Trump’s push for cyber defense is sorely needed, experts say

President-elect Donald Trump plans to consult "the greatest computer minds” for input on bolstering U.S. hacking defenses, as experts say an overhaul to the country's cybersecurity is badly needed.“We’re going to put those minds together, and we're going to form a defense,” Trump said in a Wednesday press conference.Trump made the statement as he said Russia, China and other parties continue to launch cyber attacks against the U.S. In recent weeks, he’s also been confronting claims that the Kremlin used hacks and online propaganda in a covert campaign to tilt the election in his favor.To read this article in full or to leave a comment, please click here

Trump doc claims Russia has cracked Telegram messaging service

The raw intelligence document published this week that contains salacious stories about Donald Trump also offers up a glimpse into how Russia goes about its cyber spying – including the tidbit that it has cracked Telegram’s encrypted instant messaging service.While none of the 35-page document is substantiated, it is detailed, and at least some of it is considered credible enough by U.S. intelligence agencies for them to have briefed Trump and President Barack Obama on it.According to the documents prepared by a former British spy, a “cyber operative” for the Russian Federal Security Service (FSB) told him that Telegram no longer posed an issue for the government. “His/her understanding was that the FSB now successfully had cracked this communication software and therefore it was no longer secure to use,” the document says.To read this article in full or to leave a comment, please click here

Trump doc claims Russia has cracked Telegram messaging service

The raw intelligence document published this week that contains salacious stories about Donald Trump also offers up a glimpse into how Russia goes about its cyber spying – including the tidbit that it has cracked Telegram’s encrypted instant messaging service.While none of the 35-page document is substantiated, it is detailed, and at least some of it is considered credible enough by U.S. intelligence agencies for them to have briefed Trump and President Barack Obama on it.According to the documents prepared by a former British spy, a “cyber operative” for the Russian Federal Security Service (FSB) told him that Telegram no longer posed an issue for the government. “His/her understanding was that the FSB now successfully had cracked this communication software and therefore it was no longer secure to use,” the document says.To read this article in full or to leave a comment, please click here

National Instruments industrial IoT lab unites rivals

There are many companies vying to build the industrial internet of things, but the systems involved are so complex that those vendors also need to cooperate. A new lab at National Instruments, in Austin, Texas, is bringing some competitors together.The NI Industrial IoT Lab opened on Wednesday and will house testbeds for applications like predictive maintenance, time-synchronized industrial networking and “microgrids” for renewable energy. It will also be a place where companies can show off joint solutions to customers.One of the aims of the lab is to show enterprises that IoT works, said Jamie Smith, director of embedded systems at National Instruments.To read this article in full or to leave a comment, please click here

DockerCon 2017 first speakers announced

To the rest of the world, DockerCon 2017 may seem a ways away, but here at Docker we are heads down reading your Call for Papers submissions and curating content to make this the biggest and best DockerCon to date. With that, we are thrilled to share with you the DockerCon 2017 Website with helpful information including ten of the first confirmed speakers and sessions.

If you want to join this amazing lineup and haven’t submitted your cool hack, use case or deep dive session, don’t hesitate! The Call for Papers closes this Saturday, January 14th.

 

Submit a talk

 

First DockerCon speakers

 

Laura Frank

Sr. Software Engineer, Codeship

Everything You Thought You Already Knew About Orchestration

 

 

 



Julius Volz

Co-founder, Prometheus

Monitoring, the Prometheus Way

 

 


 

Liz Rice

Co-founder & CEO, Microscaling Systems

What have namespaces done for you lately?

 

 


 

Thomas Graf

Principal Engineer at Noiro, Cisco

Cilium – BPF & XDP for containers

 

 


 

Brendan Gregg 

Sr. Performance Architect, Netflix

Container Tracing Deep Dive

 

 


 

Thomas Shaw

Build Engineer, Activision

Activision’s Skypilot: Delivering amazing game experiences through containerized pipelines

 

 


 

Fabiane Nardon

Chief Scientist Continue reading

41% off Withings Body Composition Wi-Fi Scale – Deal Alert

Step on the Withings Body scale to view full body composition metrics for a holistic picture of your health and fitness. The scale displays your weight, body fat, water percentage, bone and muscle mass. The scale's screen will also display a graph with your last 8 weigh-ins, making it easy to immediately see weight trends. All data syncs to the Withings Health Mate app, automatically. Also features integrated nutrition tracking and ability to pair with over 100 health and fitness apps to help understand how your efforts impact what you see on the scale. Works via Wi-Fi or Bluetooth. The scale can automatically recognize and record data from up to 8 users, and lasts up to 18 months on a single set of AAA batteries (included). Its typical price of $130 has been discounted a generous 41% to $77 on Amazon, where it averages 4 out of 5 stars from over 200 people. See the discounted Withings Body Composition Wi-Fi Scale on Amazon.To read this article in full or to leave a comment, please click here

Security tops app services priority list

Security, not availability, is now the number one priority driving the adoption of application services, according to a new report by F5 Networks.Applications are becoming core to the digital economy, and organizations are increasingly turning to application services to keep them humming. In its third annual State of Application Delivery report, F5 Networks found that the average number of app services used by organizations increased from 11 in 2016 to 14 today. Sangeeta Anand, senior vice president of product management and marketing at F5 Networks, adds that the average organization plans to deploy 17 app services in the next 12 months.To read this article in full or to leave a comment, please click here

