Microsoft’s Solair acquisition could expand its IoT services

Microsoft dove deeper into Internet of Things technology on Tuesday with the acquisition of Solair, an Italian company that operates a cloud-based IoT platform. According to a Microsoft blog post, Solair's technology will be used to upgrade the company's Azure IoT Suite, a collection of cloud services meant to help companies use the Internet of Things. Microsoft and Solair didn't disclose the financial terms of their deal. Solair's technology, which already uses Microsoft's Azure cloud services, offers IoT services focused on a variety of markets, including home automation, smart metering, remote maintenance and inventory management. To read this article in full or to leave a comment, please click here

Why automation is the key to the future of cyber security

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. In 2015 there were 781 publicized cyber security breaches which resulted in more than 169 million personal records being exposed – a number that’s steadily on the rise year over year. And with notable names like BlueCross, Harvard and Target being tossed into the mix, it’s obvious that no company is safe. Yet, only 38% of organizations across the globe can confidently say they are prepared to handle a sophisticated cyber-attack. The numbers don’t lie. Cyber criminals are becoming savvier and their attacks are increasing faster than companies can keep up. Furthermore, it’s becoming increasingly evident that traditional methods, like anti-malware software, are no longer sufficient to keep sensitive data safe. To address this glaring need, many forward-thinking IT executives are fortifying their cyber security strategy using automation as a tool for greater defense.To read this article in full or to leave a comment, please click here

Why automation is the key to the future of cyber security

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. In 2015 there were 781 publicized cyber security breaches which resulted in more than 169 million personal records being exposed – a number that’s steadily on the rise year over year. And with notable names like BlueCross, Harvard and Target being tossed into the mix, it’s obvious that no company is safe. Yet, only 38% of organizations across the globe can confidently say they are prepared to handle a sophisticated cyber-attack. The numbers don’t lie. Cyber criminals are becoming savvier and their attacks are increasing faster than companies can keep up. Furthermore, it’s becoming increasingly evident that traditional methods, like anti-malware software, are no longer sufficient to keep sensitive data safe. To address this glaring need, many forward-thinking IT executives are fortifying their cyber security strategy using automation as a tool for greater defense.To read this article in full or to leave a comment, please click here

Why automation is the key to the future of cyber security

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

In 2015 there were 781 publicized cyber security breaches which resulted in more than 169 million personal records being exposed – a number that’s steadily on the rise year over year. And with notable names like BlueCross, Harvard and Target being tossed into the mix, it’s obvious that no company is safe. Yet, only 38% of organizations across the globe can confidently say they are prepared to handle a sophisticated cyber-attack.

The numbers don’t lie. Cyber criminals are becoming savvier and their attacks are increasing faster than companies can keep up. Furthermore, it’s becoming increasingly evident that traditional methods, like anti-malware software, are no longer sufficient to keep sensitive data safe. To address this glaring need, many forward-thinking IT executives are fortifying their cyber security strategy using automation as a tool for greater defense.

To read this article in full or to leave a comment, please click here

The importance of situational awareness for network engineers

 

frustrated engineer

 

In another life, not too long ago, I spent a number of years in civilian and military law enforcement. When going through just about any kind of tactical training, one of the recurring themes they hammer into you is “situational awareness or SA.”

Wikipedia defines SA as:

Situational awareness or situation awareness (SA) is the perception of environmental elements with respect to time or space, the comprehension of their meaning, and the projection of their status after some variable has changed, such as time, or some other variable, such as a predetermined event. It is also a field of study concerned with understanding of the environment critical to decision-makers in complex, dynamic areas from aviation, air traffic control, ship navigation, power plant operations, military command and control, and emergency services such as fire fighting and policing; to more ordinary but nevertheless complex tasks such as driving an automobile or riding a bicycle.

Defining the need for SA in network engineering

It’s interesting to notice that critical infrastructure such as power plants and air traffic control are listed as disciplines that train in SA, however, I’ve never seen it taught in Continue reading

The importance of situational awareness for network engineers

 

frustrated engineer

 

In another life, not too long ago, I spent a number of years in civilian and military law enforcement. When going through just about any kind of tactical training, one of the recurring themes they hammer into you is “situational awareness or SA.”

Wikipedia defines SA as:

Situational awareness or situation awareness (SA) is the perception of environmental elements with respect to time or space, the comprehension of their meaning, and the projection of their status after some variable has changed, such as time, or some other variable, such as a predetermined event. It is also a field of study concerned with understanding of the environment critical to decision-makers in complex, dynamic areas from aviation, air traffic control, ship navigation, power plant operations, military command and control, and emergency services such as fire fighting and policing; to more ordinary but nevertheless complex tasks such as driving an automobile or riding a bicycle.

