Cisco, IBM may be interested in buying Imperva

Security vendor Imperva is shopping itself around and may be attractive to the likes of Cisco and IBM, according to Bloomberg.The Motley Fool reports that Imperva’s stock rose 20% today after Bloomberg’s report, which the Fool notes could actually drive buyers away because it would mean a more costly deal.Bloomberg named a number of other possible buyers including Forecpoint (owned by Raytheon and Vista Equity Partners), Akamai and Fortinet.To read this article in full or to leave a comment, please click here

Best Deals of the Week, September 19th – September 23rd – Deal Alert

Best Deals of the Week, September 19th - September 23rd - Deal AlertCheck out this roundup of the best deals on gadgets, gear and other cool stuff we have found this week, the week of September 19th. All items are highly rated, and dramatically discounted!1 Free Amazon Echo Dot When You Buy 5Echo Dot is a hands-free, voice-controlled device that uses Alexa to play & control music (either on its own, or through a connected speaker/receiver), control smart home devices, provide information, read the news, set alarms, and more. If you’re looking to buy them as gifts, or for different homes or rooms, Amazon will throw in a free one ($50 value) when you buy 5, or two free ones when you buy 10 (a $100 value). To take advantage of this limited time offer, select 6 or 12 in the quantity dropdown and add to your Shopping Cart. Enter promo code DOT6PACK or DOT12PACK at checkout where you will see the discount applied. The new Amazon Echo Dot comes in black, and now also white.  See the new Amazon Echo Dot now on Amazon.To read this article in full or to leave a comment, please click here

Announcing the new Docs Repo on GitHub!

By John Mulhausen

The documentation team at Docker is excited to announce that we are consolidating all of our documentation into a single GitHub Pages-based repository on GitHub.

When is this happening?

  • The new repo is public now at https://github.com/docker/docker.github.io.
  • During the week of Monday, September 26th, any existing docs PRs need to be migrated over or merged.
  • We’ll do one last “pull” from the various docs repos on Wednesday, September 28th, at which time the docs/ folders in the various repos will be emptied.
  • Between the 28th and full cutover, the docs team will be testing the new repo and making sure all is well across every page.
  • Full cutover (production is drawing from the new repo, new docs work is pointed at the new repo, dissolution of old docs/ folders) is complete on Monday, October 3rd.

The problem with the status quo

  • Up to now, the docs have been all inside the various project repos, inside folders named “docs/” — and to see the docs running on your local machine was a pain.
  • The docs were built around Hugo, which is not natively supported by GitHub, and took minutes to build, and even longer for us Continue reading

Global Forum sharpens focus on smart cities

Eindhoven, Netherlands -- The 25th Global Forum, an annual policy and strategy conference sometimes called “the Davos of ICT,” was held this week in Eindhoven, a smart city and technology hub with a rich industrial past.Eindhoven was the original home and de facto company town of Philips Electronics, one of the world’s leading technology giants. Then, under pressure from Asian and global competitors, Philips began a long process of exiting its historic lines of business.Eindhoven suffered an economic and psychological blow when in 1997 the company moved its headquarters to Amsterdam.The resulting economic and social disruption challenged Eindhoven to reinvent itself. The community focused on research and innovation (R&I), and built upon its Philips legacy to become the industrial design center of its country and the European region.To read this article in full or to leave a comment, please click here

The next target for phishing and fraud: ChatOps

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.Enterprise chat applications have surged in popularity, driven in large part by Slack, which now claims to serve more than three million users daily.  What’s more, the popularity of these apps has given rise to a new phenomenon known as ChatOps, which is what happens when these new messaging systems are used to automate operational tasks. The ChatOps term was coined by GitHub to describe a collaboration model that connects people, tools, processes and automation into a transparent workflow.  According to Sean Regan, Atlassian’s Head of Product Marketing for HipChat, this flow connects the work needed, the work happening and the work done in a consistent location staffed by people, bots and related tools.  Its transparent nature hastens the feedback loop, facilitates information sharing, and enhances team collaboration, but also ushers in a new set of challenges for securityand risk professionals.To read this article in full or to leave a comment, please click here

The next target for phishing and fraud: ChatOps

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.Enterprise chat applications have surged in popularity, driven in large part by Slack, which now claims to serve more than three million users daily.  What’s more, the popularity of these apps has given rise to a new phenomenon known as ChatOps, which is what happens when these new messaging systems are used to automate operational tasks. The ChatOps term was coined by GitHub to describe a collaboration model that connects people, tools, processes and automation into a transparent workflow.  According to Sean Regan, Atlassian’s Head of Product Marketing for HipChat, this flow connects the work needed, the work happening and the work done in a consistent location staffed by people, bots and related tools.  Its transparent nature hastens the feedback loop, facilitates information sharing, and enhances team collaboration, but also ushers in a new set of challenges for securityand risk professionals.To read this article in full or to leave a comment, please click here

The next target for phishing and fraud: ChatOps

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Enterprise chat applications have surged in popularity, driven in large part by Slack, which now claims to serve more than three million users daily.  What’s more, the popularity of these apps has given rise to a new phenomenon known as ChatOps, which is what happens when these new messaging systems are used to automate operational tasks. 

The ChatOps term was coined by GitHub to describe a collaboration model that connects people, tools, processes and automation into a transparent workflow.  According to Sean Regan, Atlassian’s Head of Product Marketing for HipChat, this flow connects the work needed, the work happening and the work done in a consistent location staffed by people, bots and related tools.  Its transparent nature hastens the feedback loop, facilitates information sharing, and enhances team collaboration, but also ushers in a new set of challenges for securityand risk professionals.

