High-tech

High-tech
Light

Saturday, June 21, 2014

7 tips for protecting your AWS cloud

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Jun 20, 2014 8:16 AM
Subject: 7 tips for protecting your AWS cloud
To: <aquarianm@gmail.com>
Cc:

Network World's 2014 State of the Network survey

What color is your Big Data parachute?

Network World Daily News AM
June 20, 2014
Share this email

7 tips for protecting your AWS cloud

iStockPhoto This week disappointing news came from service provider Code Spaces, a company that provided support for devops application management. Code Spaces, which was hosted in Amazon Web Service's cloud, ceased operations. after suffering a distributed denial-of-service attack by a perpetrator who demanded ransom and then began deleting data when company officials logged into their AWS account to stop the attack.To read this article in full or to leave a comment, please click here

READ MORE
 

Issue highlights

1. Network World's 2014 State of the Network survey

2. INSIDER What color is your Big Data parachute?

3. Florida college applies corporate-style security to 'BYOD' campus network

4. Companies warned of major security flaw in Google Play apps

5. Microsoft reveals Office 365 roadmap, offers opt-in previews

6. NASA bolsters Pluto-bound spacecraft for 2015 visit

7. Hacker puts 'full redundancy' code-hosting firm out of business

8. House approves effort to limit NSA searches of US data

9. The best portable hard drives: Our top picks are fast, light and spacious

10. Judge not sold on $324M settlement in Silicon Valley tech worker case

11. Katherine the White Shark crashes research site's servers

12. Chinese site in signal-jammer sting could pay record $34.9M FCC fine

13. The tech industry goes to the World Cup

WEBCAST: HP

Meg Whitman presents Unlocking IT with Big Data

Today, the industry is at an inflection point - driven by a triple storm of Big Data, cloud, and mobility; and in this new environment, security is paramount. The New Style of IT is about how businesses and IT leverage this rapid change for enterprise growth. Learn More

Network World's 2014 State of the Network survey

Aligning IT with the business has been a top priority of IT organizations for the past few years, but that is changing, according to the latest State of the Network Survey. IT has apparently made enough headway on the alignment issue that other priorities are coming to the fore. The No. 1 business objective of the 282 IT respondents is decreasing operational costs, while the top technology objective is lowering IT operational costs through server consolidation and overall IT simplification. Continue for more survey results.To read this article in full or to leave a comment, please click here READ MORE

INSIDER

What color is your Big Data parachute?

Salaries are on the rise for IT professionals, increasing anywhere from 3% to 7%, according to the latest surveys. For big data professionals, however, the news on compensation is even better. In a DICE study, IT pros adept at big data-related languages, databases and skills (like R, NoSQL, MapReduce and Hadoop) are getting premium pay, accounting for nine of the top 10 paying jobs.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE

Florida college applies corporate-style security to 'BYOD' campus network

Can a college campus filled with exuberant students and free-thinking professors armed to the hilt with smartphones and tablets find a way to establish business-like network security and appropriate-use expectations without crimping everyone's style? Broward College, a state college near Miami, has that in mind in the "Bring Your Own Device" (BYOD) strategy forged with help from the college's chief information security officer, Matt Santill. Since he's been there the past few years, he's pushed to register the tens of thousands of devices that touch the campus network to determine the student and staff users, who must agree to and sign the college's acceptable-use policy. There are requirements for anti-virus software, and a general taboo on many peer-to-peer (P2P) connections in order to prevent students from downloading video and other content across the campus network that would violate the Digital Millennium Copyright Act and possibly get both the student and the college into trouble with content owners. Monitoring is done through security gear, such as unified threat management gateways and network-access control, to enforce policy.To read this article in full or to leave a comment, please click here READ MORE

Companies warned of major security flaw in Google Play apps

University researchers have found that developers often store authentication keys in the Android apps on Google Play, making it possible for criminals to steal corporate or personal data.The major security threat has cast doubt on the effectiveness of the automated scanning tools Google uses to uncover malicious code and other problems that could pose a risk to users."If I'm a CISO, and I'm trying to make decisions about BYOD policies for my corporation, I might say, 'you know what – Android, not cool,'" Jonathan Sander, strategy and research officer for STEALTHbits Technologies, said.Google, which has been notified of the problem, did not respond to a request for comment.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: OutSystems

HTML5 Rocks

With the release of the 5th major version of HTML (aka HTML5), new features that mainly target Web Applications have been introduced, ranging from CSS3 (related technology) to GeoLocation and WebStorage. This article explores the top 5 features that developers should be using now. Read Now

Microsoft reveals Office 365 roadmap, offers opt-in previews

Microsoft on Thursday delivered on a promise made earlier this year to provide a roadmap to future Office 365 enhancements and additions, something both current and potential customers have been clamoring for, an analyst said."Of the key concerns [about Office 365] in large organizations [is] when will, and how will, Office 365 be upgraded?" Wes Miller, an analyst with Directions on Microsoft, said Thursday. "[They] want to know when the technology will arrive, both to be aware and to prepare users."+ ALSO ON NETWORK WORLD Tips on how to ace an Office 365 certification test +To read this article in full or to leave a comment, please click here READ MORE

