Why a security team embraces shadow IT

When you hear the phrase "getting ahead of shadow IT," it typically comes from a CIO who is implementing new technologies so that employs won’t take it upon themselves to purchase tools. But you don't expect such proactive practices from an enterprise's information security team, which a CIO often enlists to place a moat around corporate assets. Mike Bartholomy, Western Union's senior manager for information security Mike Bartholomy takes a different tack at Western Union. The financial services firm's senior manager for information security says that companies that try to block everything may see it backfire. "What we've seen happen in other organizations is that when you take something away that is a great enablement tool that may be moderately risky, you run the risk of pushing users towards something that is very risky," Bartholomy says.To read this article in full or to leave a comment, please click here

Why a security team embraces shadow IT

When you hear the phrase "getting ahead of shadow IT," it typically comes from a CIO who is implementing new technologies so that employs won’t take it upon themselves to purchase tools. But you don't expect such proactive practices from an enterprise's information security team, which a CIO often enlists to place a moat around corporate assets. Mike Bartholomy, Western Union's senior manager for information security Mike Bartholomy takes a different tack at Western Union. The financial services firm's senior manager for information security says that companies that try to block everything may see it backfire. "What we've seen happen in other organizations is that when you take something away that is a great enablement tool that may be moderately risky, you run the risk of pushing users towards something that is very risky," Bartholomy says.To read this article in full or to leave a comment, please click here

How IT can limit the risk of popular messaging apps

In the fight against shadow IT, CIOs have faced for more significant challenges than modern consumer messaging apps. And the popularity of apps such as WhatsApp, Facebook Messenger, iMessage and Google Hangouts has, in many cases, led to a more open IT approach to consumer communication tools in enterprise. When IT leaders let employees use their personal devices for work, it's a safe assumption that multiple consumer messaging apps will also come into play. The onus is on the CIO and the IT team to mitigate potential problems that could come from the careless use of such apps at work, according to Adam Preset, research director at Gartner. CIOs should realize consumer messaging apps can increase staff efficiency, but they should also try to empower workers to make choices that don't threaten their organizations, he says. To read this article in full or to leave a comment, please click here

Video: The real story behind the H-1B visa program

The vast majority of people who work in IT did everything right: They invested in their education, studied difficult subjects, kept their skills updated. They own homes, raise families and look to the future.But no job is safe, no future entirely secure -- something IT workers know more than most. Given their role, they are most often the change agents, the people who deploy technologies and bring in automation that can turn workplaces upside down. To survive, they count on being smart, self-reliant and one step ahead.Into that mix of dedication and hope comes the H-1B visa program. It allows a limited number of high-skilled foreign workers to work at U.S. companies. But over the years it has also become a way for companies to outsource jobs.To read this article in full or to leave a comment, please click here

Median IT wage is $10K higher for men than women

Men in IT earn a median of $82,370 a year compared to $72,035 for women, according to new data by the U.S. Census Bureau.The wage gap is perhaps is the most disquieting finding in a study of 2014 data by the Bureau, which also found that IT workers are younger than those in other occupations, more likely to have an advanced degree and more often work from home.Women comprise 25% of the IT workforce, which U.S. officials put at 4.6 million, a figure roughly in line with private estimates. In 1990, women constituted 31% of the IT workforce.To read this article in full or to leave a comment, please click here

NASA $1M contest intent on sending robots to Mars

NASA engineers want humanoid robots to help astronauts living and working on Mars to help build habitats, grow food and make potable water.The space agency on Tuesday opened registration for teams to compete for a $1 million prize purse in what it’s calling the Space Robotics Challenge.The contest is intended to encourage development of robots that are capable of working in the harsh environment of Mars and that have enough strength, precision and autonomy to be useful to human teammates.A qualifying round will run from mid-September to mid-November. Teams that make it through that initial round will then compete in the finals next June.To read this article in full or to leave a comment, please click here

Microsoft’s new plan to save Edge: reward points

Microsoft today made a play to boost usage of Edge with an awards program that gives users points for browsing with the Windows 10 application."Earn points for every hour of active browsing ... up to 30 hours a month," Microsoft announced on a promotional page.To qualify for points in the new program -- formerly Bing Rewards, rebranded as Microsoft Rewards -- Edge users must have the Bing search engine as the browser's default. Microsoft defined "active browsing" as meeting two conditions: Edge had to be the highlighted icon in the taskbar -- meaning it was the only app in focus on the desktop -- and the user had to be "engaged with the browser" via clicking, mouse movements or watching full-screen video.To read this article in full or to leave a comment, please click here

How Adobe uses machine learning to drive marketing success

Earlier this year, Adobe took the wraps off its new Adobe Marketing Cloud, touting new data science capabilities like Adobe Analytics' Segment IQ, which uses machine learning to help marketers gain deep insight into audience segments. On Wednesday, Adobe advanced Segment IQ another step with the release of Segment Comparison for Analysis Workspace.Segment Comparison for Analysis Workspace is the first in what Adobe promises will be a series of audience analysis and discovery tools within Segment IQ. It uses machine learning techniques to perform automated analysis on every metric and dimension to which you have access. Nate Smith, senior product marketing manager, Adobe Analytics, says this allows Segment Comparison to uncover the key characteristics of the audience segments that are driving your company's KPIs.To read this article in full or to leave a comment, please click here

