FBI/Apple privacy fight left out a major player: the data carriers

The recent standoff between Apple and the FBI over the agency’s demand that the company provide a way to unlock the iPhone of a dead terrorist, was "resolved" when the FBI “bought a tool,” according to Director James Comey.But that, of course, didn’t resolve the fundamental, ongoing conflict between the government's need for digital surveillance capabilities to assist with law enforcement and national security on one side, and the American commitment to personal privacy on the other.To read this article in full or to leave a comment, please click here

Networks need automation — just ask the U.S. military

IT professionals are looking to software-defined networking to automate what are still complex and vulnerable systems controlled by human engineers. Major General Sarah Zabel knows where they’re coming from.Zabel is the vice director of the Defense Information Systems Agency (DISA), which provides IT support for all U.S. combat operations. Soldiers, officers, drones, and the president all rely on DISA to stay connected. Its network is the epitome of a system that’s both a headache to manage and a prime hacking target.Zabel was a featured speaker on Tuesday at the Open Networking User Group conference, a Silicon Valley gathering of enterprise IT leaders who want to steer vendors toward technologies that meet their real needs. Members include large retailers, financial institutions, and manufacturers.To read this article in full or to leave a comment, please click here

Networks need automation — just ask the U.S. military

IT professionals are looking to software-defined networking to automate what are still complex and vulnerable systems controlled by human engineers. Major General Sarah Zabel knows where they’re coming from.Zabel is the vice director of the Defense Information Systems Agency (DISA), which provides IT support for all U.S. combat operations. Soldiers, officers, drones, and the president all rely on DISA to stay connected. Its network is the epitome of a system that’s both a headache to manage and a prime hacking target.Zabel was a featured speaker on Tuesday at the Open Networking User Group conference, a Silicon Valley gathering of enterprise IT leaders who want to steer vendors toward technologies that meet their real needs. Members include large retailers, financial institutions, and manufacturers.To read this article in full or to leave a comment, please click here

Networks need automation — just ask the U.S. military

IT professionals are looking to software-defined networking to automate what are still complex and vulnerable systems controlled by human engineers. Major General Sarah Zabel knows where they’re coming from.Zabel is the vice director of the Defense Information Systems Agency (DISA), which provides IT support for all U.S. combat operations. Soldiers, officers, drones, and the president all rely on DISA to stay connected. Its network is the epitome of a system that’s both a headache to manage and a prime hacking target.Zabel was a featured speaker on Tuesday at the Open Networking User Group conference, a Silicon Valley gathering of enterprise IT leaders who want to steer vendors toward technologies that meet their real needs. Members include large retailers, financial institutions, and manufacturers.To read this article in full or to leave a comment, please click here

IBM Research Lead Charts Scope of Watson AI Effort

Over the past few years, IBM has been devoting a great deal of corporate energy into developing Watson, the company’s Jeopardy-beating supercomputing platform. Watson represents a larger focus at IBM that integrates machine learning and data analytics technologies to bring cognitive computing capabilities to its customers.

To find out about how the company perceives its own invention, we asked IBM Fellow Dr. Alessandro Curioni to characterize Watson and how it has evolved into new application domains. Curioni, will be speaking on the subject at the upcoming ISC High Performance conference. He is an IBM Fellow, Vice President Europe and

IBM Research Lead Charts Scope of Watson AI Effort was written by Nicole Hemsoth at The Next Platform.

Hackers exploit unpatched Flash Player vulnerability, Adobe warns

Adobe Systems is working on a patch for a critical vulnerability in Flash Player that hackers are already exploiting in attacks. In the meantime, the company has released other security patches for Reader, Acrobat, and ColdFusion.The Flash Player vulnerability is being tracked as CVE-2016-4117 and affects Flash Player versions 21.0.0.226 and earlier for Windows, OS X, Linux, and Chrome OS. Successful exploitation can allow attackers to take control of affected systems."Adobe is aware of a report that an exploit for CVE-2016-4117 exists in the wild," the company said in an advisory published Tuesday. "Adobe will address this vulnerability in our monthly security update, which will be available as early as May 12."To read this article in full or to leave a comment, please click here

Hackers exploit unpatched Flash Player vulnerability, Adobe warns

Adobe Systems is working on a patch for a critical vulnerability in Flash Player that hackers are already exploiting in attacks. In the meantime, the company has released other security patches for Reader, Acrobat, and ColdFusion.The Flash Player vulnerability is being tracked as CVE-2016-4117 and affects Flash Player versions 21.0.0.226 and earlier for Windows, OS X, Linux, and Chrome OS. Successful exploitation can allow attackers to take control of affected systems."Adobe is aware of a report that an exploit for CVE-2016-4117 exists in the wild," the company said in an advisory published Tuesday. "Adobe will address this vulnerability in our monthly security update, which will be available as early as May 12."To read this article in full or to leave a comment, please click here

