IDG Contributor Network: 5 most common data privacy misconceptions

Average internet users are starting to realize they should be protecting their personal information better. But do they understand why?Protecting private data is more important than many people realize, and also quite simple. I’d like to unpack the top five most common misconceptions of cybersecurity to demonstrate why you should learn how to protect yourself and your data. 1. I have nothing to hide. Why do I need my data to be encrypted?No skeletons in your closet? No searches you’d prefer didn’t surface? That’s fine, but what about your credit card information, passwords and Social Security number? Just because you don’t have dirty laundry to air doesn’t mean your personal data isn’t worth protecting.To read this article in full or to leave a comment, please click here

Senators call for special committee to investigate Russian election hacking

The election is well over, but the storm is still brewing with no end in sight when it comes to trying to figure out what to do about Russian hacks aimed at influencing the election.On Sunday Dec. 11, US Senators John McCain, Chuck Schumer, Lindsey Graham and Jack Reed urged Majority Leader Mitch McConnell not to allow an investigation into Russian interference of the election to become a partisan issue. It’s an issue which “should alarm every American.”That same day, President-elect Donald Trump blew off the idea that the intelligence community had a clue as to whom was behind the hacks. His transition team later added, “These are the same people that said Saddam Hussein had weapons of mass destruction.”To read this article in full or to leave a comment, please click here

Senators call for special committee to investigate Russian election hacking

The election is well over, but the storm is still brewing with no end in sight when it comes to trying to figure out what to do about Russian hacks aimed at influencing the election.On Sunday Dec. 11, US Senators John McCain, Chuck Schumer, Lindsey Graham and Jack Reed urged Majority Leader Mitch McConnell not to allow an investigation into Russian interference of the election to become a partisan issue. It’s an issue which “should alarm every American.”That same day, President-elect Donald Trump blew off the idea that the intelligence community had a clue as to whom was behind the hacks. His transition team later added, “These are the same people that said Saddam Hussein had weapons of mass destruction.”To read this article in full or to leave a comment, please click here

IDG Contributor Network: Facial recognition to kick in for 2017

Computers fully comprehending things they see in front of them will be the technical advance that takes us to the next level in our digitized world, experts say.“The next leap in computing will be in how we interpret images,” said Jem Davies, an ARM executive at an embedded technology conference recently. “That will be revolutionary,” he said, according to IEEE Spectrum, writing about the processor executive’s talk in the article “Bringing Eyes to the Internet of Things.”To read this article in full or to leave a comment, please click here

Cisco ONE simplifies security purchasing

'Tis the season to be jolly, they say, which is true unless you’re involved with enterprise security. For those individuals, tis the season to be wary as the number of highly publicized breaches continues to grow, as does the complexity of trying adequately secure the business. One of the biggest challenges is the vendor landscape has exploded with hundreds of point products. In fact, the 2016 ZK Research Security Survey found that large enterprises have an average of 32 security vendors deployed. + Also on Network World: What to expect from Cisco in 2017 + More security vendors doesn’t make companies more secure. It just makes things more complex. Despite the number of point products, finding a breach still takes well over 100 days. Think of the damage that can happen in over three months. A persistent threat can make its way around the company network, map out the whole environment and provide a blueprint for hackers to take whatever data they want. To read this article in full or to leave a comment, please click here

Cisco ONE simplifies security purchasing

'Tis the season to be jolly, they say, which is true unless you’re involved with enterprise security. For those individuals, tis the season to be wary as the number of highly publicized breaches continues to grow, as does the complexity of trying adequately secure the business. One of the biggest challenges is the vendor landscape has exploded with hundreds of point products. In fact, the 2016 ZK Research Security Survey found that large enterprises have an average of 32 security vendors deployed. + Also on Network World: What to expect from Cisco in 2017 + More security vendors doesn’t make companies more secure. It just makes things more complex. Despite the number of point products, finding a breach still takes well over 100 days. Think of the damage that can happen in over three months. A persistent threat can make its way around the company network, map out the whole environment and provide a blueprint for hackers to take whatever data they want. To read this article in full or to leave a comment, please click here

The new rulers of the cybersecurity realm: Automation, Analytics Artificial Intelligence

It may be a brave new world in 2017 but it’s also a darn scary one for IT security professionals.READ MORE ON NETWORK WORLD: 5 enterprise technologies that will shake things up in 2017+Just take a look at some recent Gartner assessments of the security situation: By 2020, 60% of digital businesses will suffer major service failures, due to the inability of IT security teams to manage digital risk. By 2020, 60% of enterprise information security budgets will be allocated for rapid detection and response approaches, which is an increase from less than 30% in 2016. By 2018, 25% of corporate data traffic will flow directly from mobile devices to the cloud, bypassing enterprise security controls. Through 2018, over 50% of IoT device manufacturers will not be able to address threats from weak authentication practices. So what technologies are going to change this scenario back in favor of IT? The new security AAA: Automation, analytics and artificial intelligence say proponents.To read this article in full or to leave a comment, please click here

The new rulers of the cybersecurity realm: Automation, Analytics Artificial Intelligence

