Gartner’s top 10 emerging trends

ORLANDO -- The No. 1 problem, or trend, facing IT departments today is nonstop demand, according to Gartner. As more devices connect to the Internet, the need for more computing capability, storage and networking is increasing at a rapid rate.For instance, 39 million terabytes of storage is currently deployed globally; by 2019, that figure will more than double to 89 million terabytes.The demand for data center capacity is "relentless," said David Cappuccio, and is creating problems for IT. "It's not about how many systems I have, it's how efficiently I use that resource."To read this article in full or to leave a comment, please click here

5 tips for better enterprise security

The recent spate of data breaches at major U.S. organizations has raised questions about how effective current security tools and approaches are when it comes to dealing with emerging threats. Private and public enterprises have spent tens of billions of dollars to bolster security over the past decade, yet malicious attackers consistently succeed in evading whatever roadblocks are thrown their way. The trend has led many organizations to embrace a back-to-basics approach focused equally on people, processes and technology. Rather than viewing the security function as a bothersome cost of doing business, a growing number of organizations see it as a strategic enabler of new initiatives.To read this article in full or to leave a comment, please click here(Insider Story)

Doom or delight? Court ruling on Safe Harbor brings uncertainty to privacy dealings

Privacy activists are overjoyed, but for businesses it's what one lobbyist described, only half jokingly, as "the doomsday scenario:" The transatlantic transfer of European Union citizens' personal data was thrown into a legal void Tuesday when the Court of Justice of the EU declared invalid the 15-year-old Safe Harbor agreement with the U.S. because it provided inadequate privacy protection.The ruling exposes businesses reliant on Safe Harbor to the threat of legal action. The fact that European Commission and U.S. officials are in the middle of negotiating stronger privacy protections offers little comfort, as the ruling also opens that to challenges in national courts. Only a complete rewrite of the EU's data protection regime, already in progress, might help -- but it won't take effect for up to two years after the final text is agreed, and that is still many months off.To read this article in full or to leave a comment, please click here

Security in Cloud Networking

Enterprises are grappling with security in their infrastructure and many point products try to solve this in different use -cases. As enterprises migrate from north-south to east-west traffic patterns, the need for consistent security across cloud-network and firewall infrastructure is paramount. Furthermore, additional security concerns emerge as organizations contemplate leveraging access to the public cloud...
Continue reading »

IP camera makers pressure researcher to cancel security talk

An upcoming talk covering security problems in Internet-connected cameras has been canceled after opposition from some manufacturers.Gianni Gnesa was scheduled to give a presentation titled "Abusing Network Surveillance Cameras" on Oct. 14 at the Hack in the Box GSEC conference in Singapore.Internet-connected video camera, or IP cameras, are widely used for security systems, offering the advantage that footage can be streamed anywhere remotely. But anything connected to the Internet poses risks if not properly secured. IP cameras, like this one made by Shenzhen Shixin Digital, are widely used in the security industry.To read this article in full or to leave a comment, please click here

Google patches second round of Stagefright flaws in Android

Google has issued patches for two new Stagefright-related vulnerabilities, one of which affects Android versions going back to 2008 and puts millions of users at risk.The flaws were found by security company Zimperium, which also unearthed the original Stagefright flaws in April.In an advisory Monday, Google said it didn't appear that attackers have started exploiting the vulnerabilities yet.The latest flaws are only slightly less dangerous than their predecessors, which allowed a device to be compromised merely by sending a specially crafted multimedia message (MMS). An attacker needed only to know the victim's phone number.To read this article in full or to leave a comment, please click here

A Few Points About VMware EVO SDDC Networking

A Packet Pushers listener that heard us chatting about VMware's EVO SDDC solution raised a few concerns about the networking functionality in the current version of EVO SDDC. I was able to talk briefly with Krish Sivakumar, Director of Product Marketing, EVO SDDC & Ven Immani, Senior Technical Marketing Engineer, EVO SDDC at VMware to help clarify some of the issues.

Gartner: IT should simplify security to fight inescapable hackers

ORLANDO -- On some level it may seem incongruous to many IT organizations but as security challenges mount, enterprises should take a look at their protection systems and look to simplify them -- not make the more complicated -- to battle hackers.+More on Network World: Gartner: Get onboard the algorithm train!+The Risk and Security officer in many enterprises today is mostly concerned with old technology risks. They’ve become obsessed with external hacks, chasing the impossible goal of perfect protection. However, 65% of CEOs say their risk management approach is falling behind, said Peter Sondergaard senior vice president of research withGartner at the consultancy’s Symposium/IT Expo this week.To read this article in full or to leave a comment, please click here

1 More Reason To Be Wary of Sky High Drones (See Video)

Even wireless LANs located many stories from the ground in skyscraper offices might not be safe from hackers -- if the hackers are armed with drones. So say researchers in Singapore, a country where skyscrapers are plentiful.In this video, researchers from iTrust, a Center for Research in Cyber Security at the Singapore University of Technology And Design, show how attackers could infiltrate a wireless printer using a personal drone and an Android phone outfitted with a special app.MORE: New super-precise drones could win over wireless carriersTo read this article in full or to leave a comment, please click here