| Router malware: Fact or fiction? Given that malicious software isn't always found locally on the machine itself, Ronald and Dylan Kaplan share how to pinpoint the characteristics of router malware Read More WHITE PAPER: Red Hat
Modernize Your IT Infrastructure & Streamline Operations Increasing line of business demands? Shrinking IT budget? See how Red Hat can help you meet growing. Read Now : TIBCO Jaspersoft
The Cloud BI that IT and Developers Demand Jaspersoft for AWS allows developers and IT professionals to easily and affordably build business intelligence solutions as well as embed visualizations and analytics inside applications. Pricing starts at <$1/hr in a pay-as-you-go model. Learn more VMWorld 2014: Winners and Losers VMWorld 2014 was a whirlwind. The conference last week attracted 22,000 attendees, more than 250 exhibitors and spread across all three buildings of the Moscone Center in downtown San Francisco over a five-day period. There was a lot of news at the show: From VMware announcing new products like EVO:RAIL, the hyper-converged infrastructure stack, to the company pledging support for OpenStack and containers in its software. Almost all of the vendors at the show had their own news, too -- it was hard to keep track of it all. +Also on NetworkWorld: VMware takes its best shot at cloud market +To read this article in full or to leave a comment, please click here Read More Witness the future: The 1955 Video Phone The National Archives blog recently featured a pretty cool clip showing one of the first “futuristic” video phones – manual rotary dial and all. According to the blog: “Demonstrated for the first time, the videophone, with two-way picture screens enabling the parties to see, as well as speak to, each other. As simple to operate as today’s dial tone. The videophone included a small screen so that women could ‘primp’ before placing their calls. A mirror would have been less costly and more effective.” +More on Network World: The IRS uses computers?! The horror!+To read this article in full or to leave a comment, please click here Read More WHITE PAPER: OPSWAT Inc.
Secure the Use of Portable Media in Critical Infrastructure Securing critical infrastructure is crucial to ensuring that our current way of life is sustained. Our whitepaper provides insight into the development of strong security policies around the use of portable media, and how to effectively mitigate the threat from external sources. Learn more Bypassing hardware firewalls in 20 seconds Zoltan Balazs, aka @zh4ck and CTO at MRG Effitas, presented “Bypass firewalls, application whitelists, secure remote desktops under 20 seconds” at Def Con 22. The slides are now available (pdf), as well a tool to help bypass hardware firewalls.Pen testers, or black hats, sometimes come up against a firewall that blocks backdoor Command and Control (C&C) communications. The problem, according to Balazs, is that bad guys can sometimes get around this, but white hats sometimes cannot.To read this article in full or to leave a comment, please click here Read More Network Security Challenges in the Enterprise ESG recently published a new research report titled, Network Security Trends in the Era of Cloud and Mobile Computing (note: I am an ESG employee). In this project, ESG surveyed 397 IT security professionals working at enterprise organizations (i.e. more than 1,000 employees) and asked a multitude of questions about their current and future network security policies, practices, and technologies.Here is a list of the top 5 network security challenges at enterprise organizations: 39% of organizations say that, “IT initiatives are being adopted without the proper network security oversight or controls in place.” Sound familiar? I’ve had lots of CISOs tell me about this very problem, especially around mobile computing. Sounds like an opportunity for Bradford Networks, Cisco, and ForeScout. The Trusted Computing Group (TCG) may also have a play here. 31% of organizations say that, “network security policies and controls are not cohesive as they must be implemented across many different security and networking technologies.” In other words, network security is addressed with network devices when it should be applied to network flows. This leads to network complexity and many, many associated challenges. 28% of organizations say they are challenged by, “too many overlapping controls and processes tend to cause trouble.” When the networking and security teams are subnetting, VLANing, firewalling, and applying ACLs to network devices, there’s bound to be a lot of redundancy and wasted resources. I get the need for layered defenses, but there must be a better way to isolate network traffic. SDN? NFV? Cisco ACI? VMware NSX? Something is needed. 27% of organizations say that the, “security staff is too busy responding to alerts/events and not enough time with training, planning, or network security strategy.” This points to the global cybersecurity skills shortage that I’ve been screaming about for years (in other ESG research, 25% of organizations said that they have a “problematic shortage” of IT security skills). With too much work and too little staff, CISOs need network security technologies that can help them work smarter, not harder. 26% of organizations are challenged by, “security policies that are too complex and can’t be enforced with the current network security processes and controls.” Everyone talks about “contextual security” where network access is governed by user identity, device identity, location, time-of-day, etc. The problem is that this requires central management, common data, data exchange, and technology integration. Alas, these things haven’t happened yet in many enterprises. Summarizing this list presents a scary scenario. While business units are doing their own IT projects, the security team is hampered by mismatched policies, tactical technologies, and an overburdened staff. Not a very good recipe for success. To read this article in full or to leave a comment, please click here Read More WHITE PAPER: Riverbed Technology
Magic Quadrant for Application Performance Monitoring Application performance monitoring is a key focus of IT operations groups, with growing influence from development, quality assurance and line-of-business application owners. View Now>> The DOE's Smart Grid snapshot While the benefits of moving the current antiquated electric grid into the future are many, there are a number of challenges still dogging the effort.Chief among them is cybersecurity but getting the country’s utility community onboard without costing them an arm and a leg is another.Such issues were apparent in the Department of Energy’s recent report to Congress on the status of the smart grid effort.To read this article in full or to leave a comment, please click here Read More Avaya and HP to sell combined portfolio of UC, contact center and infrastructure services Avaya and HP Enterprise Services announced they have signed a multi-year agreement to offer a combined portfolio of Unified Communications-as-a-Service (UCaaS), Contact Center-as-a-Service, and infrastructure modernization services. The combined portfolio will support for mobile applications, software, and networking for unified communications and customer experience management.As part of the agreement, the HP ES Business Process Services organization will assume service delivery of a significant portion of Avaya Private Cloud Services, including a limited transfer of Avaya employees and contractors to HP; however, responsibility for sales contracts, service level agreements, and the overall client experience will remain with Avaya. In addition to the portfolio arrangement, HP will also use Avaya’s communication and collaboration products to help HP improve the efficiency and performance of its contact center operations.To read this article in full or to leave a comment, please click here Read More IDG Contributor Network: Want Gigabit Internet? A fistful of cities can now give it to you Gigabit Internet is the Holy Grail for residential Internet users right now. If you're wondering where to get your hands on it for the upcoming fall entertainment season, here's where you need to go. Read More John Dillinger, Bonnie and Clyde escape the shredder as FBI finishes vast digital fingerprint/ID project FBI The FBI said today it was getting close to completing a massive project that saw the agency convert more than 30 million records and 83 million fingerprint cards to the digital Next Generation Identification system it will use in the future. According to an FBI release, the conversion from manual to digital systems began more than two decades ago, when paper files outgrew the space at FBI Headquarters in Washington, D.C. They were shipped to West Virginia, where the FBI built a campus in Clarksburg in 1992 for its Criminal Justice Information Services (CJIS) Division and leased warehouse space in nearby Fairmont for the burgeoning files.To read this article in full or to leave a comment, please click here Read More | |
No comments:
Post a Comment