Search This Blog

Friday, December 05, 2014

Technical evidence links destructive malware to attack against Sony Pictures

Notable deaths of 2014 from the worlds of technology, science & inventions | Cloud upstarts: Too cheap to trust?

Network World Compliance

Technical evidence links destructive malware to attack against Sony Pictures
The destructive malware program that the FBI alerted some companies about this week was likely used against Sony Pictures Entertainment, according to technical evidence found by researchers in the program’s code.Reports surfaced online Nov. 24 that the computer network of Sony Pictures Entertainment, a U.S.-based subsidiary of Sony, was infiltrated by hackers. The company’s employees were reportedly no longer able to use their computers after a message from the attackers, a group called the Guardians of Peace (GOP), was displayed on their screens.On Monday the FBI sent a confidential five-page alert to a number of private companies about a destructive malware program that can overwrite data on a computer’s hard disk drive, including its master boot record that holds information about partitions.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Binary Tree

SMART: Best Practices for Migrating the Corporate Directory
A cornerstone of any IT infrastructure, Microsoft Active Directory plays a central role, determining access to and usage rights for IT resources. Migrating AD to a new environment must be planned and managed carefully using best practices, while maintaining operations and user functionality. Learn More

WHITE PAPER: Binary Tree

SMART: Best Practices for Migrating the Corporate Directory
A cornerstone of any IT infrastructure, Microsoft Active Directory plays a central role, determining access to and usage rights for IT resources. Migrating AD to a new environment must be planned and managed carefully using best practices, while maintaining operations and user functionality. Learn More

Notable deaths of 2014 from the worlds of technology, science & inventions
Remembering2014 has been a particularly tough year for those of us at IDG who mourn the loss of Patrick McGovern, founder and chairman of the company, this past March. Here’s our tribute to Pat and others who contributed much to our lives but are with us no longer. (IDG News Service contributed to this report.)To read this article in full or to leave a comment, please click here Read More

Cloud upstarts: Too cheap to trust?
Hosting provider Atlantic.net launched a $0.99 per month cloud server this fall, which is significantly less expensive than the $0.013 per hour starting price for market-leader Amazon Web Services’ on-demand Elastic Compute Cloud (EC2) virtual machines.SherWeb, another mid-size hosting provider that is pivoting into the Infrastructure-as-a-Service (IaaS) market, launched a Hyper-V/SSD-flash/InfiniBand-fabric/Intel-powered cloud offering that it says beats AWS on a variety of input/output capability benchmark tests. Providers like Digital Ocean, ProfitBricks and Concerto are among others attempting to differentiate their services from AWS, Microsoft and Google on price, performance and usability.To read this article in full or to leave a comment, please click here Read More

Cloud security grows up
Comprehensive cloud security services are taking over the market. Read More


WEBCAST: CenturyLink and Intel

Enterprise NoSQL and Big Data in the Public Cloud
The importance of infrastructure in getting the right performance in the enterprise context and a persuasive business case for making the move from internal hosting to the public cloud. Learn More

Startup promises to secure data centers, clouds workload by workload
Illumio, a well-funded startup with an impressive list of customers, is wheeling out a data-center/cloud security platform that imposes individual security policies on every workload. Read More

INSIDER
Gamification pitfalls and how companies are avoiding them
Gamification, the use of game mechanics and design techniques to motivate people to solve problems or achieve certain goals, has been in use at organizations for several years. But as the concept matures, organizations are expanding their use of gamification to reap additional benefits.To read this article in full or to leave a comment, please click here(Insider Story) Read More

Public cloud storage can be efficient, but the potential is still limited
Public cloud storage can be a cost efficient alternative to rolling your own, but observers warn that it isn’t a cure all. Price is the lure. Even if you have room in your data center for expansion, in-house storage infrastructure won’t ever be as cost-scalable as a public cloud option, says Forrester analyst Henry Baltazar. And cloud storage will always give you more agility, he says: Once you add storage capacity in your data center, it is likely yours for the life cycle of the equipment.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: HP

Top 5 Truths About Big Data Hype and Security Intelligence
Big Data Security Analytics (BDSA) is the subject of exuberant predictions. However, a Gartner analyst points out that no available BDSA solutions come close to these forecasts. Nevertheless, the principles of Big Data are the key to advanced security intelligence. This white paper discusses the key tenets of Big Data. Learn more >>

