44% off Cable Matters USB-C to HDMI / VGA / Ethernet / USB Multiport 4K UHD Adapter (Thunderbolt 3 Port Compatible) – Deal Alert

The Cable Matters USB-C HDMI / VGA Multiport Adapter is an essential companion for a computer or tablet with USB-C. Connect to a Gigabit network, install a USB peripheral device, and connect a display with VGA or HDMI input. Plug & Play with a single USB-C port and no external drivers required.  Whether your device has a USB-C or Thunderbolt 3 port, you can use this adapter.To read this article in full or to leave a comment, please click here

Cisco well positioned to dominate cybersecurity market

The IT security market is certainly an interesting one, as it’s so big and so fragmented. Forbes posted a story at the end of last year stating the market is at $75 billion, with it expected to reach $170 billion by 2020. Every business and technology leader I talk to tells me how important security is, so I have no reason to doubt that $170 billion number.In addition to the overall massive size of the security market, another interesting fact is the huge number of vendors that play in it. I believe the 2016 RSA conference had something like over 600 sponsors, with at least 100 being first-time sponsors. No other IT market has that many vendors with start-ups consistently popping up.To read this article in full or to leave a comment, please click here

Cisco well positioned to dominate cybersecurity market

The IT security market is certainly an interesting one, as it’s so big and so fragmented. Forbes posted a story at the end of last year stating the market is at $75 billion, with it expected to reach $170 billion by 2020. Every business and technology leader I talk to tells me how important security is, so I have no reason to doubt that $170 billion number.In addition to the overall massive size of the security market, another interesting fact is the huge number of vendors that play in it. I believe the 2016 RSA conference had something like over 600 sponsors, with at least 100 being first-time sponsors. No other IT market has that many vendors with start-ups consistently popping up.To read this article in full or to leave a comment, please click here

New products of the week 8.22.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Fortscale 2.7Key features: Detecting insider credentials compromised on the Dark Web and remote lateral movement. Plus, new user experience that makes it easier for security professionals to identify and stop insider threats automatically. More info.To read this article in full or to leave a comment, please click here

New products of the week 8.22.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Fortscale 2.7Key features: Detecting insider credentials compromised on the Dark Web and remote lateral movement. Plus, new user experience that makes it easier for security professionals to identify and stop insider threats automatically. More info.To read this article in full or to leave a comment, please click here

Beware the ‘Windows Self-Healing Tool’ app

The Windows 10 Anniversary Update has caused its fair share of problems for users, such as freeze-ups of their PCs and the most recent issue of it crashing computers with a webcam attached. So, it's understandably tempting for some people to jump at a repair utility. In the case of the "Windows Self-Healing Tool," please don't. This utility has been circulating on several technology news sites, with people repeating its claim to fix problems associated with Windows 10. It has the air of authorization because it has a Microsoft logo on it and was first posted on the Microsoft Answers forum for Surface users.To read this article in full or to leave a comment, please click here

IDG Contributor Network: With the Ava IoT bracelet, getting pregnant becomes easier

Getting pregnant is much harder than movies would have you believe.In fact, women have only a 25 percent chance of getting pregnant every month. So, it’s no surprise that couples are keen to improve their odds. IoT makes it a little easier.Why it’s hard to get pregnant? There is just a 12- to 24-hour window each month when a human egg can be fertilized by a sperm. This fertile window occurs during the six days after ovulation while the egg passes down the fallopian tube. Pinpointing the exact time period, though, is hard because it varies from woman to woman. Sex has to take place within this fertile window to maximize the chances of becoming pregnant.To read this article in full or to leave a comment, please click here

42% off Dell UltraSharp U3415W 34-Inch Curved LED-Lit Monitor – Deal Alert

The Dell UltraSharp 34 inch Curved Monitor engages you in a new wrap-around viewing experience with a 21:9 ultra-wide curved screen that offers more display area and enhanced viewing comfort.  Easily display content from 2 different PCs at the same time with the Picture-by-Picture or Picture-in-Picture features, via the USB 3.0 upstream ports. Plus enjoy the convenience of using just one keyboard and mouse to navigate content from both PCs.To read this article in full or to leave a comment, please click here

The need for network security operations automation

According to ESG research, 63 percent of networking and cybersecurity professionals working at enterprise organizations (i.e. more than 1,000 employees) believe network security operations is more difficult today than it was two years ago. Why? Because enterprises have to deal with more connected devices, network traffic and applications than two years ago.What’s more 47 percent of respondents claim that it is difficult to monitor network behavior from end to end, while 41 percent say network security operations difficulties result from increasing use of cloud computing.+ Also on Network World: It’s time to pull the trigger on security automation +To read this article in full or to leave a comment, please click here

The Need for Network Security Operations Automation

According to ESG research, 63% of networking and cybersecurity professionals working at enterprise organizations (i.e. more than 1,000 employees) believe that network security operations is more difficult today than it was two years ago (note: I am an ESG employee).  Why?  Because enterprises have to deal with more connected devices, network traffic, and applications than two years ago.  What’s more 47% of respondents claim that it is difficult to monitor network behavior from end-to-end while 41% claim that network security operations difficulties result from increasing use of cloud computing.Yup, enterprise networks are a series of moving parts and these parts continue to move faster and faster all the time.  You just can’t keep up with the pace with limited cybersecurity and network operations personnel, and you certainly can’t keep up by managing network security operations on a box-by-box, CLI-by-CLI basis. To read this article in full or to leave a comment, please click here

IDG Contributor Network: Smartphones track you—without location services on

Smartphones can disclose locations through non-location sensors when combined with algorithms and iffy apps, researchers say. And the device doesn’t need to have traditional location services such as GPS and network positioning turned on, or even ask your permission.The scientists from Northeastern University documented a number of roads and then drove real and simulated routes on them. They found that the phones in use knew where they were, without using the GPS or the other radios traditionally used for location reporting.“Changing positions, including the angles of turns and the trajectory of curves” derived from sensors, which include the accelerometer, were enough to provide data that gave locations away sometimes, the scientists from Northeastern University claim.To read this article in full or to leave a comment, please click here

High technology: How IT is fueling the budding cannabis industry

The cannabis industry is growing up, and it would be tough to imagine more convincing proof than Microsoft's recent announcement that it's getting involved.Though the software giant will stay very much in the background -- its role will focus primarily on providing Azure cloud services for a compliance-focused software push -- the move is still widely viewed as a telling sign."Having them come out and say, 'we're willing to have our name in the same sentence as the word cannabis,' adds to the legitimacy of our industry," said Kyle Sherman, cofounder and CEO of software maker Flowhub.To read this article in full or to leave a comment, please click here

Windows 10 Anniversary Update broke millions of webcams

If your webcam is freezing after about a minute when using Skype or another app, then you can thank Microsoft.The Redmond giant meant to allow multiple apps to access the camera at the same time, but it didn’t want users to suffer poor performance as those apps concurrently accessed the webcam and the MJPEG or H264 encoding processes. So, Microsoft decided the best plan was to stop USB webcams from using MJPEG or H264 and instead to only support webcams that use YUY2 encoding.To read this article in full or to leave a comment, please click here

Windows 10 Anniversary Update broke millions of webcams

If your webcam is freezing after about a minute when using Skype, or another app, then you can thank Microsoft.The Redmond giant meant to allow multiple apps to access the camera at the same time, but didn’t want users to suffer poor performance as those apps concurrently accessed the webcam and the MJPEG or H264 encoding processes. So Microsoft decided the best plan was to stop USB webcams from using MJPEG or H264 and instead to only support webcams that use YUY2 encoding.To read this article in full or to leave a comment, please click here