High-tech

High-tech
Light

Thursday, December 11, 2014

IT security whiz aims to corral drones

---------- Forwarded message ----------
From: "Network World After Dark" <nww_newsletters@newsletters.networkworld.com>
Date: Dec 11, 2014 9:01 PM
Subject: IT security whiz aims to corral drones
To: <aquarianm@gmail.com>
Cc:

  A brief history of Linux malware | Sony may have used Amazon's cloud to launch a counter DoS attack after its breach

 
  Network World After Dark  

IT security whiz aims to corral drones
PixiePath focus on is getting commercial drones to work smart, together Read More
 


: Venafi

Securing Keys and Certificates to Critical Assets
Today's most devastating cyber attacks—including ShellShock, Heartbleed and Zombie Zero—prey on trust. And that puts your digital certificates at risk. This informative resource center explores how next-generation trust protection can help you combat today's attacks, ensuring trusted access to critical assets. Learn More

WHITE PAPER: OutSystems

Mobile App Backlog
New research conducted by Opinion Matters reveals that 85% of enterprises have a mobile app development backlog because they can't cope with business demands. With the average application taking anywhere between three and 12 months to get out the door, this slow approach to app development is resulting in competitive disadvantage. Learn More

A brief history of Linux malware
A look at some of the worms and viruses and Trojans that have plagued Linux throughout the years. Read More
 

Sony may have used Amazon's cloud to launch a counter DoS attack after its breach
Conflicting reports are arising in the cloud world this week related to how Sony responded to a leak of its data.Re/code reported that Sony used Amazon Web Service cloud servers to launch counter-denial of service attacks against websites that were hosting content leaked from the company's massive breach last week. More from Re/code:"[Sony] is using hundreds of computers in Asia to execute what's known as a denial of service attack on sites where its pilfered data is available, according to two people with direct knowledge of the matter.To read this article in full or to leave a comment, please click here Read More
 

Net neutrality supporters disrupt FCC meeting
About a dozen protestors calling on the U.S. Federal Communications Commission to pass net neutrality rules disrupted the commission's meeting for a short time Thursday.Protestors shouting and carrying signs interrupted the beginning of the FCC's meeting as commissioners were hearing from staff members, teachers and administrators about proposed changes to the agency's E-Rate program, which subsidizes broadband service for schools and libraries.Protestors called on the FCC to vote to reclassify broadband as a regulated utility under Title II of the Communications Act. "We need to have Title II on the agenda," one protestor shouted. "We need to guarantee net neutrality!"To read this article in full or to leave a comment, please click here Read More
 

Cisco sees a data analytics fortune at the edge of the network
If you need to know when holiday shoppers are about to hit the checkout stands or when store shelves need to be stocked, Cisco Systems says a router can tell you.The company that commercialized routers 30 years ago is now using them to bring big-data analysis to the edges of networks, where some types of data may be priceless for a few seconds but not worth storing or sending to a cloud.That's one piece of Cisco Connected Analytics for the Internet of Everything, a set of new and existing capabilities that the company is introducing as a portfolio on Thursday. CEO John Chambers and services chief Edzard Overbeek are set to do the unveiling at an event at Cisco headquarters, a measure of the importance Cisco places on its Internet of Everything (IoE) vision, which it pegs as a US$19 trillion economy-wide opportunity over the next 10 years. Analytics is a $7.3 trillion chunk of that, the company says.To read this article in full or to leave a comment, please click here Read More
 

FIRST LOOK: IBM and Apple's new enterprise apps for iOS
Getting work doneApple and IBM announced a suite of powerful new business-focused mobile apps for iOS this week. While that shouldn't really surprise anybody – smartphones and tablets have become increasingly central to the business world over the past few years – these apps have taken the possibilities a lot further than simply having email and a GPS in an employee's pocket. Have a look.To read this article in full or to leave a comment, please click here Read More
 

 