Office, Outlook, Slack, Handoff: The digital workplace reborn

"Office productivity" has meant Microsoft Office and Outlook on a Windows PC for nearly two decades, and most of us take it for granted as part of the technological woodwork. New versions of Office and Outlook long ago outstripped the functionality 99.9 percent of us need, and except for jarring UI changes like the introduction of the Ribbon in 2007, we take new versions in stride.But the digital office has undergone a fundamental, positive change in the past few years, one that should cause a rethink by users and IT alike.[ Office 365 is now ready to deploy across all your clients. InfoWorld shows you: How to make document sharing really work in Office 365. • What works and what doesn't in Office 365 collaboration • What works in Outlook on Windows, MacOS, iOS, and Android. • How to migrate to Office 365. | Road map: The coming revolution of the lowly desk phone. ] The rebirth of Microsoft Office is (hopefully) only the start Five years ago, I would have said that Microsoft Office and Exchange were dying dinosaurs, given Microsoft's active development of crappy mobile versions and continued crippling of the MacOS versions.To read Continue reading

20 great new features in Android 7.0 Nougat

The latest changes to Google's ubiquitous mobile operating systemAndroid 7.0 Nougat is loaded with new features and refinements, each one improving upon the overall Android experience. Some changes, such as bundled notifications, are quite obvious. Then there are the less visible changes, such as a new multitasking shortcut. Follow along as we take a look at what’s new in Google’s latest mobile OS.To read this article in full or to leave a comment, please click here

Intel doubles down on 5G strategy

Intel is ramping up its efforts on 5G. The company has outlined three 5G focus areas – the industry partnerships, end-to-end 5G-related hardware and software development (such as Narrow Band IoT), and 5G standards-setting. The company’s next generation and standards organisation 5G business and technology general manager, Rob Topol, said 5G is set to change the way the company operates and how the market responds to connectivity. “We’re very excited about 5G as a company. We have started research and development on it at a very early stage so that we can build prototypes that demonstrate many different use cases. 5G is going to be something that will be a network change and a wireless change that will be much more than just about smartphones or other mobile devices.To read this article in full or to leave a comment, please click here

Intel doubles down on 5G strategy

Intel is ramping up its efforts on 5G. The company has outlined three 5G focus areas – the industry partnerships, end-to-end 5G-related hardware and software development (such as Narrow Band IoT), and 5G standards-setting. The company’s next generation and standards organisation 5G business and technology general manager, Rob Topol, said 5G is set to change the way the company operates and how the market responds to connectivity. “We’re very excited about 5G as a company. We have started research and development on it at a very early stage so that we can build prototypes that demonstrate many different use cases. 5G is going to be something that will be a network change and a wireless change that will be much more than just about smartphones or other mobile devices.To read this article in full or to leave a comment, please click here

IDG Contributor Network: 911 — How high are you?

Reaching 911 can mean the difference between life and death. But just connecting to the 911 center is only half the battle. Determining your location is the other half.Despite the cool technology we see on TV and in the movies, when you make a 911 call from a cell phone, in actuality you are the proverbial needle in the haystack—and that haystack is in a dark room, and 911 has no flashlight.+ Also on Network World: Why smartphones struggle with 911 +Each year in the U.S., citizens make about 240 million 911 calls, with an estimated 192 million of them originating from cellular phones. With 911 Public Safety Answer Points (PSAPs) reporting inadequate location on these calls, it is no surprise that this presents a unique problem for public safety officials. To read this article in full or to leave a comment, please click here

Free Webinar : Introduction to Mobile Broadband Technologies

You are invited to attend the one hour Technical Webinar “Introduction to Mobile Broadband Technologies”. The essential Mobile Broadband Concepts and principles are illustrated with the below Agenda 1- The Mobile Broadband Journey (2G,3G,4G,LTE,5G) 2- Meet the Packet Switched Core 3- Training Review This webinar is recommended to : Network Professionals who are interested to […]

The post Free Webinar : Introduction to Mobile Broadband Technologies appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Alleged NSA data dump contain hacking tools rarely seen

A stolen cache of files that may belong to the National Security Agency contains genuine hacking tools that not only work, but show a level of sophistication rarely seen, according to security researchers.That includes malware that can infect a device’s firmware and persist, even if the operating system is reinstalled.  “It's terrifying because it demonstrates a serious level of expertise and technical ability,” said Brendan Dolan-Gavitt, an assistant professor at New York University’s school of engineering.He’s been among the researchers going over the sample files from the cache, after an anonymous group called the Shadow Brokers posted them online.To read this article in full or to leave a comment, please click here