Microsoft cranks up encryption in .Net Framework

Microsoft has released .Net Framework 4.6.2, tightening security in multiple areas, including the BCL (Base Class Library). The new version also makes improvements to the SQL client, Windows Communication Foundation, the CLR (Common Language Runtime), and the ASP.Net web framework.The security focus in the BCL impacts PKI capabilities, and X.509 certificates now support the FIPS 186-3 digital signature algorithm. "This support enables X.509 certificates with keys that exceed 1024-bit," Microsoft's Stacey Haffner said. "It also enables computing signatures with the SHA-2 family of hash algorithms (SHA256, SHA384, and SHA512)."To read this article in full or to leave a comment, please click here

Microsoft cranks up encryption in .Net Framework

Microsoft has released .Net Framework 4.6.2, tightening security in multiple areas, including the BCL (Base Class Library). The new version also makes improvements to the SQL client, Windows Communication Foundation, the CLR (Common Language Runtime), and the ASP.Net web framework.The security focus in the BCL impacts PKI capabilities, and X.509 certificates now support the FIPS 186-3 digital signature algorithm. "This support enables X.509 certificates with keys that exceed 1024-bit," Microsoft's Stacey Haffner said. "It also enables computing signatures with the SHA-2 family of hash algorithms (SHA256, SHA384, and SHA512)."To read this article in full or to leave a comment, please click here

What’s in a security score?

Fair Isaac Corp., the company that issues credit scores for individuals, was tired of other analytics companies developing security scoring tools for businesses and then proclaiming themselves “the FICO of security scores.”So in May, FICO upped its own scoring game. It acquired cybersecurity firm QuadMetrics to create its own brand of enterprise security scores for enterprises. The new scoring tool, available in August, uses predictive analytics and security risk assessment tools to issue scores and predict a company’s likelihood of a significant breach compared to other firms within the next 12 months.“Our own cyber breach insurance underwriters commented how great it would be if there was really a FICO score on this for the underwriting process,” says Doug Clare, vice president of cybersecurity solutions. The company had already invested in cybersecurity detection technology that assesses network traffic, and it saw the addition of QuadMetrics as “the right opportunity at the right time,” he adds.To read this article in full or to leave a comment, please click here

What’s in a security score?

Fair Isaac Corp., the company that issues credit scores for individuals, was tired of other analytics companies developing security scoring tools for businesses and then proclaiming themselves “the FICO of security scores.”So in May, FICO upped its own scoring game. It acquired cybersecurity firm QuadMetrics to create its own brand of enterprise security scores for enterprises. The new scoring tool, available in August, uses predictive analytics and security risk assessment tools to issue scores and predict a company’s likelihood of a significant breach compared to other firms within the next 12 months.“Our own cyber breach insurance underwriters commented how great it would be if there was really a FICO score on this for the underwriting process,” says Doug Clare, vice president of cybersecurity solutions. The company had already invested in cybersecurity detection technology that assesses network traffic, and it saw the addition of QuadMetrics as “the right opportunity at the right time,” he adds.To read this article in full or to leave a comment, please click here

57% off Executive Office Solutions Portable Adjustable Laptop Desk/Stand/Table – Deal Alert

The Executive Office Solutions Portable Adjustable Laptop Desk/Stand/Table is designed to allow you to set up an office anywhere! It is easy to carry, with a light weight aluminum frame. This device makes a perfect desk for your laptop.  The adjustable legs allow you to rotate 360 degrees and lock it in place at various angles. This desk is also vented and connects to your computer via the  included USB cord to power two quiet CPU cooling fans.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Is outdated legislation holding back the gig economy?

We are in the midst of a dramatic shift in the way we work. In the new gig economy, some 40 percent of the American workforce consists of contingent workers: contract workers, part-time workers, independent contractors and those who freelance.The U.S. government doesn’t currently collect much data on the many American contingent workers, which means it can’t keep up with their needs. Recognizing this, the Department of Labor is introducing the Contingent Worker Supplement in its next population survey in 2017.To read this article in full or to leave a comment, please click here

Drones have potential for industrial sabotage

Industrial facilities should be on guard against drones. Even off-the-shelf versions of the unmanned aircraft could be used to disrupt sensitive systems. On Wednesday, Jeff Melrose, a presenter at Black Hat 2016, showed how consumer drones could do more than just conduct aerial spying. The flying machines can also carry a transmitter to hack into a wireless keyboard or interfere with industrial controls, he said. It’s not enough to place a fence around a building to keep intruders out, according to Melrose, who is a principal tech specialist at Yokogawa, an industrial controls provider. These days, some consumer drones can travel up to 3 miles (4.8 kilometers) or more.To read this article in full or to leave a comment, please click here

