Are Apple-specific threats on the rise?

Macs are really no more secure than a PC, but for many years there just weren’t as many out there because of the expense of the hardware and other issues. They've historically been a much less popular choice among both consumers, enterprises, and hackers alike.The PC attack surface is much wider; therefore, criminals develop malware that works on PCs because the payout is much higher. James Plouffe, lead solutions architect at mobile-security company MobileIron, said there are, however, a couple of oft-overlooked things that also protect Macs.First, Plouffe said, "MacOS is actually BSD Unix derivative. Granted, it's heavily customized but this meant that, unlike Windows (which had a long tail of viruses reaching back to the days of MS-DOS), bad actors had a lot more heavy lifting to do to be able to attack macOS."To read this article in full or to leave a comment, please click here

What IT security pros are earning in 2017

Continued high demand following a record year of breachesImage by ThinkstockLast year was a record one for data breaches, with some 1,093 breaches reported. That represented a 40 percent increase over the prior year, according to the Identity Theft Resource Center. It is no wonder that information security remains one of the most top-of-mind issues for CIOs, CISOs, and CEOs. The result is continued high demand for IT security pros. “The market for IT security professionals is poised for another strong year,” notes CompTIA Senior Vice President Tim Herbert. “The security job category was one of the faster growing IT occupations during 2016. During the last 90 days, U.S. employers posted nearly 25,000 job openings for security positions.”To read this article in full or to leave a comment, please click here(Insider Story)

Sniff out and kick out Windows malware for free

No single antimalware engine can keep up with all the malware out there. But how about 57 of 'em?[ 18 surprising tips for security pros. | Discover how to secure your systems with InfoWorld's Security Report newsletter. ] In this video, you'll learn how to download and run Windows Sysinternals Process Explorer to test all currently running executables on your Windows system against VirusTotal's 57 antivirus engines, which together offer the best accuracy you can ever get (with a small percentage of false positives that are pretty easy to spot).To read this article in full or to leave a comment, please click here

Sniff out and kick out Windows malware for free

No single antimalware engine can keep up with all the malware out there. But how about 57 of 'em?[ 18 surprising tips for security pros. | Discover how to secure your systems with InfoWorld's Security Report newsletter. ] In this video, you'll learn how to download and run Windows Sysinternals Process Explorer to test all currently running executables on your Windows system against VirusTotal's 57 antivirus engines, which together offer the best accuracy you can ever get (with a small percentage of false positives that are pretty easy to spot).To read this article in full or to leave a comment, please click here

5 tech battles facing Trump

President Donald Trump may face protests from scientists and technologists like no other president before him.It's not just the tech industry that may battle Trump. New forces are arising, some grassroots, such as Neveragain.tech and a planned massive "March for Science," in Washington and elsewhere. The tech industry protest over the seven-country immigration ban is just a preview.To read this article in full or to leave a comment, please click here

Google open-sources Chrome browser for iOS

Google is open-sourcing its Chrome browser on the Apple iOS platform, after making changes enabling the code to be part of Google’s Chromium browser project.The code will be moved to the open source Chromium repository, which lets developers build their own Chrome-like browsers. It had been kept separate from Chromium because of Apple's requirement that all iOS browsers be built on the Apple-controlled WebKit rendering engine.[ Safeguard your browsers; InfoWorld's experts tell you how in the "Web Browser Security Deep Dive" PDF guide. | Cut to the key news in technology trends and IT breakthroughs with the InfoWorld Daily newsletter, our summary of the top tech happenings. ] But after years of refactoring to cleanly separate WebKit from the Chrome for iOS code, the Chrome for iOS code is rejoining Chromium, Google said in a bulletin. (Chrome on other operating systems uses Google's own Blink browser engine.) Developers can compile the iOS version of Chromium like they can for other Chromium versions. Google said it had spent a lot of time during the past several years making changes required to move the code for Chrome for iOS into Chromium.To read this article Continue reading

Review: The best frameworks for machine learning and deep learning

Over the past year I've reviewed half a dozen open source machine learning and/or deep learning frameworks: Caffe, Microsoft Cognitive Toolkit (aka CNTK 2), MXNet, Scikit-learn, Spark MLlib, and TensorFlow. If I had cast my net even wider, I might well have covered a few other popular frameworks, including Theano (a 10-year-old Python deep learning and machine learning framework), Keras (a deep learning front end for Theano and TensorFlow), and DeepLearning4j (deep learning software for Java and Scala on Hadoop and Spark). If you’re interested in working with machine learning and neural networks, you’ve never had a richer array of options.  To read this article in full or to leave a comment, please click here(Insider Story)

5 things DevOps needs to do to secure containers

Can’t we all get alongImage by PixabayDo deepening adoption and broader deployment of container technologies (from the likes of Docker, CoreOS and others) threaten to escalate into the latest skirmish between operations, developers and information security? Certainly, the potential exists to widen the rift, but in fact there is far more common ground than would initially suggest. Containerization introduces new infrastructure that operates dynamically and is open in nature, with more potential for cross-container activity. Containerization presents an almost unprecedented opportunity to embed security into the software delivery pipeline – rather than graft on security checks, container monitoring and policy for access controls as an afterthought.To read this article in full or to leave a comment, please click here

5 things DevOps needs to do to secure containers

Can’t we all get alongImage by PixabayDo deepening adoption and broader deployment of container technologies (from the likes of Docker, CoreOS and others) threaten to escalate into the latest skirmish between operations, developers and information security? Certainly, the potential exists to widen the rift, but in fact there is far more common ground than would initially suggest. Containerization introduces new infrastructure that operates dynamically and is open in nature, with more potential for cross-container activity. Containerization presents an almost unprecedented opportunity to embed security into the software delivery pipeline – rather than graft on security checks, container monitoring and policy for access controls as an afterthought.To read this article in full or to leave a comment, please click here