It may be a brave new world in 2017 but it’s also a darn scary one for IT security professionals.READ MORE ON NETWORK WORLD: 5 enterprise technologies that will shake things up in 2017+Just take a look at some recent Gartner assessments of the security situation: By 2020, 60% of digital businesses will suffer major service failures, due to the inability of IT security teams to manage digital risk. By 2020, 60% of enterprise information security budgets will be allocated for rapid detection and response approaches, which is an increase from less than 30% in 2016. By 2018, 25% of corporate data traffic will flow directly from mobile devices to the cloud, bypassing enterprise security controls. Through 2018, over 50% of IoT device manufacturers will not be able to address threats from weak authentication practices. So what technologies are going to change this scenario back in favor of IT? The new security AAA: Automation, analytics and artificial intelligence say proponents.To read this article in full or to leave a comment, please click here

The new rulers of the cybersecurity realm: Automation, Analytics Artificial Intelligence

It may be a brave new world in 2017 but it’s also a darn scary one for IT security professionals.READ MORE ON NETWORK WORLD: 5 enterprise technologies that will shake things up in 2017+Just take a look at some recent Gartner assessments of the security situation: By 2020, 60% of digital businesses will suffer major service failures, due to the inability of IT security teams to manage digital risk. By 2020, 60% of enterprise information security budgets will be allocated for rapid detection and response approaches, which is an increase from less than 30% in 2016. By 2018, 25% of corporate data traffic will flow directly from mobile devices to the cloud, bypassing enterprise security controls. Through 2018, over 50% of IoT device manufacturers will not be able to address threats from weak authentication practices. So what technologies are going to change this scenario back in favor of IT? The new security AAA: Automation, analytics and artificial intelligence say proponents.To read this article in full or to leave a comment, please click here

The new rulers of the cybersecurity realm: Automation, Analytics Artificial Intelligence

It may be a brave new world in 2017 but it’s also a darn scary one for IT security professionals.READ MORE ON NETWORK WORLD: 5 enterprise technologies that will shake things up in 2017+Just take a look at some recent Gartner assessments of the security situation: By 2020, 60% of digital businesses will suffer major service failures, due to the inability of IT security teams to manage digital risk. By 2020, 60% of enterprise information security budgets will be allocated for rapid detection and response approaches, which is an increase from less than 30% in 2016. By 2018, 25% of corporate data traffic will flow directly from mobile devices to the cloud, bypassing enterprise security controls. Through 2018, over 50% of IoT device manufacturers will not be able to address threats from weak authentication practices. So what technologies are going to change this scenario back in favor of IT? The new security AAA: Automation, analytics and artificial intelligence say proponents.To read this article in full or to leave a comment, please click here

12 tips on moving enterprises to the cloud: Cultural edition

When it comes to enterprises successfully transitioning to the DevOps and the cloud, the key isn’t just technological agility, but also organizational agility, also known as “culture.” At least, that was the contention of Constantin Gonzalez, principal solutions architect at Amazon Web Services (AWS), in a session at the recent Amazon Web Services re:Invent conference in Las Vegas. Titled The Enterprise Fast Lane—What Your Competition Doesn’t Want You To Know, the session paired Gonzalez with Christian Dager, chief architect for European car-market site AutoScout24, to discuss the ongoing journey from monolithic apps running .Net/Windows in on-premise data centers to microservices architectures running in JVM/Linux in the AWS cloud.  You can see the video of the entire talk below[FP1] , but I wanted to highlight some of the most interesting takeaways. To read this article in full or to leave a comment, please click here

New products of the week 12.19.16

New products of the weekImage by Cybereason.Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Cloud Foundry Training PlatformImage by altorosTo read this article in full or to leave a comment, please click here

New products of the week 12.19.16

New products of the weekImage by Cybereason.Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Cloud Foundry Training PlatformImage by altorosTo read this article in full or to leave a comment, please click here

New products of the week 12.19.16

New products of the weekImage by Cybereason.Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Cloud Foundry Training PlatformImage by altorosTo read this article in full or to leave a comment, please click here

10 must-watch IaaS cloud trends for 2017

Analysts who track the IaaS public cloud computing market tend to agree that 2016 was a year that solidified the positioning of three vendors: Amazon Web Services, Microsoft Azure and Google Cloud Platform, and marked a major transition point in enterprises using them.These companies gave customers more choices of where to host their data around the globe, more virtual machine instance sizes to optimize their workloads and new ways to manage and analyze data that’s already in the cloud.And enterprises became more and more comfortable using them. More companies committed to shutting down data centers and moving their most important applications to IaaS.To read this article in full or to leave a comment, please click here

Enterprises shy away from traditional performance reviews

No one likes performance reviews at work -- managers don't like conducting them and employees don't enjoy receiving them. And it's nothing new. As The New Yorker points out, dissatisfaction with performance reviews can be traced as far back as the third century in China. Yet employers have been unsuccessful in moving past this outdated tradition."Many of the HR executives and CEOs I've met with dislike performance reviews with a passion, but they aren't sure how to remove them when they are so intertwined with other processes such as compensation increases. However, in the last two years there has been a wave of companies moving away from performance reviews," says Rajeev Behera, CEO of Reflektive, a company that develops real-time employee performance management software.To read this article in full or to leave a comment, please click here

What makes a company a ‘best place to work’?

Glassdoor, the employer review site, has released its annual "Best Places to Work" list for 2017, and while there are some familiar names -- Facebook, Google, LinkedIn -- companies like fast-food restaurant In-N-Out and household brands like Clorox and Nestle Purina Pet Care are making a strong showing in the top 20.What makes a company a "Best Place to Work"? Though there's a diverse group of organizations represented on the list, there are a few common themes, says Allison Berry, public relations specialist at Glassdoor.To read this article in full or to leave a comment, please click here