Security tops app services priority list

Security, not availability, is now the number one priority driving the adoption of application services, according to a new report by F5 Networks.Applications are becoming core to the digital economy, and organizations are increasingly turning to application services to keep them humming. In its third annual State of Application Delivery report, F5 Networks found that the average number of app services used by organizations increased from 11 in 2016 to 14 today. Sangeeta Anand, senior vice president of product management and marketing at F5 Networks, adds that the average organization plans to deploy 17 app services in the next 12 months.To read this article in full or to leave a comment, please click here

DHS should have a cybersecurity unit, says panel chairman

WASHINGTON -- The chairman of the U.S. House Committee on Homeland Security said Wednesday his top priority in 2017 will be to push for creation of a cybersecurity agency within the Department of Homeland Security. “DHS needs focus and resources, and they are doing a decent job, but could be doing a lot better with the help of Congress,” said U.S. Rep. Michael McCaul (R-Texas) in comments to reporters at the National Press Club. “It’s not a Republican or Democratic issue.” Ed Schipul U.S. Rep. Michael McCaul (R-Texas)To read this article in full or to leave a comment, please click here

DHS should have a cybersecurity unit, says panel chairman

WASHINGTON -- The chairman of the U.S. House Committee on Homeland Security said Wednesday his top priority in 2017 will be to push for creation of a cybersecurity agency within the Department of Homeland Security. “DHS needs focus and resources, and they are doing a decent job, but could be doing a lot better with the help of Congress,” said U.S. Rep. Michael McCaul (R-Texas) in comments to reporters at the National Press Club. “It’s not a Republican or Democratic issue.” Ed Schipul U.S. Rep. Michael McCaul (R-Texas)To read this article in full or to leave a comment, please click here

Here’s what you look like when you’re trying VR

Virtual reality at CESImage by Alexandra Wimley/BU News ServiceVirtual reality was all over CES, providing attendees with a glimpse into the computer animated future. But while show-goers were deep in their virtual worlds, photographers Ann Singer and Alexandra Wimley of BU News Service were outside looking on. Here's what they captured. Here, David Nevas, of Lawrenceville, New Jersey, tries out the Icaros virtual reality flying device at CES on Jan. 6, 2017.To read this article in full or to leave a comment, please click here

New MacBook Pros stop Apple’s skid in worldwide PC shipments

Apple's new MacBook Pros have put the brakes on a free-fall of Mac shipments globally, though they haven't provided the significant boost the company was looking for.The company's Mac shipments totaled 5.3 million units during the fourth quarter of 2016, a decline of just 0.9 percent compared to the same quarter in 2015.That compares favorably to overall Mac shipments in 2016, which totaled 18.4 million units, a decline of 9.8 percent compared to 2015, according to IDC. Apple launched the new MacBook Pros in late October, and it was considered a significant upgrade. Had the new MacBook Pros shipped for all three months, the quarterly growth may have jumped up to flat or positive territory.To read this article in full or to leave a comment, please click here

BrandPost: What Is Continuous Delivery?

Originally posted on the Puppet blog, and republished here with Puppet's permission.What is continuous delivery? How is it different from continuous deployment? How does it relate to DevOps? We get these questions a lot, we even created a handbook for continuous delivery.To read this article in full or to leave a comment, please click here

Worth Reading: The state of DNS security

Did you know that 89% of top-level domains are now signed with DNSSEC? Or that over 88% of .GOV domains and over 50% of .CZ domains are signed? Were you aware that over 103,000 domains use DANE and DNSSEC to provide a higher level of security for email? Or that 80% of clients request DNSSEC signature records in DNS queries? All these facts and much more are available in our new State of DNSSEC Deployment 2016 report. —The Internet Society

The post Worth Reading: The state of DNS security appeared first on 'net work.

DevOps Success Requires Equal Parts Dev & Ops

In the push toward DevOps, much of focus is on software developers and development, but without equal investments on the operations side, progress slows down. In this episode of Talking DevOps, Josh Atwell, Developer Advocate for NetApp SolidFire, emphasizes the concept of balance and the need for adequate attention on the operations side of the equation. 

‘Found a nasty bug in my (Cisco) ASA this morning’

The above headline on a post to Reddit piqued my interest this afternoon because it was in that site’s section devoted to system administration and those people know a bug when they encounter one.The Redditor elaborates: “I found a bug in my ASA today. Eth 0/2 was totally unusable and seemed ‘blocked.’ These Cisco bugs are really getting out of hand. I'm just glad I didn't open this port up to the web.”Scare quotes around blocked? Gratuitous mention of the web. I smelled a ruse before even opening the first of three pictures.No. 1, labeled “checking layer 1:”To read this article in full or to leave a comment, please click here

‘Found a nasty bug in my (Cisco) ASA this morning’

The above headline on a post to Reddit piqued my interest this afternoon because it was in that site’s section devoted to system administration and those people know a bug when they encounter one.The Redditor elaborates: “I found a bug in my ASA today. Eth 0/2 was totally unusable and seemed ‘blocked.’ These Cisco bugs are really getting out of hand. I'm just glad I didn't open this port up to the web.”Scare quotes around blocked? Gratuitous mention of the web. I smelled a ruse before even opening the first of three pictures.No. 1, labeled “checking layer 1:”To read this article in full or to leave a comment, please click here