Apple said to be eyeing wearable AR glasses

Apple is working on wearable digital glasses that would connect wirelessly to the iPhone and show content in the wearer’s field of vision, according to a news report.The iPhone maker has indicated previously its interest in augmented reality. Unlike the simulated world of virtual reality, AR supplements with images and information the user’s normal view of the world.“We are high on AR for the long run. We think there are great things for customers and a great commercial opportunity,” Apple CEO Tim Cook said in an earnings call in July, talking about the need for Apple’s devices to work with other developers' products, such as the successful Pokémon Go game.To read this article in full or to leave a comment, please click here

How automated investigation can accelerate threat detection

Finding threats quickerImage by ThinkstockCyber‫ security analysts are overwhelmed with the pressure of keeping their companies safe. Not only do they need to filter through countless alerts, many of which turn out to be false positives, but also the volume of real threats is growing exponentially. They quickly need to triage and move on, stopping the most pressing threats – but not always the most dangerous. Cyber analysts need a new, holistic approach to threat detection that monitors, analyzes and cross-references data across multiple dimensions to help them detect complex threats as early as possible.To read this article in full or to leave a comment, please click here

How automated investigation can accelerate threat detection

Finding threats quickerImage by ThinkstockCyber‫ security analysts are overwhelmed with the pressure of keeping their companies safe. Not only do they need to filter through countless alerts, many of which turn out to be false positives, but also the volume of real threats is growing exponentially. They quickly need to triage and move on, stopping the most pressing threats – but not always the most dangerous. Cyber analysts need a new, holistic approach to threat detection that monitors, analyzes and cross-references data across multiple dimensions to help them detect complex threats as early as possible.To read this article in full or to leave a comment, please click here

Security analysis of popular IoT devices

Have you wondered if your internet-connected devices are infected with Mirai malware and were part of the DDoS attacks?In response to the recent IoT DDoS attacks, researchers at Zscaler analyzed IoT traffic patterns not only on the days of the DDoS attacks on Dyn and Krebs on Security, but going back to July.While Zscaler does not believe any of the devices connected to Zscaler Cloud had been compromised and used in the IoT botnet attacks, ThreatLabz researchers analyzed the security of five security cameras, three smart TV entertainment devices, three smart network printers and scanners, two DVRs and NVRs, two IP phones and a partridge in a pear tree. The last one of course was just to see if you were paying attention: no partridges were harmed in the course of this research.To read this article in full or to leave a comment, please click here

Security analysis of popular IoT devices

Have you wondered if your internet-connected devices are infected with Mirai malware and were part of the DDoS attacks?In response to the recent IoT DDoS attacks, researchers at Zscaler analyzed IoT traffic patterns not only on the days of the DDoS attacks on Dyn and Krebs on Security, but going back to July.While Zscaler does not believe any of the devices connected to Zscaler Cloud had been compromised and used in the IoT botnet attacks, ThreatLabz researchers analyzed the security of five security cameras, three smart TV entertainment devices, three smart network printers and scanners, two DVRs and NVRs, two IP phones and a partridge in a pear tree. The last one of course was just to see if you were paying attention: no partridges were harmed in the course of this research.To read this article in full or to leave a comment, please click here

IDG Contributor Network: What is the General Data Protection Regulation and why should you care?

In 2012, the European Commission proposed new regulations on data protection that would supersede the national laws of the 28 EU member states. It was formally approved in April this year, and it will go into effect May 25, 2018. This General Data Protection Regulation (GDPR) introduces several major changes that will impact many organizations worldwide. The smart move is to familiarize yourself with the incoming regulation now, and begin preparing to comply with your obligations. The GDPR will apply to any business that operates within the EU, but also any company that processes data from EU citizens. It doesn’t matter where the organization is located.To read this article in full or to leave a comment, please click here

IDG Contributor Network: What is the General Data Protection Regulation and why should you care?

