Companies don’t need another spreadsheet of dozens of data points that must be cobbled together; they require tools that can provide data with a purpose, pointing leadership toward actionable insights that can improve productivity and efficiency. Programováno od www.anarchista.xyz Hledejte NEJLEVNĚJI na HEURÉCE www.heureka.cz
The European Union’s General Data Protection Regulation (GDPR) has shifted attention to the security and privacy of customer data. But more importantly, the regulation calls for enterprises to assess existing data security policies, processes and enforcement mechanisms — a practice that in my experience generally gets completed moments before an audit. Data Security Takes the […]
When my dad fell ill last year, I was confronted with a bewildering set of new challenges for which I wasn’t prepared. What therapies were available? What kind of support would he need? How could I balance caring for him with my other responsibilities? I found answers to these questions and many other others in […]
For your weekend reading, here are the most popular stories that appeared on Data Center Knowledge this week. Programováno od www.anarchista.xyz Hledejte NEJLEVNĚJI na HEURÉCE www.heureka.cz
New silicon due out later this year, will include integrated capabilities to mitigate the Spectre CPU vulnerabilities. Programováno od www.anarchista.xyz Hledejte NEJLEVNĚJI na HEURÉCE www.heureka.cz
GDPR doesn’t prescribe how to protect data, but EU regulators still judge whether you took sufficient precautions. Programováno od www.anarchista.xyz Hledejte NEJLEVNĚJI na HEURÉCE www.heureka.cz
I will be attending IBM Think 2018 next week, and I hope to meet some of my readers there. The event offers attendees the opportunity to learn about new developments in many areas of study, rub elbows with technology experts and peers, attend illuminating sessions and much more. Top Reasons to Attend the Think 2018 […]
A new species of pygmy squid was discovered in Western Australia. It’s pretty cute. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Tags: squid Posted on March 16, 2018 at 4:10 PM • 16 Comments
Microsoft is looking to target new speculative execution side channel vulnerabilities – similar to Spectre and Meltdown – with a new bug bounty program.
Matt Tait gives a list of examples throughout history where politically motivated groups have used disinformation and hacking as part of a campaign to shape public opinion.
Intel is introducing hardware-based protections to its new chips to protect against the Spectre and Meltdown flaws that rocked the silicon industry when they were announced in early 2018.
Mark • March 17, 2018 8:08 PM @echo@D-503 You should definitely try penetration testing a blood collection lab from a theoretical perspective, with a man in the middle attack, on the blood sample, the transportation process, the end testing lab, the assay they use, the accuracy of the assay, the lab returning the results to […]
Companies embrace the digital economy because it allows them to connect with more customers, devices and data than ever before. From a business perspective, this means making decisions quickly based on market opportunity and customer experience, as well as collaboration through the free flow of information. In this new economy, the imperative is to continuously […]
Despite setbacks hackers behind GandCrab malware are pushing ahead with lucrative new ransomware strain thanks to quick-and-dirty agile development approach.
Artificial intelligence technologies have the potential to upend the longstanding advantage that attack has over defense on the Internet. This has to do with the relative strengths and weaknesses of people and computers, how those all interplay in Internet security, and where AI technologies might change things. You can divide Internet security tasks into two […]
Many companies that exhibited at Data Center World announced new products to the 1,600 attendees of the conference in San Antonio. Programováno od www.anarchista.xyz Hledejte NEJLEVNĚJI na HEURÉCE www.heureka.cz
Compliance is no longer the check-in-the-box activity that it was before. With the looming deadline of May 25, the General Data Protection Regulation (GDPR) is getting a lot of attention. As technology becomes pervasive, regulators across the globe are making security and compliance regulations stringent — and the cost of noncompliance unbearable. For the first […]
VMware’s latest Cloud Foundation release is designed to appeal to customers hungry for more efficient management of their hybrid cloud environments. Programováno od www.anarchista.xyz Hledejte NEJLEVNĚJI na HEURÉCE www.heureka.cz
Researchers highlight a privately held traffic distribution system tool for malware called BlackTDS that lowers the bar to entry for threat actors.