INSIDER
Why disaster recovery planning can save lives
From Katrina to Sandy, tornadoes in the planes, flooding in the south, wildfires throughout the West, natural disasters threaten our world with destruction every year. The cost to rebuild and recover is phenomenal, so companies across the globe are investing in disaster recovery solutions to mitigate their losses and protect their data from these cataclysmic events.To read this article in full or to leave a comment, please click here(Insider Story) Read More
 

 

Top 10 tech stories of 2014
Backlash! Disrupting the disruptorsImage by ShutterstockBlowing up entrenched business models and picking up the profits that spill onto the floor is a time-honored tradition in tech, these days known by the cliche of the moment, "disruption." This year everyone was trying to push back against those upstarts, whether by buying them like Facebook did, reorganizing to compete with them like HP and Microsoft have done, or just plain going out against them guns blazing, as it seemed that every city and taxi company did with Uber.To read this article in full or to leave a comment, please click here Read More
 

Cisco Acquires Neohapsis: A Sign of the Times
  Yesterday, Cisco Systems announced the acquisition of Neohapsis, a Chicago-based security consulting and services firm.  Now Cisco's forte is in moving bits from source to destination and inspecting packets to enforce security rules and policies.  So why is an equipment manufacturer buying a cybersecurity body shop?  Several reasons: Security skills are in short supply.  ESG research indicates that 25% of organizations have a problematic shortage of IT security skills and this isn't likely to change anytime soon (note:  I am an ESG employee).  Given this, every CISO I speak with is going over their security requirements with a fine-tooth comb and figuring out where they can use external security services to supplement internal skills or offload tasks.  Network security is getting more difficult.  Aside from a general lack of security skills, CISOs are also being asked to make security decisions for mobile computing, cloud applications, and software-defined networks.  This is heady and esoteric stuff!  Large organizations need help securing leading-edge technology initiatives sooner rather than later. Enterprises are building plans for an integrated infosec architecture.  Large organizations don't want to buy more one-off threat management point tools from a potpourri of vendors.  Rather, they are in the process of building an integrated security architecture featuring central command-and-control and distributed enforcement, anchored by security intelligence and analytics.  This is a relatively new technology model – more art than science.  CISOs need help in all areas of their planning here:  Design, test, implementation, integration, support, etc.  Security services demand was front-and-center in a recent ESG research report on network security.  Enterprise security professionals (i.e. those working at organizations with over 1,000 employees) were asked to identify the types of network security services that would be most helpful for their organizations.  Respondents said that they need help in a multitude of areas:To read this article in full or to leave a comment, please click here Read More
 

Weird science: The 10 oddest tech stories of 2014
Weird science: The 10 oddest tech stories of 2014 Image by hitchBOTEvery now and again, strange events from the world of high tech bubble over to the general news cycle and make headlines for a day or two. No doubt these crossover hits favor reports that enforce the general populace's sentiment that technologists are fringe lunatics with their eyes on our collective future demise. This phenomenon has become more common in recent years as the intersections of technology and pop culture have become busier and more crowded. In 2014, plenty of technology weirdness cycled through the "odd news" section of mainstream media outlets. But for the real connoisseur of weird tech news, there's a very specific sweet spot.To read this article in full or to leave a comment, please click here Read More
 

 

SLIDESHOWS

Cisco's top 10 innovations over the years

A look back at Cisco's most innovative moves in its 30 years in the industry.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Cisco buying Neohapsis to boost security services

2. The POODLE flaw returns, this time hitting TLS security protocol

3. 11 technologies Apple has killed

4. Apple iOS 8.1.2 for iPhone, iPad addresses disappearing ringtones mystery

5. VCs bet $33M you'll want to use Avi Networks' white box hardware for app delivery

6. Patch Tuesday Dec 2014: 7 fixes, 3 critical patches for Windows, IE and Office

7. Peeping into 73,000 unsecured security cameras thanks to default passwords

8. 15 essential open source tools for Windows admins

9. 5 information security trends that will dominate 2015

10. What happens next in the Cisco suit against Arista


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments:

Post a Comment