Network visibility can reverse the security asymmetry challenge

Securing a business network has never been easy, but the task is becoming increasingly more difficult.Years ago, there was a single ingress/egress point to get into the network. The delineation between what was public and what was private was obvious.Today, that’s all changed. The rise of mobile devices, Wi-Fi access points, cloud applications and software-defined everything has increased the number of entry points into a company from one to tens, hundreds or even thousands for large organizations. For example, it’s common for a worker to connect to some kind of “free” Wi-Fi network when travelling without having any idea who might own that network, browse the web and infect their mobile device.To read this article in full or to leave a comment, please click here

The nightmare of rogue USB-C cables and adapters will end soon

The wave of rogue USB-C products that poses risks to PCs and mobile devices hasn't gone unnoticed, and the USB Implementers Forum has taken steps to eradicate the issue once and for all.A new specification announced by the USB 3.0 Promoters Group, which is part of USB-IF, aims to eliminate rogue cables, ports and chargers. The USB Type-C Authentication protocol will verify and ensure a USB-C connection won't fry a port or damage a device.A host device like a smartphone or PC will first verify the authenticity of the cable, charger or power source before any data is transferred. If everything checks out, a connection will be established.So if a smartphone or PC won't charge from a USB port in a public place, it's perhaps because there's a non-compliant component.To read this article in full or to leave a comment, please click here

Cybersecurity Salary Inflation – A Red Flag

If you follow my blog at all you know that I am quite passionate about the cybersecurity skills shortage and its ramifications.  Just to put this issue in perspective, ESG research indicates that 46% of organizations claim they have a “problematic shortage” of cybersecurity skills in 2016 as compared to 28% in 2015 (note: I am an ESG employee). Yup, the ESG research seems to indicate that things are getting worse on an annual basis, and ESG isn’t alone in this belief.  For example: According to Peninsula Press (a project of the Stanford University Journalism Program), more than 209,000 US-based cybersecurity jobs remained unfilled and postings are up 74% over the past 5 years. Analysis of the US Bureau of Labor Statistics indicates that the demand for cybersecurity professionals is expected to grow 53% by 2018. Adding to this trend, Computerworld research indicates that more than half of security managers expect their organizations to increase cybersecurity headcount this year adding more pressure to the pot. To read this article in full or to leave a comment, please click here

Future Cray Clusters to Storm Deep Learning

Supercomputer maker Cray might not roll out machines for deep learning anytime in 2016, but like other system vendors with deep roots in high performance computing, which leverages many of the same hardware elements (strong interconnect and GPU acceleration, among others), they are seeing how to loop their expertise into a future where machine learning rules.

As Cray CTO, Steve Scott, tells The Next Platform, “Deep learning and machine learning dovetails with our overall strategy and that overall merger between HPC and analytics that has already happened,” Scott says. HPC is not just one single application or set of

Future Cray Clusters to Storm Deep Learning was written by Nicole Hemsoth at The Next Platform.

Facebook tells B2C businesses: I feel your mobile pain

Facebook’s Messenger chat-bots and an update to the React Native cross-platform mobile development framework—both announced last week week—could relieve the pain felt by businesses trying to shift customer interaction from the web to mobile.It might seem there is an app for everything, but not every business has one. Building a token app that lives a lonely existence on the app store doesn’t help keep customers buying as they shift from the web to mobile. And meaningful mobile relationships and revenue-generating campaigns still elude most businesses because of the high cost of having Android and iOS development teams and the challenges of recruiting developers.To read this article in full or to leave a comment, please click here

Hacker: This is how I broke into Hacking Team

Almost a year after Italian surveillance software maker Hacking Team had its internal emails and files leaked online, the hacker responsible for the breach published a full account of how he infiltrated the company's network.The document published Saturday by the hacker known online as Phineas Fisher is intended as a guide for other hacktivists, but also shines a light on how hard it is for any company to defend itself against a determined and skillful attacker.The hacker linked to Spanish and English versions of his write-up from a parody Twitter account called @GammaGroupPR that he set up in 2014 to promote his breach of Gamma International, another surveillance software vendor. He used the same account to promote the Hacking Team attack in July 2015.To read this article in full or to leave a comment, please click here

Hacker: This is how I broke into Hacking Team

Almost a year after Italian surveillance software maker Hacking Team had its internal emails and files leaked online, the hacker responsible for the breach published a full account of how he infiltrated the company's network.The document published Saturday by the hacker known online as Phineas Fisher is intended as a guide for other hacktivists, but also shines a light on how hard it is for any company to defend itself against a determined and skillful attacker.The hacker linked to Spanish and English versions of his write-up from a parody Twitter account called @GammaGroupPR that he set up in 2014 to promote his breach of Gamma International, another surveillance software vendor. He used the same account to promote the Hacking Team attack in July 2015.To read this article in full or to leave a comment, please click here

Thrilled that AI is no longer a dirty word

Cognitive computing, artificial intelligence and machine learning are here to stay and promise to benefit both consumers and the organizations that exploit these advanced technologies.That was the sentiment from “Dawn of the Cognitive Era” panelists representing mostly startups (startup wannabe IBM being the exception) at the annual TiE StartupCon event in Boston this past week.MORE: 10 Internet of Things Companies to WatchWhereas it wasn’t long ago that the public’s view of AI was influenced disproportionately by books and movies, an increasing number of real-life cognitive computing applications such as those enabled by IBM Watson have begun to seep into the public’s consciousness. In fact, many people are taking advantage of cognitive computing, whether or not they realize it, when they use tools such as Apple’s Siri or various bots, said panel moderator and DataXylo CEO Abhi Yadav. Such applications, enabled in large part through the access to relatively cheap computing power via the cloud, have resulted in the technology finally living up to the hype -- and dissuading fears it will lord over us.To read this article in full or to leave a comment, please click here