How to get the most out of your IT talent
As the spotlight on cost reduction has dimmed, IT has picked up plenty of new directives: to deliver business agility, drive innovation, and increase its value to the business, to name a few. Yet at the same time, IT remains responsible for all the tactical and operational activities it has always performed, such as keeping systems running, delivering new capabilities, and securing intellectual property and corporate data.For CIOs and IT leaders, the management challenge is how to help IT employees break the tactical habit and use their strategic skills more effectively. We asked for advice from three tech professionals with different perspectives on IT talent. Their expertise can help IT leaders who want their teams to work smarter and be more engaged. Some of the tactics can be adopted without a lot of investment, while others require outside help or more significant cultural overhauls.To read this article in full or to leave a comment, please click here Read More

SDN tools increase WAN efficiency
Configuring, maintaining and changing WAN infrastructure can be a nightmare given the distributed nature of the beast and all the remote touch points, but emerging Software Defined Networking (SDN) tools promise to make these operations more efficient. Usually touted as a data center tool, SDN can be used to automate and manage WAN operations, says Zeus Kerravala, principal of ZK Research. WAN issues are hard to address because of the dispersed nature of the resources, he says. “There’s no perfect way of making changes to the WAN,” but “SDN brings automation and orchestration from a centralized location and allows you to react faster.”To read this article in full or to leave a comment, please click here Read More

How to get more out of your virtualized and cloud environments
After Dammions Darden arrived as the new senior systems administrator for the city of Garland, Texas, he knew that the 50 to 60 physical hosts for this 234,000-person city outside of Dallas were not running nearly as efficiently as they could be. Some had excess capacity, others were running way too hot. Traditionally if apps are slow and virtual machines need more memory the easy answer is an unfortunate one: Throw more hardware at the problem. But Darden wasn’t satisfied with that. While roaming the expo floor at VMworld two years ago he stumbled across VMTurbo, a company that specializes in analyzing virtual environments.To read this article in full or to leave a comment, please click here Read More

How UPS uses analytics to drive down costs (and no, it doesn't call it big data)
When you have an organization the size of UPS – with 99,000 vehicles and 424,000 employees – every single little bit of efficiency that can be squeezed out of daily operations translates into a big deal. UPS has been using analytics to do just that for a long time now, and keeps getting better and better at it. Network World Editor in Chief John Dix caught up with UPS Senior Director of Process Management Jack Levis for an update on their latest achievements. How does UPS use analytics to optimize its operations? Let me take you back 15 years ago and then work our way back to today, and then I’ll give you a glimpse into the future. Also, to frame the discussion, let’s think of analytics in three forms: descriptive analytics says, “Where am I today?”; predictive analytics says, “With my current trajectory, where will I be headed tomorrow?”; and then at the highest level you have prescriptive analytics, and that’s where you say, “Where should I be?”To read this article in full or to leave a comment, please click here Read More

New products of the week 12.01.2014
New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Thunder TPS 3.1 Key features:  Programmability enhancements include improved aFleX TCL-based scripting and the addition of regular expressions (regex). Bolstered mitigation tools for TLS/SSL protection and added advanced rate limiting. Expanded detection and visibility features. More info.To read this article in full or to leave a comment, please click here Read More


SLIDESHOWS

14 go-to tools for Mac sysadmins

Mac pro Gerard Allen shares his must-have sysadmin tools for enterprise Apple deployments.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Woz says Apple's legendary garage beginning is a myth

2. 30 years of Cisco: The networking giant's boldest predictions over the years

3. Full speed ahead for 802.11ac Gigabit Wi-Fi

4. Windows 10 could prompt upgrades of 600 million aging PCs

5. Cool Yule Tools: Best techie gifts for 2014

6. Juniper unbundles switch hardware, software

7. 8 free online courses to grow your tech skills

8. Akamai: Surge in hackers using complex crimeware to drain money from online bank accounts

9. Notable deaths of 2014 from the worlds of technology, science & inventions

10. Intelligence agency wants a superconducting, super cool, supercomputer


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: