu, currently HPE’s COO and GM of HPE Software, is preparing to spin out much of HPE’s software portfolio to Micro Focus in a deal announced last September. When the spin is completed, Hsu will also take over as CEO of Micro Focus, which will be a nearly $5 billion software company with a wide portfolio of assets in big data, security, IT operations and more.To read this article in full or to leave a comment, please click here(Insider Story)

What users could expect from Apple’s homegrown GPUs for iPhones, iPads

Apple has one big reason to move to a homegrown GPU: It wants full control over the hardware and software in its devices.The device maker is apparently developing its own GPU from scratch after dumping Imagination Technologies' PowerVR architecture, which is being used in the iPhone 7. The smartphone runs on the PowerVR A10 Fusion chip.It's not certain when Apple's homegrown GPU will appear in devices, and the company didn't respond to request for comment.Apple has made graphics improvement a priority in its iPhone and iPad models, so users should get better gaming experiences.To read this article in full or to leave a comment, please click here

Delphix CEO: We’re having a ‘massive impact’ on the world’s best brands

When Chris Cook was considering taking the job of Delphix CEO, the company was described to him as 'the best kept secret' in the tech industry. Cook, who's been CEO for a year now, will tell you that's not a good thing and he's working hard to change it. Is one of the things that holds Delphix back is that the market for your product is not easily defined? Is there an easy two- or three- or four-word phrase for what you do? To read this article in full or to leave a comment, please click here(Insider Story)

IT leaders share how they quell cybersecurity attacks

Ask CIOs and CISOs what cybersecurity fears keep them up at night and you’ll hear a range of responses -- from social engineering hacks such as phishing, as well as malware that enables perpetrators to hijack users' websites -- the dreaded ransomware -- and denial-of-service attacks. Depending on their business you might hear them say "all of the above."These threats are driving increased spending on cybersecurity tools intended to protect corporate data from nation-state actors, lone wolf attackers and other malcontents who are seeking access to corporate data. IT leaders know that it takes only one well-placed exploit to infiltrate a corporate network, but they also acknowledge that the best approach is to shrink their attack surface and be ready to respond to an incident in the event of an attack.To read this article in full or to leave a comment, please click here

IT leaders share how they quell cybersecurity attacks

Ask CIOs and CISOs what cybersecurity fears keep them up at night and you’ll hear a range of responses -- from social engineering hacks such as phishing, as well as malware that enables perpetrators to hijack users' websites -- the dreaded ransomware -- and denial-of-service attacks. Depending on their business you might hear them say "all of the above."These threats are driving increased spending on cybersecurity tools intended to protect corporate data from nation-state actors, lone wolf attackers and other malcontents who are seeking access to corporate data. IT leaders know that it takes only one well-placed exploit to infiltrate a corporate network, but they also acknowledge that the best approach is to shrink their attack surface and be ready to respond to an incident in the event of an attack.To read this article in full or to leave a comment, please click here