8 tips for recruiting cybersecurity talent

Good IT talent is hard to find. You know what's even more difficult? Finding good cybersecurity talent. Demand for skilled cybersecurity professionals is growing at an astonishing rate -- four times faster than the IT jobs market and 12 times faster than the overall labor market, according to research from Burning Glass Technologies.Unfortunately, supply isn't keeping up with demand, according to online cybersecurity training and MOOC platform Cybrary's Cyber Security Job Trends Survey for 2016. Of the 435 senior-level technology professionals who completed the survey between October and December 2015, 68 percent affirmed that there is a global shortage of skilled cybersecurity professionals. Only 13 percent of companies said there was an abundance of cybersecurity talent in their local areas.To read this article in full or to leave a comment, please click here

Disabling SLAAC in Data Center Subnets

Continuing the IPv6 address selection discussion we have a few days ago, Luka Manojlovič sent me a seemingly workable proposal:

I think we were discussing a borderline problem. In a server environment there won’t be any SLAAC, and we could turn off DHCPv6 client on servers with fixed IP addresses.

Sounds great, but as always, the reality tends to be a bit harsher.

Read more ...

Internet Connected Water Heater

So I have to admit that I’m the crusty old curmudgeon who is way behind on things like home automation. After a recent issue with my water heater I opted to replace it with one that utilizes heat pump technology. I know a lot of people are installing tankless models and I strongly considered that path. My challenges were as follows–

  • Relatively High Demand (replacing an 80 Gallon Conventional Electric)
  • Conventional 80 Gallon Electric Models are difficult to purchase (at least in consumer models)
  • Tankless Owners seem to prefer gas over electric models
  • Venting a tankless gas heater would require relocation of plumbing

Given these constraints, I stumbled into the hybrid water heater models. These are big tank models that utilize heat pump technology as a preferred method of moving heat into the water. As demand increases, traditional resistance coils can be invoked to generate heat.

The goal is to be more efficient than tankless models and have the option for rapid recovery. My biggest concern was the added complexity and additional components that could fail. Nonetheless, the energy ratings were very good and there are some rebate programs and tax incentives to offset the cost. I ultimately chose a GE Geospring 80 Continue reading

Why The Industry Needs An Open Source Framework For Switching Silicon

Howdy. Occasionally the topic of open sourcing a driver, library, or SDK to a commodity product comes up as more developers start working on/deploying said product. Typically, the vendor makes a concession and opens up the documentation to increase adoption and supportability. Sometimes this works. Sometimes, it just pisses off the developers to such an […]

The post Why The Industry Needs An Open Source Framework For Switching Silicon appeared first on Packet Pushers.

Why The Industry Needs An Open Source Framework For Switching Silicon

Howdy. Occasionally the topic of open sourcing a driver, library, or SDK to a commodity product comes up as more developers start working on/deploying said product. Typically, the vendor makes a concession and opens up the documentation to increase adoption and supportability. Sometimes this works. Sometimes, it just pisses off the developers to such an […]

The post Why The Industry Needs An Open Source Framework For Switching Silicon appeared first on Packet Pushers.

IDG Contributor Network: Broad use of cloud services leaves enterprise data vulnerable to theft, report says

Data theft is a very real and growing threat for companies that increasingly use cloud services, says a security firm.Workers who widely share documents stored in the cloud with clients, independent contractors, or even others within the company are creating a Swiss-cheese of security holes, a study by Blue Coat Systems has found.In some cases, cloud documents were publicly discoverable through Google searches, the researchers say of their analysis.'Broadly shared' The study found that 26% of documents stored in cloud apps are shared so widely that they pose a security risk. Compounding the issue is that many organizations aren't even aware of it.To read this article in full or to leave a comment, please click here

Advanced Technical “Hacks” for your site’s SEO

Improving your site’s SEO is probably top of mind for you, but doing so takes a lot of hard work and the rules of the game are constantly changing. On Tuesday, January 26th at 10am PT/1pm ET, CloudFlare is hosting a live discussion with some of the leading experts in technical SEO. They will share advanced technical hacks to help you reap the benefits of higher search rankings. In the live discussion, Martin Woods, Reza Moaiandin, and Patrick Stox will cover:

  • Tangible tips about on-page code excellency
  • Semantic markup
  • Web server optimization with GZIP and HTTP/2
  • Web content optimization
  • Site security with malware and DDoS prevention

In addition to the webinar, Reza and Martin from SALT.agency have offered a free 30 minute technical SEO consult on your website. Consults are limited to the first 50 people who signup here and also attend the live webinar event on January 26th at 10am PT. Be sure to register for the webinar, too.

