Expanding our Wave 2 Portfolio: Making Networks Efficient For All Devices

Any technology company today will likely tell you we are in the midst of a massive digital transformation, and in order to keep up, businesses across the globe need things to be done faster than ever before. Whether it’s making decisions, getting a new product to market or serving customers, the need for speed is vital to succeed in today’s innovation climate. This is especially true for wireless networks.

Introducing Image Signing Policy in Docker Datacenter

My colleague colleague Ying Li and I recently blogged about Securing the Software Supply Chain and drew the analogy between traditional physical supply chains and the creation, building, and deployment involved in a software supply chain. We believe that a software pipeline that can be verified at every stage is an important step in raising the security bar for all software, and we didn’t stop at simply presenting the idea.

Software Supply Chain

Integrated Content Trust and Image Signing Policy

In the recent release of Docker Datacenter,  we announced a new feature that starts to brings these security capabilities together along the software supply chain. Built on Notary, a signing infrastructure based on The Update Framework (TUF), along with Docker Content Trust (DCT), an integration of the Notary toolchain into the Docker client, DDC now allows administrators to set up signing policies that prevent untrusted content from being deployed.

In this release of DDC, the Docker Trusted Registry (DTR) now also ships with integrated Notary services. This means you’re ready to start using DCT and the new Signing Policy features out of the box! No separate server and database to install, configure and connect to the registry.

DTR replicas

Bringing it all together

Image Continue reading

Best Apple Watch deals for Black Friday 2016

With the market for smartwatches plunging this year, you'd better believe that Black Friday 2016 deals can be found on Apple Watches.Apple holds the biggest share of the market, according to IDC figures released in October, but even Apple sold far fewer of its touchscreen watches in Q3 (1.1 million vs. 3.9 million in Q3 2015).MORE: Best Black Friday 2016 deals on Apple iPhones, iPads & moreApple itself hasn't disclosed Black Friday deals yet -- it usually waits until right before Thanksgiving to do so -- but other retailers have.  The company lists watches on its site ranging in price from $269 to $1,500 (Stainless steel case with Etoupe swift leather double buckle cuff).To read this article in full or to leave a comment, please click here

Goodbye, NAC. Hello, software-defined perimeter

Those of us who’ve been around security technology for a while will remember the prodigious rise of network access control (NAC) around 2006. Now, the ideas around NAC had been around for several years beforehand, but 2006 gave us Cisco’s network admission control (aka Cisco NAC), Microsoft’s network access protection (NAP) and then a whole bunch of venture-backed NAC startups (ConSentry, Lockdown Networks, Mirage Networks, etc.).There were lots of reasons why the industry was gaga over NAC at the time, but it really came down to two major factors: Broad adoption of WLANs. In 2006, wireless networking based upon 802.11 was transforming from a novelty to the preferred technology for network access.  I also believe laptop sales first overtook desktop computer sales around this same timeframe, so mobility was becoming an IT staple as well. Many organizations wanted a combination of NAC and 802.1X so they could implement access policies and monitor who was accessing the network. A wave of internet worms. The early 2000s produced a steady progression of internet worms, including Code Red (2001), Nimda (2001), SQL Slammer (2003), Blaster (2003), Bagel (2004), Sasser (2004), Zotob (2005), etc. These worms could easily spread Continue reading

Goodbye NAC, Hello Software-defined Perimeter (SDP)

Those of us who’ve been around security technology for a while will remember the prodigious rise of network access control (NAC) around 2006.  Now the ideas around NAC had been around for several years beforehand, but 2006 gave us Cisco’s network admission control (aka Cisco NAC), Microsoft’s network access protection (NAP), and then a whole bunch of venture-backed NAC startups (ConSentry, Lockdown Networks, Mirage Networks, etc.).There were lots of reasons why the industry was gaga over NAC at the time, but it really came down to two major factors:1.      Broad adoption of WLANs.  In 2006, wireless networking based upon 802.11 was transforming from a novelty to the preferred technology for network access.  I also believe that laptop sales first overtook desktop computer sales around this same timeframe so mobility was becoming an IT staple as well.  Many organizations wanted a combination of NAC and 802.1X so they could implement access policies and monitor who was accessing the network.To read this article in full or to leave a comment, please click here

Goodbye NAC, Hello Software-defined Perimeter (SDP)

