Review: Microsoft Windows Defender comes up short

Microsoft’s latest version of its anti-malware tool, Windows Defender, is a frustrating product to evaluate. Yes, it is perhaps the best antivirus tool to come from Microsoft, with a series of noteworthy improvements. Yes, it provides good enough protection for your family’s PCs. And yes, it could be your PC’s sole antivirus utility, if you are willing to accept its limitations.However, once you examine the product in more detail, you will see why we cannot recommend it for enterprise use. And that is the frustration of this product: Microsoft is trying to do the right thing and offers a tempting feast, but ultimately offers an incomplete meal that is tough to digest.To read this article in full or to leave a comment, please click here(Insider Story)

Review: Microsoft Windows Defender comes up short

Microsoft’s latest version of its anti-malware tool, Windows Defender, is a frustrating product to evaluate. Yes, it is perhaps the best antivirus tool to come from Microsoft, with a series of noteworthy improvements. Yes, it provides good enough protection for your family’s PCs. And yes, it could be your PC’s sole antivirus utility, if you are willing to accept its limitations.To read this article in full or to leave a comment, please click here(Insider Story)

The loss of net neutrality: Say goodbye to a free and open internet

First: I’m not a lawyer. Net neutrality—the principle that no online traffic has priority over other traffic, not even for pay—might go away. If it does, big money will be behind its demise. The end of network neutrality will create many lasting problems, including these specific issues: 1. The lawyers win  Every conceivable new theory about how one organization should have priority will ensue, and the courts will be clogged deciding the outcome. Today, the principle is simple: all traffic gets the same priority, and multimedia can have isochronous priority, but it’s not guaranteed. + Also on Network World: How Trump will attack the FCC's net neutrality rules + Without net neutrality, we will enter an era where ISPs, telcos, carriers and interconnects will all demand that THEIR traffic has priority, and yours does not—unless you pay. Let the litigation begin, and the courts glow in the dark in an attempt to sort out what theories of law now hold sway. Insert wallet, here. To read this article in full or to leave a comment, please click here

Security data growth drives SOAPA

Happy new year, cybersecurity community! I hope you are well rested; it’s bound to be an eventful year.Way back when at the end of November 2016, I wrote a blog post about an evolutionary trend I see happening around cybersecurity analytics and operations technology. Historically, large enterprises have relied on SIEM products to anchor their security operations centers (SOCs). This will continue, but I see SIEM becoming part of a more global cybersecurity software architecture called SOAPA (security operations and analytics platform architecture). To read this article in full or to leave a comment, please click here

Security data growth drives SOAPA

Happy new year, cybersecurity community! I hope you are well rested; it’s bound to be an eventful year.Way back when at the end of November 2016, I wrote a blog post about an evolutionary trend I see happening around cybersecurity analytics and operations technology. Historically, large enterprises have relied on SIEM products to anchor their security operations centers (SOCs). This will continue, but I see SIEM becoming part of a more global cybersecurity software architecture called SOAPA (security operations and analytics platform architecture). To read this article in full or to leave a comment, please click here

Security Data Growth Drives SOAPA (Security Operations and Analytics Platform Architecture)

Happy new year cybersecurity community!  Hope you are well rested, it’s bound to be an eventful year ahead.Way back when at the end of November 2016, I posted a blog about an evolutionary trend I see happening around cybersecurity analytics and operations technology.  Historically, large enterprises have relied on SIEM products to anchor their SOCs.  This will continue but I see SIEM becoming part of a more global cybersecurity software architecture called SOAPA (i.e. security operations and analytics platform architecture). SOAPA uses middleware (i.e. message queueing, transaction processing, etc.), APIs, and industry standards like CybOX, STIX, and TAXII to connect disparate cybersecurity analytics and operations tools and data sources like EDR, network security analytics, UBA/machine learning analytics systems, vulnerability scanners, security asset management, anti-malware sandboxes/cloud services, incident response platforms, and threat intelligence into a cohesive software architecture.  In this way, disparate analytics tools can be used collectively to gain more context out of the data while accelerating processes and cybersecurity operations.To read this article in full or to leave a comment, please click here

Security Data Growth Drives SOAPA (Security Operations and Analytics Platform Architecture)

Happy new year cybersecurity community!  Hope you are well rested, it’s bound to be an eventful year ahead.Way back when at the end of November 2016, I posted a blog about an evolutionary trend I see happening around cybersecurity analytics and operations technology.  Historically, large enterprises have relied on SIEM products to anchor their SOCs.  This will continue but I see SIEM becoming part of a more global cybersecurity software architecture called SOAPA (i.e. security operations and analytics platform architecture). SOAPA uses middleware (i.e. message queueing, transaction processing, etc.), APIs, and industry standards like CybOX, STIX, and TAXII to connect disparate cybersecurity analytics and operations tools and data sources like EDR, network security analytics, UBA/machine learning analytics systems, vulnerability scanners, security asset management, anti-malware sandboxes/cloud services, incident response platforms, and threat intelligence into a cohesive software architecture.  In this way, disparate analytics tools can be used collectively to gain more context out of the data while accelerating processes and cybersecurity operations.To read this article in full or to leave a comment, please click here