One of the effects of GDPR — the new EU General Data Protection Regulation — is that we’re all going to be learning a lot more about who collects our data and what they do with it. Consider PayPal, that just released a list of over 600 companies they share customer data with. Here’s a […]
Attracted by access to networks, data center builders have flocked to Northern Virginia over the years, creating a unique ecosystem that continues growing. Programováno od www.anarchista.xyz Hledejte NEJLEVNĚJI na HEURÉCE www.heureka.cz
The dreaded childhood question: What do you want to be when you grow up? Chances are you remember being asked this repeatedly throughout your childhood and adolescence. But how many of you actually knew in middle or high school what you wanted to be? Did you want to be a doctor, firefighter, police officer, lawyer […]
There are multiple projects within OpenStack now for container deployment and management. Programováno od www.anarchista.xyz Hledejte NEJLEVNĚJI na HEURÉCE www.heureka.cz
E-Mailing Private HTTPS Keys I don’t know what to make of this story: The email was sent on Tuesday by the CEO of Trustico, a UK-based reseller of TLS certificates issued by the browser-trusted certificate authorities Comodo and, until recently, Symantec. It was sent to Jeremy Rowley, an executive vice president at DigiCert, a certificate […]
Pilot program may lay groundwork for automating major part of hardware supply chain operations Programováno od www.anarchista.xyz Hledejte NEJLEVNĚJI na HEURÉCE www.heureka.cz
Imagine you’re a cyberthreat investigator tasked with protecting the sensitive information of your customers. It’s a typical weekday afternoon when you notice suspicious network activity involving an unfamiliar domain. Something just doesn’t seem right about it, so you want to learn more about the domain before you decide if it is malicious. You want to […]
Blog > Greyshift Sells Phone Unlocking Services Here’s another company that claims to unlock phones for a price. Tags: encryption, iOS, iPhone, locks, phones Posted on March 12, 2018 at 2:27 PM • 3 Comments Comments Subscribe to comments on this entry Photo of Bruce Schneier by Per Ervland. Schneier on Security is a personal website. […]
At the Security Analyst Summit this year in Cancun, FireEye’s Marina Krotofil talks about the Triton malware, first disclosed in December 2017, that targets industrial control systems.
Blog > Two New Papers on the Encryption Debate Seems like everyone is writing about encryption and backdoors this season. I recently blogged about the new National Academies report on the same topic. Here’s a review of the National Academies report, and another of the East West Institute’s report. EDITED TO ADD (3/8): Commentary on the […]
For your weekend reading, here are some of the most popular articles that appeared on Data Center Knowledge this week. Programováno od www.anarchista.xyz Hledejte NEJLEVNĚJI na HEURÉCE www.heureka.cz
Researchers have uncovered a new cyber-espionage threat that uses MikroTik routers as a springboard to launch attacks within a network.
In terms of cloud applications, and the data centers that support them, compartmentalization is the ability to physically segment applications supporting hardware and network. Programováno od www.anarchista.xyz Hledejte NEJLEVNĚJI na HEURÉCE www.heureka.cz
Several new cybersecurity regulations that focus on establishing precise control of access to sensitive information will enter the playing field in 2018. While this is all well and good, fraudsters can easily bypass this approach. How? By stealing user identities. Security leaders must ask themselves some tough questions if they hope to achieve compliance before […]
Dell reported it 2017 financial results with revenues rising by 28 percent. Programováno od www.anarchista.xyz Hledejte NEJLEVNĚJI na HEURÉCE www.heureka.cz
Here’s an hour-long audio interview with squid scientist Sarah McAnulty. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Tags: audio, squid Posted on March 9, 2018 at 4:22 PM • 3 Comments
A new analysis of the Russian-speaking Sofacy APT gang shows a continual march toward Far East targets and overlapping of activities with other groups such as Lamberts, Turla and Danti.
Hanwha is patching 13 vulnerabilities in its SmartCam security camera that allows attackers to take control of the device, use it to gain further network access or just brick it.
OURSA Conference Responding to the lack of diversity at the RSA Conference, a group of security experts have announced a competing one-day conference: OUR Security Advocates, or OURSA. It’s in San Francisco, and it’s during RSA, so you can attend both. Tags: conferences, RSA Posted on March 9, 2018 at 6:24 AM • 21 Comments
Partners offer to address telcos’ edge data center needs for them Programováno od www.anarchista.xyz Hledejte NEJLEVNĚJI na HEURÉCE www.heureka.cz