Those of us who’ve been around security technology for a while will remember the prodigious rise of network access control (NAC) around 2006.  Now the ideas around NAC had been around for several years beforehand, but 2006 gave us Cisco’s network admission control (aka Cisco NAC), Microsoft’s network access protection (NAP), and then a whole bunch of venture-backed NAC startups (ConSentry, Lockdown Networks, Mirage Networks, etc.).There were lots of reasons why the industry was gaga over NAC at the time, but it really came down to two major factors:1.      Broad adoption of WLANs.  In 2006, wireless networking based upon 802.11 was transforming from a novelty to the preferred technology for network access.  I also believe that laptop sales first overtook desktop computer sales around this same timeframe so mobility was becoming an IT staple as well.  Many organizations wanted a combination of NAC and 802.1X so they could implement access policies and monitor who was accessing the network.To read this article in full or to leave a comment, please click here

Half of banking customers now using fintech

Financial technology (fintech) products and services are picking up tremendous steam, particularly with younger, tech-savvy and affluent customers, according to the World FinTech Report 2017 (WFTR), recently released by Capgemini, LinkedIn and Efma (a global nonprofit organization composed of banks and insurance companies). But even as fintech firms reshape the financial services landscape, customers are struggling to trust them."We're seeing adoption across the globe," says Bill Sullivan, head of Global Financial Services Market Intelligence at Capgemini Financial Services. "It's not so much replacing incumbents as adding on."[ Related: How 3 fintech startups are shaking up security ]To read this article in full or to leave a comment, please click here

Half of banking customers now using fintech

Financial technology (fintech) products and services are picking up tremendous steam, particularly with younger, tech-savvy and affluent customers, according to the World FinTech Report 2017 (WFTR), recently released by Capgemini, LinkedIn and Efma (a global nonprofit organization composed of banks and insurance companies). But even as fintech firms reshape the financial services landscape, customers are struggling to trust them."We're seeing adoption across the globe," says Bill Sullivan, head of Global Financial Services Market Intelligence at Capgemini Financial Services. "It's not so much replacing incumbents as adding on."[ Related: How 3 fintech startups are shaking up security ]To read this article in full or to leave a comment, please click here

GE Digital is taking Predix out to the edge of IoT

Along with freedom and cost savings, cloud computing brings complexity. Dividing up data and processes between private data centers and the cloud can be complicated.It’s even more true with the internet of things, which usually includes specialized remote devices and layers of gateways. On Tuesday at its Minds + Machines conference, GE Digital introduced a system for enterprises to spread out IoT tasks to be more effective.The new set of capabilities, called Predix Edge System, turns the company’s cloud-based Predix IoT platform into a distributed operating system. With it, organizations can place each of their IoT applications wherever it will run most effectively, including in sensors, controllers, gateways or the cloud.To read this article in full or to leave a comment, please click here

GE is on an IoT buying spree

It turns out GE Digital’s acquisition of ServiceMax on Monday and its Meridium buy in September weren't the company's only recent moves to expand its industrial IoT expertise.Two deals for small startups, completed recently and announced on Tuesday, add interesting technologies that should help the company develop new capabilities and help enterprises meet challenges in industrial IoT. Both were announced at GE Digital’s Minds + Machines conference in San Francisco and didn’t come with publicly announced price tags.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Coping with IoT data overload? Try 3D visualization

Could you captain a supertanker—a ship longer than five football fields and 16 stories tall?In addition to navigation, you would have to stay abreast of  thousands of sensor readings from across the ship that monitor spills, explosions and fires. You may need some help to cope with the data overload.You'd need a captain’s console with 3D IoT visualization.Essential components of an IoT data solution It’s difficult to process the enormous volume of data generated by IoT systems. Monitoring multiple real-time data feeds adds to the complexity. Automated data filtering helps. How can human intelligence be applied to very large, complex datasets?To read this article in full or to leave a comment, please click here