LeEco’s smart bicycles with Android OS will be hard to steal

Conventional bicycles are undergoing a radical technological makeover that could change the way people ride and protect their bikes. LeEco isn't reinventing the wheel with its new Smart Road and Smart Mountain bikes, but infusing them with dazzling technology derived from smartphones and self-driving cars. The bicycles have navigation, fitness and communication features, and even technology to track a stolen bike. These new features are more than just bells and whistles -- they could be a blueprint of how future bikes could look. Transportation is the next big technology frontier, and LeEco's bikes are cool and smart. The LeEco smart bikes will be available in the U.S. in the second quarter. A company spokeswoman said prices will be announced at a later date.To read this article in full or to leave a comment, please click here

Acer’s Chromebook 11 N7 is tough as nails, but runs on old tech

Do you have the nasty habit of knocking your laptop around? Meet Acer's tough-as-nails Chromebook 11 N7, designed to withstand a serious beating.The Chromebook 11 N7 has an 11.6-inch screen and is fortified with layers of protection to withstand drops. Acer has been so meticulous in ruggedizing the laptop that it's even difficult to remove key caps from the keyboard -- whether by accident or on purpose.Why did Acer construct such a Chromebook? It's targeted at educational institutions that issue laptops to students, who may be clumsy with PCs. The Chromebook 11 N7 is certainly more durable than the iPad, which has been given to students and can crack easily if mishandled.To read this article in full or to leave a comment, please click here

12 things you’ll get in PCs with Intel’s new Kaby Lake chips

Amazingly thin Windows 10 laptops and tablets will soon become available with Intel's new Kaby Lake chips, which were announced at CES. These chips, called 7th Generation Core, will extend laptop battery life to new highs, and bring new capabilities like 4K video. You'll also enjoy VR by connecting headsets to Kaby Lake laptops or tablets. There's a lot more to Kaby Lake, and here's what you can expect from PCs: Thinner and lighter laptops Laptops and tablets with Kaby Lake are so thin and light that their weight in a backpack is not noticeable, unless it's a fully loaded gaming PC. Samsung's new 13.3-inch Notebook 9 weighs an amazing 816 grams, but offers only seven hours of battery life. Low-power Kaby Lake chips will also be in laptops and 2-in-1 devices from Lenovo, HP, Acer and Dell that weigh 1 to 1.5 kilograms.To read this article in full or to leave a comment, please click here

Dell protects Alienware, shoves low-end gaming into Inspiron 7000

Merging gaming PCs into low-end brands failed for PC makers like HP, but Dell is giving it a shot. Dell is moving budget gaming PCs into the consumer Inspiron brand as it positions the premium Alienware PCs for a leap into the 4K and virtual reality era. At CES, Dell introduced new Inspiron 7000 gaming laptops, which have the look and feel of Alienware PCs. With a starting price of US$799, the Inspiron 7000 models aren't as feature-packed as the new Alienware 13, 15, and 17 laptops, which were also announced at the show and will ship this month. The Inspiron 7000 models -- which comes with 14- or 15.6-inch screens -- have processing and graphics punch with high-end Intel Core i7 H-series Kaby Lake CPUs and Nvidia GeForce GTX 1050 GPUs. It's the first Inspiron gaming laptop and the fastest in that brand.To read this article in full or to leave a comment, please click here

Intel’s new NUC mini-desktops get Kaby Lake, Optane and Thunderbolt 3

A lot of cool technologies are coming to Intel's latest NUCs, which are powerful mini-desktops that now boast the company's latest Kaby Lake chips. A NUC  packs all components tightly in a small PC that is light enough to be held  in one hand. These mini-PCs are easily customizable and considered desktop replacements. Some of the new NUCs have Thunderbolt 3 ports, Intel Iris Plus graphics for 4K video, and are ready for Intel's superfast Optane storage. Intel has announced three new "tall" NUCs with 7th Generation Core i3, i5 and i7 chips, and two "short" NUCs with Core i3 and i5 chips. The "tall NUCs" are slightly larger and more powerful than the short NUCs.To read this article in full or to leave a comment, please click here

DockerCon 2017: Call For Papers FAQ

It’s a new year, and we are looking for new stories of how you are using Docker technology to do big things. Submit your cool hack, use case or deep dive sessions before the DockerCon 2017 CFP closes on January 14th.

DockerCon

To help with your submissions, we’ve answered the most frequent questions below and put together a list of tips to help get your proposal selected.