To read this article in full or to leave a comment, please click here

If you’re not planning for IoT, you’re already behind

Roughly half of the audience informally polled at last month’s CIO 100 event said they had attended an IoT event in the last 12 months. "So what were the other half [of you] doing on the most hyped word on the internet today?" asked Vernon Turner, senior vice president of enterprise systems & fellow for the internet of things at IDC.To read this article in full or to leave a comment, please click here(Insider Story)

Dollar Shave Club grooming AWS cloud services for smoother growth

If you asked a CIO to sketch the ideal modern IT architecture on a few cocktail napkins, it might resemble the system fashioned by of the Dollar Shave Club (DSC), the men's grooming ecommerce company that ascended from relative obscurity to prominence thanks to sound branding and this memorable YouTube clip.Running in a public cloud, the startup uses 22 custom applications to run sales and marketing campaigns and customer service, as well as a recommendation engine. The custom-cloud combination embodies the type of IT environment CIOs say they would build if they had a green field devoid of legacy architecture and technical debt.To read this article in full or to leave a comment, please click here

Court ruling puts future of H-1B lottery in doubt

The U.S. government's attempt to stop a lawsuit challenging the legality of the H-1B lottery was rejected Thursday by a federal court judge.The government tried to get this case dismissed on legal technicalities but failed. U.S. District Court Judge Michael Simon, in Oregon, denied the government's dismissal motion in a 24-page ruling.This case may now be decided quickly. The plaintiffs are seeking a summary judgment with oral arguments schedule in December. If the summary judgment is granted, the lottery could end -- the plaintiffs hope -- as early as next year.The case was brought by Tenrec Inc., a web development firm, and Walker Macy LLC, a landscape architecture, urban design and planning firm. Both firms filed petitions to hire a person who needed an H-1B visa, but lost the lottery.To read this article in full or to leave a comment, please click here

NY regulation aims to raise bank security standards

Next week, New York State will begin a 45-day public comment period on its new financial industry cybersecurity regulation -- and, so far, security experts have a favorable view of the proposal.Under the new regulations, banks and insurance companies doing business in New York State will need to establish a cybersecurity program, appoint a Chief Information Security Officer and monitor the cybersecurity policies of their business partners.According to New York Gov. Andrew Cuomo, this is the first such regulation in the country. "This regulation helps guarantee the financial services industry upholds its obligation to protect consumers and ensure that its systems are sufficiently constructed to prevent cyber-attacks to the fullest extent possible," he said in a statement.To read this article in full or to leave a comment, please click here

NY regulation aims to raise bank security standards

Next week, New York State will begin a 45-day public comment period on its new financial industry cybersecurity regulation -- and, so far, security experts have a favorable view of the proposal.Under the new regulations, banks and insurance companies doing business in New York State will need to establish a cybersecurity program, appoint a Chief Information Security Officer and monitor the cybersecurity policies of their business partners.According to New York Gov. Andrew Cuomo, this is the first such regulation in the country. "This regulation helps guarantee the financial services industry upholds its obligation to protect consumers and ensure that its systems are sufficiently constructed to prevent cyber-attacks to the fullest extent possible," he said in a statement.To read this article in full or to leave a comment, please click here

Largest DDoS attack ever delivered by botnet of hijacked IoT devices

Securing the internet of things should become a major priority now that an army of compromised devices – perhaps 1 million strong - has swamped one of the industry’s top distributed denial-of-service protection services.A giant botnet made up of hijacked internet-connected things like cameras, lightbulbs, and thermostats has launched the largest DDoS attack ever against a top security blogger, an attack so big Akamai had to cancel his account because defending it ate up too many resources.It wasn’t that Akamai couldn’t mitigate the attack – it did so for three days – but doing so became too costly, so the company made a business decision to cut the affected customer loose, says Andy Ellis the company’s chief security officer.To read this article in full or to leave a comment, please click here

Largest DDoS attack ever delivered by botnet of hijacked IoT devices

Securing the internet of things should become a major priority now that an army of compromised devices – perhaps 1 million strong - has swamped one of the industry’s top distributed denial-of-service protection services.A giant botnet made up of hijacked internet-connected things like cameras, lightbulbs, and thermostats has launched the largest DDoS attack ever against a top security blogger, an attack so big Akamai had to cancel his account because defending it ate up too many resources.It wasn’t that Akamai couldn’t mitigate the attack – it did so for three days – but doing so became too costly, so the company made a business decision to cut the affected customer loose, says Andy Ellis the company’s chief security officer.To read this article in full or to leave a comment, please click here

Here’s what you should know, and do, about the Yahoo breach

Yahoo's announcement that state-sponsored hackers have stolen the details of at least 500 million accounts shocks both through scale -- it's the largest data breach ever -- and the potential security implications for users.That's because Yahoo, unlike MySpace, LinkedIn and other online services that suffered large breaches in recent years, is an email provider; and email accounts are central to users' online lives. Not only are email addresses used for private communications, but they serve as recovery points and log-in credentials for accounts on many other websites.To read this article in full or to leave a comment, please click here

Here’s what you should know, and do, about the Yahoo breach

Yahoo's announcement that state-sponsored hackers have stolen the details of at least 500 million accounts shocks both through scale -- it's the largest data breach ever -- and the potential security implications for users.That's because Yahoo, unlike MySpace, LinkedIn and other online services that suffered large breaches in recent years, is an email provider; and email accounts are central to users' online lives. Not only are email addresses used for private communications, but they serve as recovery points and log-in credentials for accounts on many other websites.To read this article in full or to leave a comment, please click here