How to go on the offensive vs security foes

Focus to detectionImage by Christer van der MeerenThe industry is now moving from a focus on prevention, in which organizations try to make the perimeter impenetrable and avoid being hacked, to a focus on rapid detection, where companies can quickly identify and mitigate threats that are within the perimeter already.To read this article in full or to leave a comment, please click here

How to go on the offensive vs security foes

Focus to detectionImage by Christer van der MeerenThe industry is now moving from a focus on prevention, in which organizations try to make the perimeter impenetrable and avoid being hacked, to a focus on rapid detection, where companies can quickly identify and mitigate threats that are within the perimeter already.To read this article in full or to leave a comment, please click here

How to train new grads on corporate security

Millennials bring a lot to the workplace, whether they're pushing the boundaries of company culture or forcing companies to modernize. But there are a few risks associated with hiring recent grads -- especially if it's their first job in the industry -- and one of those risks is data security.To read this article in full or to leave a comment, please click here(Insider Story)

How to train new grads on corporate security

Millennials bring a lot to the workplace, whether they're pushing the boundaries of company culture or forcing companies to modernize. But there are a few risks associated with hiring recent grads -- especially if it's their first job in the industry -- and one of those risks is data security.In a recent study from the Ponemon Institute in partnership with Experian, which surveyed over 16,000 people at companies with data protection and privacy training programs, 66 percent of respondents cited employees as the biggest security threat to their company. And 55 percent said that their organization had, at some point, experienced a "security incident or data breach due to a malicious or negligent employee," according to the report.To read this article in full or to leave a comment, please click here(Insider Story)

How to make your phone look and work more like stock Android

Nexus phones are typically thought of as the ultimate form of Android greatness. They deliver timely updates straight from Google, are bloatware free, and get special perks like access to beta releases of Android.But there are many good reasons why you may want to go for something other than a Nexus phone. The Nexus 6P is an unwieldy beast unless you have sizable paws. The 5X is too plasticky and underpowered—it's affordable, but you sort of get what you pay for.+ ALSO ON NETWORK WORLD The 14 most influential smartphones ever +To read this article in full or to leave a comment, please click here

IBM beta-tests secure cloud blockchain service

IBM is cranking up the security on its cloud-based blockchain service. On Thursday it began beta-testing a new high-security service plan for IBM Blockchain, with dedicated infrastructure for each customer. Until now, it has offered only a starter cloud service for developers who wish to experiment with blockchain technology. That service runs in a multitenant cloud, with infrastructure shared among hundreds of blockchains. The new service plan is still cloud-based, but "you get your own resources dedicated to you," said IBM Vice President for Blockchain Technologies Jerry Cuomo.To read this article in full or to leave a comment, please click here

IBM beta-tests secure cloud blockchain service

IBM is cranking up the security on its cloud-based blockchain service. On Thursday it began beta-testing a new high-security service plan for IBM Blockchain, with dedicated infrastructure for each customer. Until now, it has offered only a starter cloud service for developers who wish to experiment with blockchain technology. That service runs in a multitenant cloud, with infrastructure shared among hundreds of blockchains. The new service plan is still cloud-based, but "you get your own resources dedicated to you," said IBM Vice President for Blockchain Technologies Jerry Cuomo.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Attention spans in apps decrease signific…

Similar-looking ecommerce and media-oriented apps, like Facebook, are causing consumers to donate the same amount of attention to both kinds of apps. And that’s not very much, says Jampp, an ad placement network.So much so, that the firm says there’s been an 88 percent reduction in ecommerce app attention span year over year, based on the first quarter of 2016. Session length for ecommerce apps is down 35 percent.+ Also on Network World: Ecommerce needs to up its game, says UPS +To read this article in full or to leave a comment, please click here

OpenFlow and Firewalls Don’t Mix Well

In one of my ExpertExpress engagements the customer expressed the desire to manage their firewall with OpenFlow (using OpenDaylight) and I said, “That doesn’t make much sense”. Here’s why:

Obviously if you can't imagine your life without OpenDaylight, or if your yearly objectives include "deploying OpenDaylight-based SDN solution", you can use it as a REST-to-NETCONF translator assuming your firewall supports NETCONF.

Read more ...

DockerCon 2016 Organizer Summit recap

A huge part of Docker’s success can be attributed to the hard work and dedication of the 400+ Docker meetup organizers in 73 countries who collectively support a global community of over 115,000 members. Local Docker meetups help keep the community engaged and updated on all things Docker. With over 250 groups and counting, we are continuously humbled by the dedication and time these individuals take to organize events and all that they do for their local communities. Continue reading

A surge of Pokemon Go-related apps is out to steal your data

Privacy fears about the Pokemon Go app have been largely addressed, but dozens of other apps that piggy back on the popular game have raised further concerns.Since the game launched last week, a swarm of unofficial apps has emerged and is trying to capitalize on the title’s success. And many are hungry for your personal data.These unofficial apps have been offering cheats, tips and even songs from the hit game. But in exchange, they demand permission to access sensitive data on your phone, said Chad Salisbury, a security engineer with RiskIQ, which monitors mobile malware.To read this article in full or to leave a comment, please click here

A surge of Pokemon Go-related apps is out to steal your data

Privacy fears about the Pokemon Go app have been largely addressed, but dozens of other apps that piggy back on the popular game have raised further concerns.Since the game launched last week, a swarm of unofficial apps has emerged and is trying to capitalize on the title’s success. And many are hungry for your personal data.These unofficial apps have been offering cheats, tips and even songs from the hit game. But in exchange, they demand permission to access sensitive data on your phone, said Chad Salisbury, a security engineer with RiskIQ, which monitors mobile malware.To read this article in full or to leave a comment, please click here

BRKRST-2042 – Highly Available Wide Area Network Design

Presented by: David Prall, Communications Architect, Cisco

For reference, David is the “father of IWAN”.

This session was not what I was expecting. I was expecting design and architecture, but it was all about features in IOS and IOS-XE (eg, FHRPs, talked about routing protocol timers, PfRv3, BFD). I guess I need to pay more attention to the session code (RST == routing; ARC == architecture).

Original article: BRKRST-2042 – Highly Available Wide Area Network Design

Copyright © 2016 Joel Knight . All Rights Reserved.

IBM and AT&T are cozying up to IoT developers

Big IoT partnerships are coming thick and fast these days. A deal between IBM and AT&T to help developers turn IoT ideas into reality is just the latest tie-up involving major enterprise vendors in this field.The partnership will combine AT&T’s connectivity with IBM’s Watson and Bluemix analytics platforms. Through APIs (application programming interfaces) and development environments, plus open-source tools, the two companies say they’ll make life easier for developers.IoT involves so many parts that it’s almost inevitable enterprises will be working with several vendors to get their infrastructure up and running. Devices that collect data, clouds that analyze it, and networks that link the two are just the main components of systems that can rival the complexity of anything in IT.To read this article in full or to leave a comment, please click here