Q. How do I submit a proposal?

A. Submit your proposal here.

Q. What kind of talks are you looking for?

A. This year, we are looking for cool hacks, user stories and deep dive submissions:

  • Cool Hacks: Show us your cool hack and wow us with the interesting ways you can push the boundaries of the Docker stack. You do not have to have your hack ready by the submission deadline, just clearly explain your hack, what makes it cool and the technologies you will use.
  • Using Docker: Tell us first-hand about your Docker usage, challenges and what you learned along the way and inspire us on how to use Docker to accomplish real tasks.
  • Deep Dives: Propose code and demo heavy deep-dive sessions on what you have been able to transform with Continue reading

Sponsored Post: Loupe, New York Times, ScaleArc, Aerospike, Scalyr, VividCortex, MemSQL, InMemory.Net, Zohocorp

Who's Hiring?

  • The New York Times is looking for a Software Engineer for its Delivery/Site Reliability Engineering team. You will also be a part of a team responsible for building the tools that ensure that the various systems at The New York Times continue to operate in a reliable and efficient manner. Some of the tech we use: Go, Ruby, Bash, AWS, GCP, Terraform, Packer, Docker, Kubernetes, Vault, Consul, Jenkins, Drone. Please send resumes to: [email protected]

Fun and Informative Events

  • Your event here!

Cool Products and Services

  • A note for .NET developers: You know the pain of troubleshooting errors with limited time, limited information, and limited tools. Log management, exception tracking, and monitoring solutions can help, but many of them treat the .NET platform as an afterthought. You should learn about Loupe...Loupe is a .NET logging and monitoring solution made for the .NET platform from day one. It helps you find and fix problems fast by tracking performance metrics, capturing errors in your .NET software, identifying which errors are causing the greatest impact, and pinpointing root causes. Learn more and try it free today.

  • ScaleArc's database load balancing software empowers you to “upgrade your apps” to consumer Continue reading

Ransomware on smart TVs is here and removing it can be a pain

It took a year from proof of concept to in-the-wild attack, but ransomware for Android-based smart TVs is now here. As one victim discovered this Christmas, figuring out how to clean such an infection can be quite difficult. Ransomware for Android phones has already been around for several years and security experts have warned in the past that it's only a matter of time until such malicious programs start affecting smart TVs, especially since some of them also run Android. In November 2015, a Symantec researcher named Candid Wueest even went as far as to infect his own TV with an Android ransomware application to highlight the threat. While that infection was just a demonstration, this Christmas, the owner of an LG Electronics TV experienced the real deal.To read this article in full or to leave a comment, please click here

Ransomware on smart TVs is here and removing it can be a pain

It took a year from proof of concept to in-the-wild attack, but ransomware for Android-based smart TVs is now here. As one victim discovered this Christmas, figuring out how to clean such an infection can be quite difficult. Ransomware for Android phones has already been around for several years and security experts have warned in the past that it's only a matter of time until such malicious programs start affecting smart TVs, especially since some of them also run Android. In November 2015, a Symantec researcher named Candid Wueest even went as far as to infect his own TV with an Android ransomware application to highlight the threat. While that infection was just a demonstration, this Christmas, the owner of an LG Electronics TV experienced the real deal.To read this article in full or to leave a comment, please click here

BrandPost: Latest Generation Of Wi-Fi Access Points Drive Multi-Gigabit Wired Ethernet Upgrade Cycle

Organizations from the Fortune 100 to the 28 million small businesses in the United States are embracing mobility, Big Data, social media and cloud computing. This digital transformation in turn is placing crushing capacity demands on enterprise and small and mid-sized business networks.And while these “third-platform” technologies promise agility and speed, for many SMBs, the promise of faster business is too often stifled by legacy network infrastructure. The problem is the Wi-Fi networks many organizations depend on have sped past the capacity of ubiquitous Ethernet cabling to handle the high speeds needed for today’s digital business. Wireless Access Points (APs) today can transfer data faster than the Ethernet cables and network switch can support.To read this article in full or to leave a comment, please click here

Security Without Borders: Free security help for dissidents

Security researcher Claudio Guarnieri has experience working with journalists and human rights organizations which have exercised freedom of speech, reported on some form of corruption and wound up becoming targets because of it; their computers may be compromised with spying malware such as those in the hands of the Hacking Team, FinFisher or NSA to name but a few. Their electronic communications may be intercepted, messaging programs may be blocked. All of that may be because the journalists and human rights organizations in our modern connected society were standing up for what is right, being the voice of dissent, getting out the news about injustice.To read this article in full or to leave a comment, please click here

Security Without Borders: Free security help for dissidents

Security researcher Claudio Guarnieri has experience working with journalists and human rights organizations which have exercised freedom of speech, reported on some form of corruption and wound up becoming targets because of it; their computers may be compromised with spying malware such as those in the hands of the Hacking Team, FinFisher or NSA to name but a few. Their electronic communications may be intercepted, messaging programs may be blocked. All of that may be because the journalists and human rights organizations in our modern connected society were standing up for what is right, being the voice of dissent, getting out the news about injustice.To read this article in full or to leave a comment, please click here