Network World Daily News AM | | EMC confirmed on Wednesday that its VCE converged infrastructure joint venture with Cisco and VMware is heading into a new phase, with EMC taking control of the business and Cisco drastically cutting its stake in it. | | Issue highlights 1. 11 ways to re-energize your IT career 2. Why EMC acquired VCE from Cisco 3. Microsoft discloses zero-day flaw, publishes quick fix 4. Arista VP Gourlay leaves company 5. INSIDER Free and Cheap Ways to Learn About Network Administration 6. Get More Network World Newsletters! 7. Symantec sees rise in high-traffic DDoS attacks 8. Industry can head off IoT privacy rules, former US official says 9. Ford wants to keep drivers alert on the long road to autonomous cars 10. US Justice Dept. focuses new squad on cybercrime combat 11. Top Mac-o-lanterns from around the Web | WHITE PAPER: Tintri Inc. This Tintri Best Practice Guide for Backup and Recovery will assist individuals who are responsible for the design, deployment, and DR of VMs deployed on Tintri VMstore systems. View now | Mid-career blues, begone. Here are 11 actionable items tech pros can tackle to keep moving on up in IT. READ MORE | What motivated EMC to take over VCE, and why Cisco saw it as a good move. READ MORE | Microsoft has published a temporary fix for a new zero-day flaw that affects nearly all versions of Windows and is currently being exploited via PowerPoint.The flaw affects all Windows releases except Windows Server 2003, the company wrote in an advisory Tuesday. It can be exploited if a user is coaxed into opening a malicious Office file containing an OLE (object linking and embedding) object. OLE can allow a user to edit a PowerPoint file from within a Word document, for example."At this time, we are aware of limited, targeted attacks that attempt to exploit the vulnerability through Microsoft PowerPoint," the company said.To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: VeriSign Domain name system (DNS) protection is a key component to a comprehensive security plan. One of the most efficient ways to bolster DNS security is to deploy a cloud-based DNS infrastructure. This DNS Security eGuide, will review top cyber threats to DNS and identify five top reasons, along with guidance, on selecting a managed DNS service provider. Learn More>> | Doug Gourlay has left Arista Networks. The vice president of systems engineering is said by Arista PR to be exploring "life beyond Arista" but will be a consultant to the company: Doug is a very talented executive and contributed greatly to Arista's success. We appreciate and thank him for his many contributions and respect his reasons to explore life beyond Arista. He will continue to serve as an executive consultant to the company.To read this article in full or to leave a comment, please click here READ MORE | These nine self-taught labs give you hands-on experience with various networking tasks -- and most don't cost anything. READ MORE | We have a wide variety of newsletters to satisfy all sorts of IT pros READ MORE | WHITE PAPER: Flexera Software Is your Application Readiness Process Ready for Change? Learn how to identify where you can make improvements, analyze the steps needed to move up in maturity, and prioritize which steps are most critical, resulting in faster and more reliable application delivery, lower costs and decreased risk. Learn More | A type of distributed denial-of-service attack, DNS amplification, has risen sharply, according to new research from Symantec.The security vendor said it saw a 183 percent increase in DNS (Domain Name System) amplification attacks from January through August, which abuse recursive DNS resolvers.Recursive DNS resolvers look up a domain name and return an IP address, which can be called into a browser.But these types of servers return a large amount of data. Attackers abuse them by making requests but substituting the IP address of their victims.That directs a large amount of data to the victims, consuming up to 50 times more bandwidth, making it an "amplification" attack.To read this article in full or to leave a comment, please click here READ MORE | The Internet of Things is raising a host of concerns over the control of data that could lead to government regulation, but tech companies can rein in those worries on their own if they act fast, according to a former White House technology official.The kinds of information that connected devices can collect, such as health and fitness data, are more intimate than what consumers are used to sharing on the Web, said Nicole Wong, former U.S. Deputy CTO. In addition, it's harder to make users comfortable with the use of that data, she said.Any company that gathers data from consumers has to be transparent about what it collects and how it's used, in order to build trust, Wong said during a panel at the GigaOm Structure Connect conference in San Francisco. Web and mobile products have ways of communicating that message and giving users choices, but many IoT devices don't, she said. As examples, she cited the lights in a consumer's home and future monitoring devices that are injected in the bloodstream.To read this article in full or to leave a comment, please click here READ MORE | Self-driving vehicles will make the driver redundant, but long before that, smarter cars may leave the driver thinking about other things.Ford is already studying that problem, anticipating an evolution toward autonomous cars that will take a lot longer than projects by the likes of Google may suggest. For now, the motorist is still in charge—with some help."We still have a driver-centric model. We still think the driver needs to be engaged," said Don Butler, Ford's executive vice president of connected vehicle and services. Drivers and passengers are "more comfortable" when they have some control over the vehicle, he said during a session at GigaOm Structure Connect in San Francisco.To read this article in full or to leave a comment, please click here READ MORE | The threat and consequences of cybersecurity attacks today lead the US Department of Justice to reorganize in an effort to better battle the scourge.The changes announced by John Carlin, the Assistant Attorney General for National Security included the appointment of a new Principal Deputy Assistant Attorney General and a new Chief of Staff and Counselor, as well as the creation of a new Deputy Assistant Attorney General position to oversee DOJ's National Security Division's efforts to protect national assets, including its efforts to combat economic espionage, proliferation, and cyber-based national security threats. This position will oversee the work of the National Security Cyber Specialists (NSCS) Network, consisting of prosecutors in each of the U.S. Attorney's Offices who focus on cyber threats to the national security. To read this article in full or to leave a comment, please click here READ MORE | Apple devotionA snapshot of Apple devotion expressed via carved vegetation.Not a fanboy, really?Poqua on Flickr says: I'm not an Apple fanboy, although I do have a Mac mini. I just like logos.To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: ForgeRock Forrester finds that to achieve this securely, companies need identity and access management (IAM) platforms that are adaptable, scalable, responsive, and high velocity. View now>> | | | | | | | |
No comments:
Post a Comment