How to achieve security via whitelisting with Docker containers  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  Docker containers have become an important means for organizations to build and run applications in the cloud. There’s a lot of flexibility with containers, as they can be deployed on top of any bare-metal server, virtual machine, or platform-as-as-service (PaaS) environment. Developers have embraced Docker containers on public clouds because they don’t need help from an IT operations team to spin them up.A software container is simply a thin package of an application and the libraries that support the application, making it easy to move a container from one operating system to another. This makes it possible for a developer to build an application and then take all the source code and supporting files and basically create something like a zip file so the container can be deployed just about anywhere. It contains everything the application needs to run, including code, runtime, system tools and system libraries.To read this article in full or to leave a comment, please click here

How to achieve security via whitelisting with Docker containers  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  Docker containers have become an important means for organizations to build and run applications in the cloud. There’s a lot of flexibility with containers, as they can be deployed on top of any bare-metal server, virtual machine, or platform-as-as-service (PaaS) environment. Developers have embraced Docker containers on public clouds because they don’t need help from an IT operations team to spin them up.A software container is simply a thin package of an application and the libraries that support the application, making it easy to move a container from one operating system to another. This makes it possible for a developer to build an application and then take all the source code and supporting files and basically create something like a zip file so the container can be deployed just about anywhere. It contains everything the application needs to run, including code, runtime, system tools and system libraries.To read this article in full or to leave a comment, please click here

After CIA leak, Intel Security releases detection tool for EFI rootkits

Intel Security has released a tool that allows users to check if their computer's low-level system firmware has been modified and contains unauthorized code.The release comes after CIA documents leaked Tuesday revealed that the agency has developed EFI (Extensible Firmware Interface) rootkits for Apple's Macbooks. A rootkit is a malicious program that runs with high privileges -- typically in the kernel -- and hides the existence of other malicious components and activities.The documents from CIA's Embedded Development Branch (EDB) mention an OS X "implant" called DerStarke that includes a kernel code injection module dubbed Bokor and an EFI persistence module called DarkMatter.To read this article in full or to leave a comment, please click here

After CIA leak, Intel Security releases detection tool for EFI rootkits

Intel Security has released a tool that allows users to check if their computer's low-level system firmware has been modified and contains unauthorized code.The release comes after CIA documents leaked Tuesday revealed that the agency has developed EFI (Extensible Firmware Interface) rootkits for Apple's Macbooks. A rootkit is a malicious program that runs with high privileges -- typically in the kernel -- and hides the existence of other malicious components and activities.The documents from CIA's Embedded Development Branch (EDB) mention an OS X "implant" called DerStarke that includes a kernel code injection module dubbed Bokor and an EFI persistence module called DarkMatter.To read this article in full or to leave a comment, please click here

Microsoft’s .NET Core slowly marches onto Raspberry Pi 3

Microsoft's .NET Core is now making its way to Raspberry Pi developer boards, and an official .NET 2.0 Core is coming from the software company later this year.The .NET Core for Raspberry Pi and instructions to install it are available on the Github site.The .NET platform can be used to develop mobile, PC, and server applications and services. The Raspberry Pi 3 board can serve as an entry-level PC or be used to develop smart gadgets, robots, or internet-of-things devices.Microsoft recently opened up the programming framework for .NET Core, and separate from the Raspberry Pi move, Samsung is adopting it for the Tizen OS platform. Tizen is a Linux-based OS being developed by Samsung used in smartwatches and other devices.To read this article in full or to leave a comment, please click here

Private search firm migrates to OpenStack as it adopts automation

Nate Baechtold, Enterprise Architect at EBSCO Information Services, says it was going to be too hard to automate the company’s VMware environment so the firm shifted to OpenStack, which natively abstracts underlying components much like AWS.  But the next sticking point was how to enable developers to build in load balancing?  A self-service model using the existing hardware-based system was too complex, Baechtold tells Network World Editor in Chief John Dix, but a new software-defined tool fit the bill. EBSCO Information Services Nate Baechtold, Enterprise Architect at EBSCO Information ServicesTo read this article in full or to leave a comment, please click here

Private search firm migrates to OpenStack as it adopts automation

Nate Baechtold, Enterprise Architect at EBSCO Information Services, says it was going to be too hard to automate the company’s VMware environment so the firm shifted to OpenStack, which natively abstracts underlying components much like AWS.  But the next sticking point was how to enable developers to build in load balancing?  A self-service model using the existing hardware-based system was too complex, Baechtold tells Network World Editor in Chief John Dix, but a new software-defined tool fit the bill. EBSCO Information Services Nate Baechtold, Enterprise Architect at EBSCO Information ServicesTo read this article in full or to leave a comment, please click here

After WikiLeaks’ CIA dump, China tells U.S. to stop spying

China today asked the U.S. government to stop spying on it, China's first reaction to WikiLeaks' disclosure of a trove of CIA documents that alleged the agency was able to hack smartphones, personal computers, routers and other digital devices worldwide."We urge the U.S. to stop listening in, monitoring, stealing secrets and [conducting] cyber-attacks against China and other countries," said Geng Shuang, a Foreign Ministry spokesman said today in a Beijing press briefing.Geng also said that China would protect its own networks, was willing to work with others toward what he called "orderly cyberspace," and repeated his government's stock denunciation of hacking.To read this article in full or to leave a comment, please click here