IoT and data privacy

This week on January 28 we will celebrate Data Privacy Day, which has a theme of "Respecting Privacy, Safeguarding Data and Enabling Trust." We'll get back to that... First Response Qualcomm reportedly partnered with First Response to develop "the world's first smart pregnancy test, which connects through a mobile device to alert clinicians a patient is pregnant." It's just the first such home test to "capture electronically" and "then transmit that data to the clinicians," Chief Medical Officer Dr. James Mault told CRNtv. He added that for IoT to do well in medical verticals, it will "require connectivity infrastructure that can enable the data capture from a variety of devices and diagnostics and therapeutic instruments and allow that data to flow into the hands of clinicians of any type."To read this article in full or to leave a comment, please click here

Arista Countersues Cisco, Claiming Antitrust Violations

Two days before a ruling in a patent infringement case between the companies, Arista Networks is suing Cisco Systems for what it alleges are antitrust violations. Arista today filed a counterclaim to Cisco’s 13-month-old copyright infringement suit in the U.S. District Court, Northern District of California, for antitrust and unfair competition. Arista alleges Cisco conducts a “bait and switch” with its command line interface in which it claims it is an industry standard and then attempts to penalize competitors for emulating it.To read this article in full or to leave a comment, please click here

Arista Countersues Cisco, Claiming Antitrust Violations

Two days before a ruling in a patent infringement case between the companies, Arista Networks is suing Cisco Systems for what it alleges are antitrust violations. Arista today filed a counterclaim to Cisco’s 13-month-old copyright infringement suit in the U.S. District Court, Northern District of California, for antitrust and unfair competition. Arista alleges Cisco conducts a “bait and switch” with its command line interface in which it claims it is an industry standard and then attempts to penalize competitors for emulating it.To read this article in full or to leave a comment, please click here

Arista countersues Cisco for Antitrust

Two days before a ruling in a patent infringement case between the companies, Arista Networks is suing Cisco Systems for what it alleges are antitrust violations.Arista today filed a counterclaim to Cisco’s 13-month-old copyright infringement suit in the U.S. District Court, Northern District of California, for antitrust and unfair competition. Arista alleges Cisco conducts a “bait and switch” with its command line interface in which it claims it is an industry standard and then attempts to penalize competitors for emulating it.To read this article in full or to leave a comment, please click here

Arista countersues Cisco for Antitrust

Two days before a ruling in a patent infringement case between the companies, Arista Networks is suing Cisco Systems for what it alleges are antitrust violations.Arista today filed a counterclaim to Cisco’s 13-month-old copyright infringement suit in the U.S. District Court, Northern District of California, for antitrust and unfair competition. Arista alleges Cisco conducts a “bait and switch” with its command line interface in which it claims it is an industry standard and then attempts to penalize competitors for emulating it.To read this article in full or to leave a comment, please click here

Ta-ta to passwords and PINs; faces and fingerprints to rule the future

Facial and fingerprint recognition technologies are expected to see accelerated growth over the next five years as security applications emerge in the government, enterprise, finance, consumer and other markets.The market value of facial recognition technologies is expected to nearly double from $230 million in 2015 to $450 million in 2019; that represents a compound annual growth rate (CAGR) of about 18%, according to market research firm TrendForce.Led by Apple's iPhone juggernaut, unit shipments of fingerprint sensors have grown from 316 million in 2014 to 499 million last year and will continue to increase each year to peak at 1.6 billion in 2020. Revenue growth for fingerprint sensors will increase from about $1.86 billion in 2015 to $2.6 billion in in 2020, according to the latest research from IHS Technology.To read this article in full or to leave a comment, please click here

How to determine if big data security analytics will produce useful outcomes

Although vendor-written, this contributed piece does not advocate a position that is particular to the author’s employer and has been edited and approved by Network World editors.

Big data is the hot buzzword in security analytics today, but buyers are skeptical because many companies have spent years building “data lakes” only to discover it was impossible to “drain the lake” to get something useful.

And unfortunately, today’s solutions often include expensive clusters coupled with static business intelligence reports and “sexy” dashboards that look good but add little to useful and productive security analytics. Focusing on the analytics and how to use the data (very valuable data) in order to make real time decisions, discover critical patterns, determine on-going and changing security policies and dramatically improve security – ah – that’s useful.

To read this article in full or to leave a comment, please click here

Samsung sued for not updating Android on older phones

The Dutch Consumers' Association (DCA), or Consumentenbond as it is known in its native land, is suing Samsung for not providing timely software updates to older models of its Android smartphones. The move was driven in part because Samsung has such a strong presence in Holland, and because Samsung is pretty bad about supporting old phones, as I've learned through personal experience.According to DCA's own research (PDF file), at least 82% of Samsung smartphones available in the Dutch market examined had not received any software updates to the latest version of Android in two years.To read this article in full or to leave a comment, please click here