Homeland Security issues warning about QuickTime for Windows

Because Apple no longer supports QuickTime for Windows, users are being encouraged to uninstall the program immediately. The warning from the U.S. Department of Homeland Security (DHS) comes on the heels of a warning from antivirus vendor Trend Micro that the video playback software is vulnerable to a pair of zero-day exploits.Apple has not updated the Windows version of QuickTime 7 since January and it would seem does not plan to release any more security patches to fix the exploits. Trend Micro notes that even Apple recommends Windows users uninstall the player. QuickTime for Mac is unaffected and remains supported by Apple.To read this article in full or to leave a comment, please click here

Up to 48% Off Belkin Surge Protectors Via Amazon – Deal Alert

Amazon is currently featuring deals on highly rated surge protectors from Belkin that will save you up to 48%. Use the links below to see which model is right for your application: Belkin 12 Outlet Home/Office Surge Protector with 10-Foot cord and Phone/Ethernet/Coaxial Protection plus Extended Cord. Price: $49.99  $25.88 (save 48%) Belkin 3-Outlet SurgePlus Mini Travel Swivel Charger Surge Protector with Dual USB Ports (2.1 AMP / 10 Watt)Price: $29.99  $18.00 (save 40%) Belkin SurgePlus 6-Outlet Wall Mount Surge Protector with Dual USB Ports (2.1 AMP / 10 Watt)Price: $24.99  $20.99 (save 16%) Belkin 6-Outlet Home/Office Surge Protector with 2.5-Foot Cord & Straight PlugPrice: $12.99  $7.99 (save 38%) To read this article in full or to leave a comment, please click here

Up to 64% Off Belkin Surge Protectors Today Only – Deal Alert

For today only, Amazon is featuring deals on highly rated surge protectors from Belkin that will save you up to 64%. Use the links below to see which model is right for your application: Belkin 12 Outlet Home/Office Surge Protector with 10-Foot cord and Phone/Ethernet/Coaxial Protection plus Extended Cord. Price: $49.99  $17.98 (save 64%) Belkin 3-Outlet SurgePlus Mini Travel Swivel Charger Surge Protector with Dual USB Ports (2.1 AMP / 10 Watt)Price: $29.99  $13.99 (save 53%) Belkin SurgePlus 6-Outlet Wall Mount Surge Protector with Dual USB Ports (2.1 AMP / 10 Watt)Price: $24.99  $13.99 (save 44%) Belkin 6-Outlet Home/Office Surge Protector with 2.5-Foot Cord & Straight PlugPrice: $12.99  $5.49 (save 58%) To read this article in full or to leave a comment, please click here

Up to 64% Off Belkin Surge Protectors Today Only – Deal Alert

For today only, Amazon is featuring deals on highly rated surge protectors from Belkin that will save you up to 64%. Use the links below to see which model is right for your application: Belkin 12 Outlet Home/Office Surge Protector with 10-Foot cord and Phone/Ethernet/Coaxial Protection plus Extended Cord. Price: $49.99  $17.98 (save 64%) Belkin 3-Outlet SurgePlus Mini Travel Swivel Charger Surge Protector with Dual USB Ports (2.1 AMP / 10 Watt)Price: $29.99  $13.99 (save 53%) Belkin SurgePlus 6-Outlet Wall Mount Surge Protector with Dual USB Ports (2.1 AMP / 10 Watt)Price: $24.99  $13.99 (save 44%) Belkin 6-Outlet Home/Office Surge Protector with 2.5-Foot Cord & Straight PlugPrice: $12.99  $5.49 (save 58%) To read this article in full or to leave a comment, please click here

Network woes? The cloud is coming to the rescue

Cloud computing is changing the game for one of the hardest problems in IT: running a network. Users are counting on fast, secure access more than ever, even as networks get more complex and threats more dangerous. Often, there’s a lot of data available about the state of a network and its performance, but more data by itself can't solve a problem. So startups are turning to the growing power of the cloud for answers. Nyansa, based in Silicon Valley, emerged from stealth mode on Monday with Voyance, a cloud-based SaaS (software-as-a-service) offering that analyzes inputs from wired and wireless LANs to gauge users' actual experiences on a network.To read this article in full or to leave a comment, please click here

Network woes? The cloud is coming to the rescue

Cloud computing is changing the game for one of the hardest problems in IT: running a network. Users are counting on fast, secure access more than ever, even as networks get more complex and threats more dangerous. Often, there’s a lot of data available about the state of a network and its performance, but more data by itself can't solve a problem. So startups are turning to the growing power of the cloud for answers. Nyansa, based in Silicon Valley, emerged from stealth mode on Monday with Voyance, a cloud-based SaaS (software-as-a-service) offering that analyzes inputs from wired and wireless LANs to gauge users' actual experiences on a network.To read this article in full or to leave a comment, please click here

British Airways plane possibly hit by drone near Heathrow

A British Airways aircraft was possibly hit by a drone Sunday near Heathrow airport as it was coming to land, which is likely to increase demands for greater checks on the flights of the devices. The Airbus A320 flight from Geneva, carrying 132 passengers and five crew members, appears to have not been significantly impacted and was cleared for its next flight, according to news reports. The U.K. Civil Aviation Authority said it was aware of “a possible incident” with a drone at Heathrow on Sunday, which is subject to investigation by the Metropolitan Police. It reminded drone users of the country’s "dronecode," which prohibits drones from flying above 400 feet (about 122 meters) and requires them to stay away from aircraft, helicopters, airports and airfields.To read this article in full or to leave a comment, please click here