Defining the need for SA in network engineering

It’s interesting to notice that critical infrastructure such as power plants and air traffic control are listed as disciplines that train in SA, however, I’ve never seen it taught in Continue reading

India has shot down Apple’s plan to sell refurbished iPhones

India reportedly has rejected Apple’s plan to sell refurbished iPhones in the country, a blow to the company’s hopes for growth there.The government turned down Apple’s application to import and sell the older, refreshed phones, Bloomberg reported, citing an unnamed official. Apple didn’t immediately respond to a request for comment.Apple looked to refurbished handsets as a way to attract more buyers in India. An earlier application was rejected last year by India’s Ministry of Environment.The company’s phone sales growth has been slowing in China, so it has been looking to India as its next big growth market. Apple had only three percent market share in India in the fourth quarter of last year, according to IDC. Samsung was the biggest phone seller, with 27 percent.To read this article in full or to leave a comment, please click here

Schemer in “massive” identity theft fraud gets 4 years in slammer

Identity theft is a raging problem but at least some scammers are getting their comeuppance.The Department of Justice today touted that one scammer got four years in prison for his part in a $4.4 million fraudulent federal income tax return scheme that, according to court documents involved the filing of at least 12,000 fraudulent federal income tax returns that sought refunds of at least $42 million from the U.S. Treasury. +More on Network World: IRS: Top 10 2015 identity theft busts+To read this article in full or to leave a comment, please click here

Schemer in “massive” identity theft fraud gets 4 years in slammer

Identity theft is a raging problem but at least some scammers are getting their comeuppance.The Department of Justice today touted that one scammer got four years in prison for his part in a $4.4 million fraudulent federal income tax return scheme that, according to court documents involved the filing of at least 12,000 fraudulent federal income tax returns that sought refunds of at least $42 million from the U.S. Treasury. +More on Network World: IRS: Top 10 2015 identity theft busts+To read this article in full or to leave a comment, please click here

How to perform a risk assessment

Without a complete and thorough risk assessment including all its component parts (discussed herein), you might as well open all your data assets to unbridled exfiltration via Port 80 without any security checks at all. In the end, attackers and criminal digital profiteers will get what they came for in either case. Defending risks without knowing what those risks are is like playing a round of paintball with your eyes closed — you’ll keep missing your opponent. A risk assessment gives the enterprise a specific, more finely narrowed field of targets for which to aim. In this fifth and final installment of a five-part presentation of information security risk defense via informed incident response, CSO regurgitates reliable resources and expert steps you should use on the way to protecting data assets and stores in your enterprise. (See also as part of this series: How to audit external service providers.)To read this article in full or to leave a comment, please click here(Insider Story)

How to perform a risk assessment

Without a complete and thorough risk assessment including all its component parts (discussed herein), you might as well open all your data assets to unbridled exfiltration via Port 80 without any security checks at all. In the end, attackers and criminal digital profiteers will get what they came for in either case.To read this article in full or to leave a comment, please click here(Insider Story)

South Dakota law will be a test case for a US Internet sales tax

A new South Dakota law may end up determining whether most U.S. residents are required to pay sales taxes on their Internet purchases.The South Dakota law, passed by the Legislature there in March, requires many out-of-state online and catalog retailers to collect the state's sales tax from customers. The law is shaping up to be a legal test case challenging a 25-year-old U.S. Supreme Court ruling that prohibits states from levying sales taxes on remote purchases.+ PAST STORY: US residents oppose Internet sales tax +To read this article in full or to leave a comment, please click here

Panama Papers leak explained: What you need to know about the Mossack Fonseca hack

You've doubtless heard about the Panama Papers, a leak of 2.6TB of documents from the one of the world's largest offshore law firms, Mossack Fonseca. The dump of over 11 million files containing detailed financial information on 214,000 companies illustrates how offshore tax havens are exploited.Whatever you may think of Mossack Fonseca's business dealings, there are lessons to be learned about what the company could have — and should have — done to ensure that its clients' data was protected.[ Related: What's the deal with the massive Panama Papers data leak? ]To read this article in full or to leave a comment, please click here(Insider Story)

Panama Papers leak explained: What you need to know about the Mossack Fonseca hack

You've doubtless heard about the Panama Papers, a leak of 2.6TB of documents from the one of the world's largest offshore law firms, Mossack Fonseca. The dump of over 11 million files containing detailed financial information on 214,000 companies illustrates how offshore tax havens are exploited.To read this article in full or to leave a comment, please click here(Insider Story)

21% off LG Nexus 5X Unlocked Smartphone 32GB – Deal Alert

Averaging 4 out of 5 stars on Amazon from over 480 people (read reviews), this LG Nexus 5X unlocked, multi-mode phone will work on all US carriers including AT&T, Verizon, T-Mobile and Sprint, as well as MVNO's (Mobile Virtual Network Operators) and most international carriers. It features Android 6.0 Marshmallow, a fingerprint sensor, new USB Type-C charger, and a powerful camera. Under its 5.2-inch display is a hexa-core Snapdragon 808 processor for world-class speed at an affordable price, which right now gets just a bit more affordable. With a list price of $429.99, you can save $80 now and buy it on Amazon for $349.99.To read this article in full or to leave a comment, please click here