Why legal departments begrudge the cloud

Legal professionals are by their nature a skeptical and cautious lot, but the sharp rise in cloud-based applications being used by enterprises and law firms, as well as recent high-profile law firm security breaches, has many legal professionals reticent about entering cloud engagements.“The buck stops with the lawyer,” says Michael R. Overly, a partner and intellectual property lawyer focusing on technology at Foley & Lardner LLP in Los Angeles. “You’re trusting the [cloud provider] with how they manage security,” and yet their contract language excuses them from almost all responsibility if a security or confidentiality breach occurs, he says. “One can’t simply go to clients or the state bar association and say the third party caused a breach, so it’s really not our responsibility.”To read this article in full or to leave a comment, please click here

10 security Ted Talks you can’t miss

Security talksImage by ThinkstockWe know you’re busy, that’s why we invested the time to find you the 10 Security TED talks that you really can’t miss. These talks tackle some of the biggest security challenges of our time, from securing medical devices to how cyber-attacks can threaten world peace. Some of them will be given by security experts you know, and other talks here by those who may be new to you. Some are recent, others were recorded years ago, but are just (if not more) relevant today. We think you’ll be better for having taken the time to listen and consider their messages.To read this article in full or to leave a comment, please click here

New products of the week 6.6.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.IntellaFlex HyperEngine Packet ProcessorKey features – APCON’s HyperEngine monitoring solution supports up to 200Gbps throughput and provides a set of monitoring services including ultra-fast deduplication and NetFlow at hyperspeed, with additional features coming later in 2016. More info.To read this article in full or to leave a comment, please click here

New products of the week 6.6.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.IntellaFlex HyperEngine Packet ProcessorKey features – APCON’s HyperEngine monitoring solution supports up to 200Gbps throughput and provides a set of monitoring services including ultra-fast deduplication and NetFlow at hyperspeed, with additional features coming later in 2016. More info.To read this article in full or to leave a comment, please click here

Buyer’s Guide to 9 multi-factor authentication products

Multi factorsSince we last reviewed two-factor authentication products, the market has moved beyond two-factor authentication toward what is now being called multi-factor authentication. One of the key features being new types of hardware-based tokens. Here are individual reviews of nine MFA products. See the full review.To read this article in full or to leave a comment, please click here

9-vendor authentication roundup: The good, the bad and the ugly

Due to numerous exploits that have defeated two-factor authentication, either by social engineering, remote access Trojans or various HTML injection techniques, many IT departments now want more than a second factor to protect their most sensitive logins and assets.In the three years since we last reviewed two-factor authentication products, the market has responded, evolving toward what is now being called multi-factor authentication or MFA, featuring new types of tokens.For this review, we looked at nine products, five that were included in our 2013 review, and four newcomers. Our returning vendors are RSA’s Authentication manager, SafeNet’s Authentication Service (which has been acquired by Gemalto), Symantec VIP, Vasco Identikey Authorization Server, and TextPower’s SnapID app. Our first-timers are NokNok Labs S3 Authentication Suite, PistolStar PortalGuard, Yubico’s Yubikey and Voice Biometrics Group Verification Services Platform.To read this article in full or to leave a comment, please click here

5 trends shaking up multi-factor authentication

Perhaps the biggest surprise in our review of nine multi-factor authentication products is that physical tokens are making a comeback. Many IT managers were hoping that software-based tokens, which are easier to deploy and manage, would make hardware tokens extinct.In our review three years ago of two-factor authentication products, the hot new approach was using smartphones as an authentication method via soft tokens, which could be a smartphone app, SMS message or telephony.To read this article in full or to leave a comment, please click here(Insider Story)

9-vendor authentication roundup: The good, the bad and the ugly

Due to numerous exploits that have defeated two-factor authentication, either by social engineering, remote access Trojans or various HTML injection techniques, many IT departments now want more than a second factor to protect their most sensitive logins and assets.In the three years since we last reviewed two-factor authentication products, the market has responded, evolving toward what is now being called multi-factor authentication or MFA, featuring new types of tokens.For this review, we looked at nine products, five that were included in our 2013 review, and four newcomers. Our returning vendors are RSA’s Authentication manager, SafeNet’s Authentication Service (which has been acquired by Gemalto), Symantec VIP, Vasco Identikey Authorization Server, and TextPower’s SnapID app. Our first-timers are NokNok Labs S3 Authentication Suite, PistolStar PortalGuard, Yubico’s Yubikey and Voice Biometrics Group Verification Services Platform.To read this article in full or to leave a comment, please click here

5 trends shaking up multi-factor authentication

Perhaps the biggest surprise in our review of nine multi-factor authentication products is that physical tokens are making a comeback. Many IT managers were hoping that software-based tokens, which are easier to deploy and manage, would make hardware tokens extinct.To read this article in full or to leave a comment, please click here(Insider Story)

Buyer’s Guide to 9 multi-factor authentication products

Multi factorsSince we last reviewed two-factor authentication products, the market has moved beyond two-factor authentication toward what is now being called multi-factor authentication. One of the key features being new types of hardware-based tokens. Here are individual reviews of nine MFA products. See the full review.To read this article in full or to leave a comment, please click here

Instrumenting masscan for AFL fuzzing

This blog post is about work in progress. You probably don't want to read it.





