78% off Senso Bluetooth Sweatproof Sport Headphones – Deal Alert

These highly rated and inexpensive Bluetooth sport headphones from Senso promise high quality sound, sweatproof design, a comfortable fit, noise suppression, a long battery life and reliable Bluetooth 4.0 connectivity to your device. All for just $38 currently on Amazon, where the Senso sport headphones average 4.5 out of 5 stars from over 1,560 people (read recent reviews here). See the discounted headphones on Amazon.To read this article in full or to leave a comment, please click here

Linux Foundation adds an open source networking specialist to the team

In recognition of the increasingly central role open source technology has played for the networking sector, the Linux Foundation today named Arpit Joshipura as its general manager for networking and orchestration. Joshipura, a veteran tech executive who has worked at Dell, Ericsson, and Nortel, among others, is considered by the organization to be a foundational contributor to open source software in general and networking in particular. Currently, he’s the chief marketing officer for Prevoty, an application security startup in Los Angeles. + ALSO ON NETWORK WORLD: Say goodbye to MS-DOS command prompt | Trump’s plan for protecting IT jobs raises hopes, fears +To read this article in full or to leave a comment, please click here

Cyberspies stole secrets from industrial giant ThyssenKrupp

Germany-based industrial conglomerate ThyssenKrupp was hit by a cyberespionage attack earlier this year that resulted in data being stolen from its industrial solutions and steel producing units.An investigation revealed that the attack was carried out by a professional group of hackers from Southeast Asia and targeted technological know-how and research, according to the group,While hackers managed to steal some information, its exact nature is not clear, with the exception of certain project data from an engineering company, ThyssenKrupp said in an emailed statement Thursday. As a result, at this time there's no reliable estimation of the damage to the company's intellectual property.To read this article in full or to leave a comment, please click here

Cyberspies stole secrets from industrial giant ThyssenKrupp

Germany-based industrial conglomerate ThyssenKrupp was hit by a cyberespionage attack earlier this year that resulted in data being stolen from its industrial solutions and steel producing units.An investigation revealed that the attack was carried out by a professional group of hackers from Southeast Asia and targeted technological know-how and research, according to the group,While hackers managed to steal some information, its exact nature is not clear, with the exception of certain project data from an engineering company, ThyssenKrupp said in an emailed statement Thursday. As a result, at this time there's no reliable estimation of the damage to the company's intellectual property.To read this article in full or to leave a comment, please click here

November 2016: The month in hacks and breaches

On November 13, the breach notification site LeakedSource disclosed that FriendFinder Networks, Inc., which operates such websites as Adultfriendfinder.com and Penthouse.com, had been hacked and over 400 million customer accounts were compromised.In addition to being the largest leak of 2016 (the 360 million records from leaked from MySpace in May comes in second), this data breach also marked the second time in 2 years that FriendFinder users had their account information compromised.To read this article in full or to leave a comment, please click here(Insider Story)

November 2016: The month in hacks and breaches

On November 13, the breach notification site LeakedSource disclosed that FriendFinder Networks, Inc., which operates such websites as Adultfriendfinder.com and Penthouse.com, had been hacked and over 400 million customer accounts were compromised.To read this article in full or to leave a comment, please click here(Insider Story)

Fighting ransomware: A fresh look at Windows Server approaches

Ransomware is evil, and it continues to prey upon thousands of businesses every year. Most infections are fairly quiet affairs: A small business gets infected, almost always by some employee opening an email attachment he or she mistakes as legitimate but that really contains the payload of a virus. Then several undetected hours later, all of the business' files -- at least those the employee had access to, which in a lot of businesses without good security and permissions policies is all of the files -- are encrypted, and demands for payment of a ransom in Bitcoin are made in exchange for the decryption key.To read this article in full or to leave a comment, please click here(Insider Story)

Fighting ransomware: A fresh look at Windows Server approaches

Ransomware is evil, and it continues to prey upon thousands of businesses every year. Most infections are fairly quiet affairs: A small business gets infected, almost always by some employee opening an email attachment he or she mistakes as legitimate but that really contains the payload of a virus. Then several undetected hours later, all of the business' files -- at least those the employee had access to, which in a lot of businesses without good security and permissions policies is all of the files -- are encrypted, and demands for payment of a ransom in Bitcoin are made in exchange for the decryption key.Of course, secure email use and employee behavior is a problem in businesses of all sizes, and there have been some high-profile ransomware infections. Most recently in the news was the attack on the San Francisco Municipal Transportation Agency (SFMTA), or Muni as it is known by Bay Area residents. Muni had to give free trips to all comers over the Thanksgiving weekend while it worked to restore access to its machines. The hacker who infected the utility also claims to have access to 30GB of stolen Muni data; the utility disputes this claim, Continue reading

Fighting ransomware: A fresh look at Windows Server approaches

Ransomware is evil, and it continues to prey upon thousands of businesses every year. Most infections are fairly quiet affairs: A small business gets infected, almost always by some employee opening an email attachment he or she mistakes as legitimate but that really contains the payload of a virus. Then several undetected hours later, all of the business' files -- at least those the employee had access to, which in a lot of businesses without good security and permissions policies is all of the files -- are encrypted, and demands for payment of a ransom in Bitcoin are made in exchange for the decryption key.To read this article in full or to leave a comment, please click here(Insider Story)