In 2012, the European Commission proposed new regulations on data protection that would supersede the national laws of the 28 EU member states. It was formally approved in April this year, and it will go into effect May 25, 2018. This General Data Protection Regulation (GDPR) introduces several major changes that will impact many organizations worldwide. The smart move is to familiarize yourself with the incoming regulation now, and begin preparing to comply with your obligations. The GDPR will apply to any business that operates within the EU, but also any company that processes data from EU citizens. It doesn’t matter where the organization is located.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Is your network a platform for business innovation and growth?

The whole point of a network is just to connect stuff, right? Connect people to people, people to machines, and machines to machines. It’s pipes and plumbing, a necessary part of the business infrastructure and, hopefully, one that costs less and less over time. After all, it’s a cost center not a growth engine. At least, that’s the way it’s treated by most businesses these days.Most, but not all.+ Also on Network World: Accelerating business innovation: Don't let networks get in the way +To read this article in full or to leave a comment, please click here

IDG Contributor Network: Is your network a platform for business innovation and growth?

The whole point of a network is just to connect stuff, right? Connect people to people, people to machines, and machines to machines. It’s pipes and plumbing, a necessary part of the business infrastructure and, hopefully, one that costs less and less over time. After all, it’s a cost center not a growth engine. At least, that’s the way it’s treated by most businesses these days.Most, but not all.+ Also on Network World: Accelerating business innovation: Don't let networks get in the way +To read this article in full or to leave a comment, please click here

Healthcare, retail industries give blockchain a try

The U.S. Department of Health and Human Services hopes to put a new technology to use in its ongoing effort to improve the health and well-being of Americans. The technology in question isn't something one might expect to see in the healthcare IT toolkit; rather, it's blockchain, the technology that underpins cryptocurrency and has primarily been associated with bitcoin. HHS sees blockchain as a potential salve for ills that plague the increasingly complex world of digital health records.To read this article in full or to leave a comment, please click here(Insider Story)

How to Setup HA for RHV-M 4 pt1

Hi folks! After plowing through my home lab, I’m ready to walk you through setting up RHV-M in a “self-hosted engine” (HA) configuration. I’ve talked about this in some previous articles if you need to familiarize yourself with what the significance is or why someone might want to go with this approach over a standard deployment.

Let’s get to it.

Pre-Setup

Sounds funny, right? “Pre-setup”.. like you’re going to setup before you setup? But really, that’s what you need to do. In this case, everything needs to be right before you just dive right into the deep end of the lake, or you’re going to hit rocks. What I mean is that your underlying environment needs to be right, or things will not go smoothly at all.

Specifically, you’re going to need to pay attention to the requirements of the hosts and RHV-M software.. the specs are well published. For example, you need to have fully qualified domain names for all of your hosts and RHV-M, and they need to resolve (forward and reverse!) in some form of DNS. Just using “/etc/hosts” isn’t going to cut it here.. Don’t have running DNS in your lab, don’t sweat it, look Continue reading

Hottest Black Friday 2016 Windows PC, tablet and game deals

Big dealsWhile Windows phone deals are non-surprisingly almost non-existent for Black Friday 2016, there are plenty of Microsoft Windows desktops and laptops, Surface tablets and Xbox gaming deals being touted this holiday shopping season. Come Nov. 25, and even earlier for many retailers, here are some of the best deals around.To read this article in full or to leave a comment, please click here

HP’s power-packed Z2 Mini desktop takes on Apple’s aging Mac Mini

HP has been hoping that sleek, powerful hardware will lure Apple Mac aficionados to switch to its PCs, and now is aiming the new Z2 Mini mini-desktop at Mac Mini users.The Z2 Mini packs the computing power of a full-size desktop into a box that can be held in one hand. Starting at $699, it will be available worldwide starting in December.HP has been excelling in PC design, with innovative desktops like Pavilion Wave, a cylindrical desktop, and Elite Slice, a modular mini-desktop onto which components can be snapped.To read this article in full or to leave a comment, please click here