After WikiLeaks’ CIA dump, China tells U.S. to stop spying

China today asked the U.S. government to stop spying on it, China's first reaction to WikiLeaks' disclosure of a trove of CIA documents that alleged the agency was able to hack smartphones, personal computers, routers and other digital devices worldwide."We urge the U.S. to stop listening in, monitoring, stealing secrets and [conducting] cyber-attacks against China and other countries," said Geng Shuang, a Foreign Ministry spokesman said today in a Beijing press briefing.Geng also said that China would protect its own networks, was willing to work with others toward what he called "orderly cyberspace," and repeated his government's stock denunciation of hacking.To read this article in full or to leave a comment, please click here

Google launches official Gmail Add-on program

Google is making it possible for developers to bring their services into Gmail using new integrations called Add-ons.It’s built so that developers can write one set of code in Google’s Apps Script language and have their integration run in Gmail on the web, as well as inside Google’s Android and iOS apps for the service. For example, a QuickBooks add-on would let users easily send invoices to people who they’re emailing.  Google already offers Add-ons for its Docs word processing and Sheets spreadsheet software.This sort of system could be useful for users because it helps them get work done without leaving Gmail. It also helps draw users into Google’s official email app, rather than use one of the many other clients that can access the service, including Microsoft Outlook.To read this article in full or to leave a comment, please click here

After the WikiLeaks dump: Do nothing

You heard it here first. Don’t do a damn thing in response to the WikiLeaks dump that you’re not already doing. Don’t sit still, be vigilant, keep your eye on the targets. Because this isn’t news.What? Not news?!?No. Between the three-letter agencies, if they want you, they have you. They’ll find a way. It’s a matter of time. But they’re largely ahead of the ne’er-do-wells. You should expect this.+ Also on Network World: Apple, Cisco, Microsoft and Samsung react to CIA targeting their products + If hardware and device makers gasp that their stuff is crackable, it’s only time to snicker. Nothing is foolproof because 1) fools are so ingenious and 2) with a big enough hammer you can crack anything. Even you. You are not impregnable. It’s a matter of degree—and if you can detect the breach quickly.To read this article in full or to leave a comment, please click here

After the WikiLeaks dump: Do nothing

You heard it here first. Don’t do a damn thing in response to the WikiLeaks dump that you’re not already doing. Don’t sit still, be vigilant, keep your eye on the targets. Because this isn’t news.What? Not news?!?No. Between the three-letter agencies, if they want you, they have you. They’ll find a way. It’s a matter of time. But they’re largely ahead of the ne’er-do-wells. You should expect this.+ Also on Network World: Apple, Cisco, Microsoft and Samsung react to CIA targeting their products + If hardware and device makers gasp that their stuff is crackable, it’s only time to snicker. Nothing is foolproof because 1) fools are so ingenious and 2) with a big enough hammer you can crack anything. Even you. You are not impregnable. It’s a matter of degree—and if you can detect the breach quickly.To read this article in full or to leave a comment, please click here

ESG Lab Review: VMware NSX

“If your organization is interested in improving the agility, security, and economic efficiency of your networks, ESG Lab recommends taking a close look at VMware NSX.”

ESG Lab recently reached out to the VMware technical product marketing team about the network virtualization and security platform, VMware NSX.  The team at ESG had set a goal of examining the NSX platform to better understand how network administrators in organizations from SMBs to large enterprises leveraged NSX and used tools to aid in the operational aspects of network virtualization.  Many benefits come with modern software tools on better visibility, ease of troubleshooting, and OpEx-related savings related to faster time to resolution for mission critical workloads. ESG wanted to evaluate and consider existing tools as well as newer tools in the VMware portfolio to substantiate these potential benefits.

Application architectures are drastically changing and enterprise networking and IT teams are seeing a shift in the requirements, based on emerging cloud-based architectures.  Since modern business agility drives the network to support new architectures and newer consumption models, and the network is at the center of any IT infrastructure. ESG proposes that network security is top of mind for every organization’s Continue reading

25% off Withings Thermo Wireless Smart Thermometer – Deal Alert

With an exceedingly simple scan across the forehead, 16 infrared sensors take over 4,000 measurements to find the hottest point. It requires no contact with the skin, unlike traditional methods, making Thermo is the most sanitary way to take anyone’s temperature. Readings appear illuminated on the device, and if desired, will sync to your smartphone for tracking and much more. Its typical list price of $100 will be reduced 25% when you click the green "clip 25% off coupon" button on its Amazon product page. See the discounted Withings Thermo thermometer on Amazon.To read this article in full or to leave a comment, please click here

Review: Design flaw mars my support for Mac-centric mechanical keyboard

As longtime readers may already know, I’m a big fan of mechanical-style keyboards for computers. The haptic feedback I get on them, the “clickety-clackety” noise they make (the ability to annoy my cubicle neighbors is often worth the price of admission) and the accuracy make this a preferred peripheral for me.My current favorite keyboard is from Das Keyboard, and I’ve seen other manufacturers make mechanical keyboards, often designed for PC gamers, who often love the response, accuracy and general look and feel.With that in mind, I was sent the new Lofree mechanical Bluetooth keyboard, which is currently undergoing a crowdfunding campaign on Indiegogo. The keyboard costs $74 with free shipping for U.S. customers, with retail pricing about $99 and coming later this year.To read this article in full or to leave a comment, please click here