What the rise of social media hacking means for your business

A product marketing manager at your company just posted a photo on LinkedIn. The problem? In the background of the image, there’s a Post-It note that contains his network passwords. You can barely see it, but using artificial intelligence algorithms, hackers can scan for the publicly available image, determine there are network passwords, and use them for data theft.According to data security expert David Maynor, this is not rocket science. In fact, the AI program is easier to use than a search engine. “The AI can identify objects in an image and the environment of the photo, guess at a description of the image contents as well as your likely age, gender, facial expression, and more,” says Maynor. “And these tools are becoming increasingly powerful with every image they scan, learning and becoming more accurate.”To read this article in full or to leave a comment, please click here

How to conquer a CRM monster

Richard Bexon has a succinct way to describe the previous CRM software used by the NAMU Travel Group: "a monster.""We had what I suppose you could call a legacy system here," says Bexon, COO of NAMU, a network of luxury travel agencies. Over the eight years that they used the system, too many people had their fingers into the code, and the monster didn't have a manual in case one of those fingers broke the entire system.That could be why, when in 2015, NAMU decided to scrap it and instead start using a cloud-basedCRM application from Bpm'online, the results were off the charts: 271 percent ROI, payback in four months and an annual average benefit of $271,767, according to Bexon.To read this article in full or to leave a comment, please click here

How Apple and Google approach enterprise apps

Apple and Google both try to woo enterprise customers with unique strategies for business app development that mirror their respective visions. And as might be expected, each company elevates its strengths in enterprise and downplays points of weakness, according to IT leaders who spoke to CIO.com.Google cultivates a large group of partners to help organizations integrate Google apps with business processes, and it recently released a self-service tool, called App Maker, that's designed to speed up development. Meanwhile, Apple forged partnerships with a select group of enterprise heavyweights to build key business features into the core of iOS. It also made deals with other companies that work directly with customers to guide their businesses through the transition to mobile. Both approaches bring different enterprise appeals.To read this article in full or to leave a comment, please click here

The Trump effect on cybersecurity: Tough to tell

Donald Trump’s effect on cybersecurity after he’s sworn in as president next month will likely be toward military uses of cyber weapons and stronger tools for law enforcement to crack encryption, but the impact is hard to predict due to the vagueness of his proposals so far.The most detailed Trump cyber plan is just 175 words long and includes some initiatives that sound like what’s already in place.On the campaign trail and during debates he occasionally hit the topic, but again with little detail and perhaps little understanding of how the internet works. For example, he called for Microsoft founder Bill Gates to find a way to shut off parts of the internet to ISIS as a way to halt its recruitment efforts.To read this article in full or to leave a comment, please click here

The Trump effect on cybersecurity: Tough to tell

Donald Trump’s effect on cybersecurity after he’s sworn in as president next month will likely be toward military uses of cyber weapons and stronger tools for law enforcement to crack encryption, but the impact is hard to predict due to the vagueness of his proposals so far.The most detailed Trump cyber plan is just 175 words long and includes some initiatives that sound like what’s already in place.On the campaign trail and during debates he occasionally hit the topic, but again with little detail and perhaps little understanding of how the internet works. For example, he called for Microsoft founder Bill Gates to find a way to shut off parts of the internet to ISIS as a way to halt its recruitment efforts.To read this article in full or to leave a comment, please click here

Worth Reading: Hyper Moore’s Law

Over the last year in particular, we have documented the merger between high performance computing and deep learning and its various shared hardware and software ties. This next year promises far more on both horizons and while GPU maker Nvidia might not have seen it coming to this extent when it was outfitting its first GPUs on the former top “Titan” supercomputer, the company sensed a mesh on the horizon when the first hyperscale deep learning shops were deploying CUDA and GPUs to train neural networks. —The Next Platform

LinkedInTwitterGoogle+Facebook

The post Worth Reading: Hyper Moore’s Law appeared first on 'net work.

Ixia’s GUI faster, more accurate than Gigamon’s command line or Flowmap

The IT infrastructure that powers an organization's business strategy has become increasingly more dynamic and distributed. The introduction of new technologies to increase IT agility has made it significantly more difficult to manage and secure the infrastructure using traditional tools.That challenge has given rise to several new specialized tools that network managers have had to figure out how to integrate into their environment. The explosion of new security and management applications has something called “tool sprawl” where the number of tools has become unmanageable.Trying to connect every tool to every network device is extremely complicated and inefficient. The desire to simplify things has created strong demand for network packet brokers (NPBs). If you’re not familiar with the technology, it sits between the network infrastructure and a tool layer and performs a number of tasks to make tools more efficient and easier to deploy.To read this article in full or to leave a comment, please click here

Ixia’s GUI faster, more accurate than Gigamon’s command line or Flowmap

The IT infrastructure that powers an organizations business strategy has become increasingly more dynamic and distributed. The introduction of new technologies to increase IT agility has made it significantly more difficult to manage and secure the infrastructure using traditional tools.That challenge has given rise to several new specialized tools that network managers have had to figure out how to integrated into their environment. The explosion of new security and management applications has something called “tool sprawl” where the number of tools has become unmanageable.Trying to connect every tool to every network device is extremely complicated and inefficient. The desire to simplify things has created strong demand for network packet brokers (NPBs). If you’re not familiar with the technology, it sits between the network infrastructure and a tool layer and performs a number of tasks to make tools more efficient and easier to deploy.To read this article in full or to leave a comment, please click here