SIEM review: Splunk, ArcSight, LogRhythm and QRadar

IT and security managers in the IT Central Station online community say that the most important characteristics of security information and event management (SIEM) products is the ability to combine information from several sources and the ability to do intelligent queries on that information. Four of the top SIEM solutions are Splunk, HPE ArcSight, LogRhythm, and IBM Security QRadar SIEM, according to online reviews by enterprise users in the IT Central Station community. But what do enterprise users really think about these tools? Here, users give a shout out for some of their favorite features, but also give the vendors a little tough love.To read this article in full or to leave a comment, please click here(Insider Story)

SIEM review: Splunk, ArcSight, LogRhythm and QRadar

IT and security managers in the IT Central Station online community say that the most important characteristics of security information and event management (SIEM) products is the ability to combine information from several sources and the ability to do intelligent queries on that information.To read this article in full or to leave a comment, please click here(Insider Story)

HPE/Aruba buys networking analysis company Rasa Networks

HPE/Aruba confirmed today that the company has signed a definitive agreement to acquire Rasa Networks, a network performance management and analytics startup, for an undisclosed amount.As Network World reported last month, HPE/Aruba had been planning the move for several weeks. An internal communique to employees stated that Rasa’s technology would become a part of the company’s Clarity wireless management software, and that Rasa workers would be integrated into Aruba’s R&D team, reporting to CTO and co-founder Keerti Melkote.To read this article in full or to leave a comment, please click here

FTC orders Apple, Google, Microsoft, Blackberry, Samsung to divulge mobile security practices

The Federal Trade Commission today said it issued a 10-page letter to eight leading players in the mobile communications arena requiring them to tell the agency how they issue security updates to address vulnerabilities in smartphones, tablets, and other mobile devices.+More on Network World: FTC: Best Practices for businesses facing Internet of Things onslaught+To read this article in full or to leave a comment, please click here

FTC orders Apple, Google, Microsoft, Blackberry, Samsung to divulge mobile security practices

The Federal Trade Commission today said it issued a 10-page letter to eight leading players in the mobile communications arena requiring them to tell the agency how they issue security updates to address vulnerabilities in smartphones, tablets, and other mobile devices.+More on Network World: FTC: Best Practices for businesses facing Internet of Things onslaught+To read this article in full or to leave a comment, please click here

IDC’s pick for the best cloud consultant is…

Cloud computing can be a difficult technology to wrap your head around so many users turn to consultants to help them. Who’s the best cloud consultant?IDC says its Accenture.+MORE AT NETWORK WORLD: Commercial drones gaining altitude with top IT vendors +Perhaps it shouldn’t be a surprise that Accenture landed at the top of the list: The company is one of the top IT consultants in general and has aggressively pivoted toward helping customers embrace cloud technology. IDC The size of each bubble represents market shareTo read this article in full or to leave a comment, please click here

Are you ready for Country as a Service? Estonia offers ‘e-residence’

Way back in the old days—say, five minutes ago—if you wanted to take advantage of what a country had to offer, you had to actually go there. But in the age of “Everything as a Service,” physically locating yourself in the country you want to “reside” seems so old school. At least, that seems to be the rationale behind Estonia’s efforts to offer something called “e-residency.” As Taavi Kotka, Estonia's CIO, explained in Business Insider last week, "It’s called CaaS. There’s SaaS. We’re Country as a Service.”Estonia is cooler than you think Here’s the deal. If you didn’t know—and there’s really no big reason you should have—the Republic of Estonia is a tiny but technically advanced Baltic country of just 1.3 million people. According to Wikipedia, “Estonia is often described as one of the most internet-focused countries in Europe,” and it “boasts “an advanced, high-income economy and high living standards. Unfortunately, the population has been shrinking for decades.To read this article in full or to leave a comment, please click here

Securing BGP: A Case Study (10)

The next proposed (and actually already partially operational) system on our list is the Router Public Key Infrastructure (RPKI) system, which is described in RFC7115 (and a host of additional drafts and RFCs). The RPKI systems is focused on solving a single solution: validating that the originating AS is authorized to originate a particular prefix. An example will be helpful; we’ll use the network below.

RPKI-Operation

(this is a graphic pulled from a presentation, rather than one of my usual line drawings)

Assume, for a moment, that AS65002 and AS65003 both advertise the same route, 2001:db8:0:1::/64, towards AS65000. How can the receiver determine if both of these two advertisers can actually reach the destination, or only one can? And, if only one can, how can AS65000 determine which one is the “real thing?” This is where the RPKI system comes into play. A very simplified version of the process looks something like this (assuming AS650002 is the true owner of 2001:db8:0:1::/64):

  • AS65002 obtains, from the Regional Internet Registry (labeled the RIR in the diagram), a certificate showing AS65002 has been issued 2001:db8:0:1::/64.
  • AS65002 places this certificate into a local database that is synchronized with all the other operators participating in Continue reading

IDG Contributor Network: The contract process, and software’s role in it

As a freelancer who has worked for a large range of big companies over the years, I'm all too aware of how important contracts are to an enterprise's working.I've long been amazed that coming to a decision about a body of work tends to be a relatively quick process, but actually negotiating and formalizing the contract becomes an incredibly drawn out process. I've often laughed when I've been sent a 40-page contract by a vendor for a tiny piece of work. I have neither the legal skills nor the legal budget to pore through the document. I tend to just let things slide—at the end of the day, I'm just keen to get the job happening.To read this article in full or to leave a comment, please click here

Is student loan assistance the next big thing in corporate recruiting?

As of 2015, more than 40 million Americans had some kind of student loan debt. According to a survey from education finance portal iontuition of the 1,000 student-loan-debt-holders surveyed in July 2015, 80 percent say they'd appreciate it if their employers helped with repayment of their debt through a matching opportunity, much like a 401k. As businesses struggle to attract and retain talent, is student loan repayment assistance becoming a must-have benefit?To read this article in full or to leave a comment, please click here

TCP Protocol: The Overview – Part1

One of the most important layers we – as network engineers – hate and avoid in the OSI reference model is the transport layer with its popular and dominant protocol; TCP. Most of network engineers abandoned diving into TCP protocol because they consider it a host-to-host communication protocol that usually works without a problem. End systems …

The post TCP Protocol: The Overview – Part1 appeared first on Networkers-online.com.

Lenovo software has a major security risk

Just as the dust has settled on the Superfish controversy, another piece of software installed on Lenovo PCs is causing problems. This time it's due to a major malware exploit.The problem is with Lenovo Solution Center (LSC) software, which the company describes as "a central hub for monitoring system health and security." LSC is supposed to monitor your system's virus and firewall status, update your software, perform backups, check battery health, and get registration and warranty information.Unfortunately, it also has a vulnerability that allows a malicious attacker to start the LSC service and trick it in to executing arbitrary code in the local system context, according to researchers at Trustwave SpiderLabs.To read this article in full or to leave a comment, please click here

Lenovo software has a major security risk

Just as the dust has settled on the Superfish controversy, another piece of software installed on Lenovo PCs is causing problems. This time it's due to a major malware exploit.The problem is with Lenovo Solution Center (LSC) software, which the company describes as "a central hub for monitoring system health and security." LSC is supposed to monitor your system's virus and firewall status, update your software, perform backups, check battery health, and get registration and warranty information.Unfortunately, it also has a vulnerability that allows a malicious attacker to start the LSC service and trick it in to executing arbitrary code in the local system context, according to researchers at Trustwave SpiderLabs.To read this article in full or to leave a comment, please click here