Drones have potential for industrial sabotage

Industrial facilities should be on guard against drones. Even off-the-shelf versions of the unmanned aircraft could be used to disrupt sensitive systems. On Wednesday, Jeff Melrose, a presenter at Black Hat 2016, showed how consumer drones could do more than just conduct aerial spying. The flying machines can also carry a transmitter to hack into a wireless keyboard or interfere with industrial controls, he said. It’s not enough to place a fence around a building to keep intruders out, according to Melrose, who is a principal tech specialist at Yokogawa, an industrial controls provider. These days, some consumer drones can travel up to 3 miles (4.8 kilometers) or more.To read this article in full or to leave a comment, please click here

Banner Health alerts 3.7M potential victims of hack of its computers

Banner Health, a provider of hospital services, has notified by mail 3.7 million people -- including patients, health plan members, healthcare providers and customers at its food and beverage outlets -- that their payment card and health plan data, among other information, may have been compromised.The provider said Wednesday that it discovered on July 7 that cyberattackers may have gained access to computers that process payment card data at the food and beverage outlets at some of its locations. Payment cards that were used at these outlets at certain Banner Health locations from June 23 to July 7 this year may have been affected, the provider said. Card payments for medical services were not affected, according to the investigation.To read this article in full or to leave a comment, please click here

Banner Health alerts 3.7M potential victims of hack of its computers

Banner Health, a provider of hospital services, has notified by mail 3.7 million people -- including patients, health plan members, healthcare providers and customers at its food and beverage outlets -- that their payment card and health plan data, among other information, may have been compromised.The provider said Wednesday that it discovered on July 7 that cyberattackers may have gained access to computers that process payment card data at the food and beverage outlets at some of its locations. Payment cards that were used at these outlets at certain Banner Health locations from June 23 to July 7 this year may have been affected, the provider said. Card payments for medical services were not affected, according to the investigation.To read this article in full or to leave a comment, please click here

Fun in the Lab: Setting up 3 Phones – Part 2 Licensing

When we left me at the end of  Fun in the Lab: Setting up 3 Phones – Part 1 Prep Work …. (1) I had cloned an already existing CUCM VM and (2) I was stuck on the CUCM Licensing portion.

Today’s Mission

Today’s Mission (should I choose to accept it) is to license my CUCM.

mission_topo_licensed_cucm

My mission will involve –

  • Learning how to get a license for a CUCM internally within Cisco for lab use
  • Cleaning up my CUCM VM since it was a cloned VM

I’m still hoping I will eventually come across some cookies.  Why?  Because all my UC friends keep telling me I should “check out the dark side (UC)” and that “they have cookies”.  Just in case they are telling you this.  I need to let you know I have found NONE so far and I think they aren’t telling the truth.


PLAY TIME!

The licensing error message that came up on the CUCM said 2 things

license

  1. “Install sufficient licenses in the Cisco Prime License Manager for this system”
  2. “If licenses for this system are not already being managed by a Cisco Prime License Manager server, the system must first be Continue reading

The (Second) Coming of Composable Systems

The concept of composable or disaggregated infrastructure is nothing new, but with approaching advances in technology on both the software and network sides (photonics in particular) an old idea might be infused with new life.

Several vendors have already taken a disaggregated architecture approach at the storage, network, and system level. Cisco Systems’ now defunct UCS M Series, for instance, is one example, and one can consider Hewlett Packard Enterprise’s The Machine as one contemporary example and its Project Synergy as two others; DriveScale, which we covered back in May, is possibly another. But thus far, none of

The (Second) Coming of Composable Systems was written by Nicole Hemsoth at The Next Platform.

Slideshow: Take a peek inside ‘Area 404,’ Facebook’s brand new hardware lab

Facebook's Silicon Valley headquartersImage by Martyn WilliamsFacebook used to design its servers and other hardware at labs scattered across the company, but they've now been consolidated in a state of the art facility at its Menlo Park, California, headquarters. The new lab is called Area 404, a play on the 404 error message seen on the web and, presumably, the U.S. military's Area 51 research base. It covers 22,000 square feet and has 50 workbenches where engineers design, build and test their protptype hardware.To read this article in full or to leave a comment, please click here