What enterprise software developers can learn from consumer apps

Companies are asking why the enterprise applications that their employees, customers and partners use every day can't be as simple and intuitive to use as the apps on their smartphones.They can be.In fact, corporate IT is already taking many cues from mobile consumer apps for improving user experience and speeding development of business applications.It's working. By focusing development on specific tasks, enterprise developers are producing apps faster while using fewer IT resources and less code. Even better, the simplicity and ease-of-use of the apps -- little or no training required -- can make them less intimidating for users.To read this article in full or to leave a comment, please click here

AI isn’t just for the good guys anymore

Last summer at the Black Hat cybersecurity conference, the DARPA Cyber Grand Challenge pitted automated systems against one another, trying to find weaknesses in the others' code and exploit them."This is a great example of how easily machines can find and exploit new vulnerabilities, something we'll likely see increase and become more sophisticated over time," said David Gibson, vice president of strategy and market development at Varonis Systems.His company hasn't seen any examples of hackers leveraging artificial intelligence technology or machine learning, but nobody adopts new technologies faster than the sin and hacking industries, he said.To read this article in full or to leave a comment, please click here

AI isn’t just for the good guys anymore

Last summer at the Black Hat cybersecurity conference, the DARPA Cyber Grand Challenge pitted automated systems against one another, trying to find weaknesses in the others' code and exploit them."This is a great example of how easily machines can find and exploit new vulnerabilities, something we'll likely see increase and become more sophisticated over time," said David Gibson, vice president of strategy and market development at Varonis Systems.His company hasn't seen any examples of hackers leveraging artificial intelligence technology or machine learning, but nobody adopts new technologies faster than the sin and hacking industries, he said.To read this article in full or to leave a comment, please click here

How to succeed in an as-a-service world

The cloud conversation is not new. We know by now that the cloud is a prerequisite to shaping scalable and resource-elastic, variable cost-based businesses. However, companies and their CIOs continue to struggle with how to work effectively in this new model, perhaps because they have underestimated the required changes.Successful migration to the cloud is not a trivial milestone. In fact, it may be one of the most significant journeys the IT organization embarks upon. It requires changes to the way the organization functions and delivers – and the speed at which it does so. It calls for a full-scale mindset shift as well as new ways of working - no small feat for most companies.To read this article in full or to leave a comment, please click here

Response: Oracle effectively doubles licence fees to run its stuff in AWS • The Register

Oracle doubles pricing on cloud use in AWS which will ‘coincidentally’ make the high pricing of its own cloud look relatively cheap. Will customers lie down and take this ? Almost certainly, its hard to imagine a bigger commercial sucker than an Oracle customer – its hard to get rid of it once you have it and they love price increases (probably thinking it validates why they bought the product in the first place).

Oracle has changed the way it charges users to run its software in Amazon Web Services, effectively doubling the cost along the way.

Oracle effectively doubles licence fees to run its stuff in AWS • The Register : https://www.theregister.co.uk/2017/01/30/oracle_effectively_doubles_licence_fees_to_run_in_aws/

The post Response: Oracle effectively doubles licence fees to run its stuff in AWS • The Register appeared first on EtherealMind.

Now Cisco can even network your building systems

The latest network hardware from Cisco Systems gives new meaning to the words “light switch.”The Catalyst Digital Building Series Switch is an Ethernet switch designed to link different kinds of building infrastructure over a network. It will be available worldwide in the second quarter. It uses Cisco’s enhanced version of PoE (Power over Ethernet) to run things like lights and cameras while collecting data about those devices over the same standard cable.The switch embodies the merger of IT and OT (operational technology), one of the big enterprise trends that the internet of things is driving. The line is blurring between information systems like servers and building systems like lighting, heating, and physical security. The new technology could make buildings run better. It might also help to turn IT folks and facilities experts into a bit of both.To read this article in full or to leave a comment, please click here

Now Cisco can even network your building systems

The latest network hardware from Cisco Systems gives new meaning to the words “light switch.”The Catalyst Digital Building Series Switch is an Ethernet switch designed to link different kinds of building infrastructure over a network. It will be available worldwide in the second quarter. It uses Cisco’s enhanced version of PoE (Power over Ethernet) to run things like lights and cameras while collecting data about those devices over the same standard cable.The switch embodies the merger of IT and OT (operational technology), one of the big enterprise trends that the internet of things is driving. The line is blurring between information systems like servers and building systems like lighting, heating, and physical security. The new technology could make buildings run better. It might also help to turn IT folks and facilities experts into a bit of both.To read this article in full or to leave a comment, please click here

Apple’s Mobility Partner Program comes out of hiding

You won’t find many public references by Apple to its Mobility Partner Program, an expanding effort by the company to unite with software developers/integrators to boost sales of iPhones and iPads to businesses. In fact, Apple reportedly has discouraged partners in years past from discussing MPP out in the open.But the veil of secrecy surrounding the program is thinning. Apple’s public relations department didn't acknowledge my queries about MPP, such as how long the program has actually been around. But CEO Tim Cook has begun citing the program during Apple (AAPL - NASDAQ) earnings calls over the past year: He specified in October that more than 120 partners have signed on worldwide, and that’s up from about 90 at the start of the year. To read this article in full or to leave a comment, please click here