Google I/O 2016: 9 predictions about new products Google will announce

Google already went public with a detailed schedule of the Google I/O 2016 technical sessions. But what will be revealed in the opening two-hour keynote led by Google CEO Sundar Pichai is a tightly held secret until May 18 at 10 a.m. PT. The following are some rumors and educated guesses about what Google could announce during the keynote.1. Augmented reality (AR), virtual reality (VR) and 360° video announcements. Google probably won’t announce a VR headset. Not because Google can’t, but because developers’ attention is completely consumed by the Oculus and the HTC Vive maelstrom and because 50 different VR headsets are predicted to be announced at the Consumer Electronics Show (CES) next January. Headsets will become a commodity that doesn’t fit Google’s business model—though it may sell one made by a partner, like it sells Nexus Android devices. Google will monetize VR in another way.To read this article in full or to leave a comment, please click here

Review: 6 machine learning clouds

What we call machine learning can take many forms. The purest form offers the analyst a set of data exploration tools, a choice of ML models, robust solution algorithms, and a way to use the solutions for predictions. The Amazon, Microsoft, Databricks, Google, and IBM clouds all offer prediction APIs that give the analyst various amounts of control. HPE Haven OnDemand offers a limited prediction API for binary classification problems.To read this article in full or to leave a comment, please click here(Insider Story)

11 ways to get the most out of Google Keep on Android

I really need to upgrade my brain's internal storage.I'm only partially kidding: Just like a hard drive, I'm pretty sure my mind reached maximum capacity at some point in the past decade. The only way I can remember anything these days is by making and maintaining a million notes, both physical and digital. (My wife can confirm this. "I told you that a week ago" is an all-too-common phrase around these parts.)I'm still waiting for Western Digital to start selling SSD implants for the noggin, but in the meantime, Google Keep has become my repository for notes of the non-sticky variety. I like it because it's simple to use and yet packed with features that make my life easier. Plus, it works as well on my desktop computer (via its Web interface or more fully featured Chrome app) as it does on my Android device -- where I tend to use it most frequently.To read this article in full or to leave a comment, please click here

More than half of IT projects still failing

In 2013, a survey from cloud portfolio management provider Innotas revealed that 50 percent of businesses surveyed had experienced an IT project failure within the previous 12 months. Now, three years later, not much has changed. According to the most recent Innotas annual Project and Portfolio Management Survey, in fact, the numbers have increased: 55 percent of the 126 IT professionals surveyed between January and March 2015 reported they had a project fail, up from 32 percent in 2014.To read this article in full or to leave a comment, please click here

Infographic: Survey Reveals IT Organizations Underestimate Security Threats

Did you know the average organization’s security has been compromised an average of four times over the past year? If that seems like a lot, well, that’s because it is—especially considering that, according to a survey conducted by Forrester of 210 IT risk and compliance decision-makers, the vast majority of organizations also believe they are “extremely secure.” Fortunately, by virtualizing your network with VMware NSX, you can dramatically strengthen your security with micro-segmentation.

Click here to get our FREE VMware NSX resource kit  your guide to micro-segmentation.

Find out more about leveraging micro-segmentation to build a Zero Trust network in the infographic below.

Networking

The post Infographic: Survey Reveals IT Organizations Underestimate Security Threats appeared first on The Network Virtualization Blog.

Microsoft fixes actively attacked IE flaw and 50 other vulnerabilities

Microsoft released patches for 51 vulnerabilities Tuesday, including one affecting Internet Explorer that hackers have exploited in targeted attacks against organizations in South Korea.The Microsoft patches were covered in 16 security bulletins, eight rated critical and eight important. The affected products include Windows, Internet Explorer, Microsoft Edge, Office and Microsoft .NET Framework.The patches included in the IE and Edge security bulletins, MS16-051 and MS16-052, are among the most important ones and should be prioritized because they can be exploited to compromise computers when users visit specially crafted Web pages.To read this article in full or to leave a comment, please click here

Microsoft fixes actively attacked IE flaw and 50 other vulnerabilities

Microsoft released patches for 51 vulnerabilities Tuesday, including one affecting Internet Explorer that hackers have exploited in targeted attacks against organizations in South Korea.The Microsoft patches were covered in 16 security bulletins, eight rated critical and eight important. The affected products include Windows, Internet Explorer, Microsoft Edge, Office and Microsoft .NET Framework.The patches included in the IE and Edge security bulletins, MS16-051 and MS16-052, are among the most important ones and should be prioritized because they can be exploited to compromise computers when users visit specially crafted Web pages.To read this article in full or to leave a comment, please click here