So I saw this tweet today:




As it turns it, he's just fuzzing input files. This is good, he's apparently already found some bugs, but it's not a huge threat.

Instead, what really needs to be fuzzed is network input. This is chronic problem with AFL, which is designed for inserting files, not network traffic, into programs.

But making this work is actually pretty trivial. I just need to make a tiny change to masscan so that instead of opening a libpcap adapter, it instead opens a libpcap formatted file.

This change was trivial, successfully running it is tough. You have to configure the command-line so all IP addresses match up with the libpcap file content, which is a pain. I created a sample lipcap file and checked it into the project, along with a help document explaining it. Just git clone the project, run make, then run this command line to see it Continue reading

A former NASA chief just launched this AI startup to turbocharge neural computing

A new company launched Monday by former NASA chief Dan Goldin aims to deliver a major boost to the field of neural computing.KnuEdge's debut comes after 10 years in stealth; formerly it was called Intellisis. Now, along with its launch, it's introducing two products focused on neural computing: KnuVerse, software that focuses on military-grade voice recognition and authentication, and KnuPath, a processor designed to offer a new architecture for neural computing.To read this article in full or to leave a comment, please click here

Big Iron Xeons Get A Broadwell Compute And Memory Boost

Intel is coming to the finish line with its 14 nanometer chip making process with the launch of the “Broadwell” generation of Xeon E7 server processors in China today.

Why China? Because for reasons that are not immediately obvious but are completely beneficial to Intel, the Chinese market has for the past several years been adopting four-socket servers in large scale datacenters at a rate that is considerably higher than their peers in the rest of the world. These new Xeon E7 v4 processors will be a big hit for big iron there and anywhere else where having a big

Big Iron Xeons Get A Broadwell Compute And Memory Boost was written by Timothy Prickett Morgan at The Next Platform.

Intel’s next monster 24-core chip is made for high-performance computers

Intel continues to pump more horsepower in its chips, by releasing a 24-core processor for high-performance computers.The Xeon processor E7-8890 v4 chip is part of the Xeon E7-8800 v4 family of chips that Intel announced on Monday. It was announced just a week after Intel made headlines with a new 10-core Core chip for gaming code-named Broadwell-E.The 24-core chip will go, in many cases, into monster performer four- to eight-socket servers. An eight-socket system could have up to 192 cores, with support for up to 24TB of memory.In a data sheet, Intel estimated a 192-core system with 2TB of memory and two hard drives to be priced at about US$165,000. Add 24TB of memory, and the server price could skyrocket.To read this article in full or to leave a comment, please click here

iPhone 7 Rumor Rollup: WWDC invites; Storage party; 3-year cycles

It can be painful enough stretching out iPhone rumors for a year or two, but a new report suggests Apple is changing its cycle for major iPhone refreshes from 2 years to 3. In other words, yes, the iPhone 7 and iPhone 7 Plus could be as boring as headlines have claimed.Nikkei reports that a slowing smartphone market and a lack of room for enhancements have forced Apple to change its ways. Nikkei says look to 2017 if you want excitement:"On the other hand, the 2017 model will likely involve major enhancements and design changes, including adoption of an organic electroluminescent display. The new device will also be able to create more complex tactile vibrations on the display because of a tiny, but high-performance motor equipped inside."To read this article in full or to leave a comment, please click here

Nest CEO Tony Fadell set to leave the company

In an announcement that was rather sudden though perhaps not all that surprising, Tony Fadell on Friday said that he will be stepping down as the CEO of Nest. A legendary Silicon Valley figure, Fadell is not only credited as being the man behind the creation of the iPod but also played an important role in the early development of the iPhone. Following his departure from Apple in 2008, Fadell went on to co-found Nest where the company received numerous accolades for its thermostat.In early 2014, Google agreed to purchase Nest for $3.2 billion. At first glance, the acquisition seemed to be a smart strategic move, especially given the push towards smart appliances in the home. But over the past few years, Nest hasn't exactly performed up to expectations. In recent months, we've seen reports of employee discontent along with reports that the higher ups at Google were expecting more product rollouts from the Nest team.To read this article in full or to leave a comment, please click here