27% off All-New Echo Dot and WeMo Smart Plug Bundle – Deal Alert

Right now if you buy a WeMo Smart Plug along with an all new Echo Dot, you'll save 27% and get them both for $73 versus buying them separately for $100. Simply plug WeMo into any standard outlet, and control your appliances from anywhere in the world using your smartphone. Program on/off times for your lights, A/C or a fan. Put it in "away mode" while you're on vacation and it will randomly turn on/off throughout the day to mimic someone in the home and confuse would-be intruders. You'll think of a hundred ways to automate with this device. Pair WeMo with an all new Echo Dot and gain the power of voice control over your appliances, not to mention streaming music, weather updates, sports scores -- anything you can think of, just ask and Alexa will help via the Echo Dot.  The Dot/Plug bundle will save you 27% when bought together on Amazon right now. To read this article in full or to leave a comment, please click here

27% off All-New Echo Dot and WeMo Smart Plug Bundle – Deal Alert

Right now if you buy a WeMo Smart Plug along with an all new Echo Dot, you'll save 27% and get them both for $73 versus buying them separately for $100. Simply plug WeMo into any standard outlet, and control your appliances from anywhere in the world using your smartphone. Program on/off times for your lights, A/C or a fan. Put it in "away mode" while you're on vacation and it will randomly turn on/off throughout the day to mimic someone in the home and confuse would-be intruders. You'll think of a hundred ways to automate with this device. Pair WeMo with an all new Echo Dot and gain the power of voice control over your appliances, not to mention streaming music, weather updates, sports scores -- anything you can think of, just ask and Alexa will help via the Echo Dot.  The Dot/Plug bundle will save you 27% when bought together on Amazon right now. To read this article in full or to leave a comment, please click here

Android deems Instagram worthy of its presence

With Instagram now claiming 300 million-plus daily active users, Google has decided the photo-sharing social network must be for real and has launched an Android account.So far the account is pretty unexciting, with a handful of marketing images depicting uses of Android (Pixel phones and tablets, Android Pay and Android Auto, etc.) for various applications, such as in cars and for payments. Also, lots of treats, such as jelly beans and lollipops, referring to the various flavors of the mobile operating.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Synack delivers crowdsourced security for government, snags IRS contract

Government departments tend to be seen as “top shelf” IT customers. They tend to use larger providers, use more traditional delivery mechanisms and have a conservative approach towards newer ways of working. So, when Synack, a crowdsourced cybersecurity vendor, told me it secured a contract with the IRS, I was intrigued.+ Also on Network World: How the government can help businesses fight cyber attacks + First, a little bit about what Synack does: The company is following something of an ongoing trend in the security space in that it wrangles a bunch of “ethical hackers” to essentially try and break a client's IT systems. The idea being that those hackers can ply their trade, but instead of intruding onto organizations' IT systems out of malice, they can do so as a service (and, it must be added, for a payment). Founded in 2013 by former NSA security experts Jay Kaplan, CEO, and Dr. Mark Kuhr, CTO, Synack feels very similar to HackerOne, a company now headed by Marten Mickos of MySQL fame.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Synack delivers crowdsourced security for government, snags IRS contract

Government departments tend to be seen as “top shelf” IT customers. They tend to use larger providers, use more traditional delivery mechanisms and have a conservative approach towards newer ways of working. So, when Synack, a crowdsourced cybersecurity vendor, told me it secured a contract with the IRS, I was intrigued.+ Also on Network World: How the government can help businesses fight cyber attacks + First, a little bit about what Synack does: The company is following something of an ongoing trend in the security space in that it wrangles a bunch of “ethical hackers” to essentially try and break a client's IT systems. The idea being that those hackers can ply their trade, but instead of intruding onto organizations' IT systems out of malice, they can do so as a service (and, it must be added, for a payment). Founded in 2013 by former NSA security experts Jay Kaplan, CEO, and Dr. Mark Kuhr, CTO, Synack feels very similar to HackerOne, a company now headed by Marten Mickos of MySQL fame.To read this article in full or to leave a comment, please click here

42% off Vacu Vin Wine Saver Pump with 2 x Vacuum Bottle Stoppers – Deal Alert

The Wine Saver is a vacuum pump that extracts the air from an opened wine bottle and re-seals it using a rubber stopper. The airtight vacuum inhibits the oxidation process that is responsible for the deterioration of wine. The vacuum is created by placing a stopper into the neck of the opened bottle and pumping it until resistance is detectable. The pump incorporates a patented 'click' mechanism that indicates when a sufficient airtight environment has been established. Currently averages 4.5 out of 5 stars from over 1,900 people (read reviews). It's discounted 42% on Amazon, so you can get it right now for just $9. To read this article in full or to leave a comment, please click here