NASA bolsters Pluto-bound spacecraft for 2015 visit

When you are on a 3 billion mile trip through the universe at over 34,000 mph, you might need a check-up or two to make sure everything is function right. That's exactly what's going on this week as NASA said it will soon update and checkout its Pluto-bound spacecraft known as New Horizons. Mission controllers at the Johns Hopkins Applied Physics Laboratory will begin the spacecraft's eighth check-up since the satellite launched in 2006. It will be the last before next year's rendezvous with Pluto. +More on Network World: Coolest house in the world: A Boeing 727+To read this article in full or to leave a comment, please click here READ MORE

Hacker puts 'full redundancy' code-hosting firm out of business

A code-hosting and project management services provider was forced to shut down operations indefinitely after a hacker broke into its cloud infrastructure and deleted customer data, including most of the company's backups.The customers of CodeSpaces.com, run by a company based in Wayne, New Jersey, called AbleBots, were informed Wednesday that their data might have been permanently lost following the compromise of the company's account on Amazon's Elastic Compute Cloud (EC2).The devastating security breach happened over a span of 12 hours and initially started with a distributed denial-of-service attack followed by an attempt to extort money from the company.To read this article in full or to leave a comment, please click here READ MORE

House approves effort to limit NSA searches of US data

The amendment to a defense spending bill would end a 'backdoor loophole' allowing warrantless searches READ MORE

: Logicalis

Logicalis eBook: SAP HANA: The Need for Speed

Without timely business insights, organizations today can suffer logistical, manufacturing, and even financial disaster in a matter of minutes. Considering the vast amounts of data being collected by these organizations, the need for real-time business analytics for big data is essential. View Now

The best portable hard drives: Our top picks are fast, light and spacious

A portable hard drive is all kinds of usefulThe SSD in your brand-new Ultrabook is super-fast, but its capacity is exceedingly limited. You could turn to a cloud-storage solution like Box, Dropbox, Google Docs, or Microsoft's OneDrive, but you'll have to pay over and over again for a subscription fee.And if that isn't bad enough, there's the inherent security risk of storing data on servers outside your control. And what happens when you don't have Internet access?To read this article in full or to leave a comment, please click here READ MORE

Judge not sold on $324M settlement in Silicon Valley tech worker case

A proposed US$324.5 million settlement of claims that Silicon Valley companies including Google and Apple suppressed worker wages by agreeing not to hire each others' employees may not be high enough, a judge signaled on Thursday.Judge Lucy Koh said in court that she was worried about whether that amount was fair to the roughly 64,000 technology workers represented in the case. "I have concerns over whether it's sufficient," she said, speaking at the U.S. District Court in San Jose, California.Koh didn't say whether she would approve the settlement. Throughout the course of Thursday's hearing, she questioned not just the amount but the logic behind the settlement as presented by lawyers for both the plaintiffs and the defendants.To read this article in full or to leave a comment, please click here READ MORE

Katherine the White Shark crashes research site's servers

Like the real star of the movie Jaws, another White Shark has taken on celebrity status along with dozens of others tagged with electronic tracking devices - so much so that visitors to a research site are crashing its servers.The celebrity's name is Katherine, a 14-foot, 2,300 pound White Shark (Latin name: carcharodon carcharias) who was tagged off of Cape Cod last August; She was named by researchers from OCEARCH after Katherine Lee Bates, a Cape Cod native and writer of America the Beautiful." OCEARCH OCEARCH is a non-profit, global shark tracking project that uses four different tagging technologies to create a three-dimensional image of a shark's activities. OCEARCH is hoping to develop successful conservation and management strategies by studying shark habits in granular detail.To read this article in full or to leave a comment, please click here READ MORE

Chinese site in signal-jammer sting could pay record $34.9M FCC fine

A Chinese electronics vendor accused of selling signal jammers to U.S. consumers could end up leading the market in one dubious measure: the largest fine ever imposed by the Federal Communications Commission.The agency wants to fine CTS Technology US$34,912,500 for allegedly marketing 285 models of jammers over more than two years. CTS boldly—and falsely—claimed that some of its jammers were approved by the FCC, according to the agency's enforcement action released Thursday. Conveniently, CTS' product detail pages also include a button to "report suspicious activity."To read this article in full or to leave a comment, please click here READ MORE

The tech industry goes to the World Cup

Image by Shutterstock/Stephen SauerAs we hurtle towards the start of the 2014 World Cup in Brazil, here's a look at some major tech players, along with their international soccer analogues. Just in case you were trying to decide whom to root for, or something.To read this article in full or to leave a comment, please click here READ MORE

WEBCAST: Network Instruments

3 Choices for Effective UC Management

This webcast discusses five best practices on how to successfully optimize and manage UC, as well as how to gain clear picture of overall performance and quickly troubleshoot when the inevitable issues arise. Learn More

SLIDESHOWS

10 reasons why open source is eating the world

Here are 10 reasons for the surging popularity of open source software.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Cisco buys its way into AT&T SDN

2. Microsoft's most famous couple, Bill and Melinda Gates: Stanford commencement speech transcript

3. Why the Tail-F acquisition is a big win for Cisco

4. Comcast's latest bad idea turns your Wi-Fi into everybody's Wi-Fi

5. How Google Glass set wearable computing back 10 years

6. Open Networking: The Whale that swallowed SDN

7. The best portable hard drives: Our top picks are fast, light and spacious

8. IRS computer crash eats email evidence: Conspiracy or 'worst IT department ever'?

9. "H4CKERS WANTED" report: NSA nothing trouble filling cybersecurity jobs

10. 10 reasons why open source is eating the world

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

...

No comments:

Post a Comment