Get the ECT News Network Weekly Newsletter » View Sample | Subscribe
Welcome Guest | Sign In
TechNewsWorld.com
Multi-Cloud Strategy May Pose Higher Security Risk: Study
September 6, 2019
Users of a multi-cloud storage strategy may be twice as likely to face a security breach as those that use hybrid or single clouds, suggests a report from UK-based security specialist Nominet. Fifty-two percent of survey respondents who adopted a multi-cloud approach suffered a data breach over the past 12 months, compared to 24 percent of hybrid cloud users, and 24 percent of single-cloud users.
Powerful Enterprise-Class Chromebooks May Make Windows Exit Possible
August 27, 2019
A new collaboration between Dell Technologies and Google has produced the world's first enterprise-class Chromebook. The companies have announced their partnership to bring new capabilities and services to Dell's Unified Workspace strategy. Google launched its Chrome Enterprise capabilities in 2017 to give enterprises critical features like advanced security protections and fleet management.
Cloud Users: Read the Click Agreement Terms
August 26, 2019
There is no data showing how many people actually read through click agreements, terms of service and privacy policies -- collectively "online terms" -- before clicking the alluring "accept" button. However, there's research that indicates fewer than 1 percent of people report taking the time to review online terms. Most folks consider online terms an annoying speed bump and frankly don't care.
Security Pros: Be on High Alert for Certificate Changes
August 22, 2019
They say that the key to good security is constant vigilance. As a practical matter, this means that it's important for security and network pros to pay attention to two things: changes in the threat landscape, so they can be on the alert for how their systems might be attacked; and changes and developments in the technologies they employ. These consequences matter quite a bit.
Avoid a Black Friday, Cyber Monday Disaster With Intelligent Testing
August 19, 2019
Many online businesses rely on Black Friday and Cyber Monday to drive their profit margins. During this four-day period, retailers will see traffic on their site skyrocket. How can retailers make sure their sites are robust and won't fail during this critical period? The answer is to ensure your site is completely bombproof and can handle the surge in load without a problem.
Microsoft Exposes Russian Cyberattacks on Phones, Printers, Video Decoders
August 7, 2019
The Russian hacking group known for stealing sensitive emails from the Democratic National Committee during the 2016 presidential election season has been cracking into printers, phones and video decoders to gain access to corporate networks, the Microsoft Security Response Center Team reported. The group is known by a number of names including "Strontium," "Fancy Bear" and "APT 28."
The Router's Obstacle-Strewn Route to Home IoT Security
July 10, 2019
It is newly minted conventional wisdom that not a single information security conference goes by without a presentation about the abysmal state of IoT security. While this is a boon for researchers looking to make a name for themselves, this sorry state of affairs is definitely not beneficial for anyone who owns a connected device. IoT device owners aren't the only ones fed up, though.
Omnichannel Retail: Big Data Is Nice, Fast Data Is Necessary
May 18, 2019
Any retailer that wants to be competitive knows it must offer a seamless omnichannel experience to its customers. However, many retailers aren't aware that the key to powering that customer experience is IT system performance. Why? Omnichannel retailers must process, analyze and use huge amounts of data for a multitude of equally important functions.
Zombieload, Fallout, and 2 Other CPU Flaws Have Intel on the Hop
May 16, 2019
The high-tech industry once again is in a tizzy over flaws discovered in Intel CPUs -- four new MDS vulnerabilities have come to light. MDS is a sub-class of previously disclosed vulnerabilities that sample data leaked from small structures within the CPU using a locally executed speculative execution side channel. The practical exploitation of MDS flaws is a very complex undertaking, however.
Microsoft Becomes Master of Its Own Linux Kernel
May 9, 2019
Microsoft has announced that its own full Linux kernel will power WSL2, the newest version of the Windows Subsystem for Linux. This marks the first time that Microsoft will include the Linux kernel as a component in Windows. Microsoft also introduced a Windows command line terminal that will add functionality to PowerShell and WSL. Both are intended primarily for developers.
Spring Cleaning Your Network Security
May 7, 2019
Spring may be my favorite time of year. The snow is melting, the sun is shining, and the air smells just a little bit fresher. It's as though the world is setting an example for the rest of us, letting us know that it's time to start fresh. It's time for spring cleaning -- and in the security world, spring cleaning means more than just wiping down countertops and lighting a few scented candles.
4 Techniques for Validating Enterprise Blockchain
January 21, 2019
There's been a lot of hype about blockchain over the past few years. Nowadays though, there are signs that we may be on the cusp of moving from the "blockchain will solve all your problems" segment of the hype cycle into the "blockchain may be useful for a few targeted applications" segment. Utility-based Darwinism is at work -- we're starting to see the less likely applications fall away.
AWS Thinks Inside the Box With Outposts Data Center Revival
November 30, 2018
Amazon introduced AWS Outposts at its AWS re:Invent conference in Las Vegas. The new system, which provides AWS-branded boxes for use in traditional data centers, will allow the company to make advances into the world of on-premises storage, taking on legacy hardware vendors including Cisco, Dell, and Hewlett Packard Enterprise. Outposts technology can run on rival vendors' data center equipment.
Amazon's Shift
November 29, 2018
Andy Jassy, CEO of Amazon Web Services, announced that AWS customers would be off all Oracle databases by the end of 2019 and running on one of Amazon's database products. This is not the first time the market has heard something like this, but this time could be different. The statement comes on the heels of Amazon spending significant coin on Oracle licenses a few months ago.
When Is the Time to Hire a Cyber Specialist?
November 14, 2018
Cybersecurity has been becoming a larger and larger concern for organizations. Nowadays, most organizations -- regardless of size, industry, location, or profit vs. nonprofit status -- find themselves directly or indirectly impacted by cybersecurity. Even though the topic itself is increasing in importance, many smaller organizations don't have specialized security expertise on staff.
Whether Intended or Accidental, Internet Traffic Rerouting Can Be Costly
November 14, 2018
An apparent prefix leak from an errant router misconfiguration caused Google to lose control of several million of its IP addresses for more than an hour on Monday. During the event, Internet traffic was misrouted to China and Russia from Nigeria. The incident initially sparked concerns that it might have been a hijacking. The mishap made Google services unavailable to many users intermittently.
Will Oracle Roil the DB Market?
October 23, 2018
When we write the history of the IT era, the big factor that has played an important but not well recognized role will be hardware -- specifically, the Oracle Exadata appliance that puts databases into memory. All of the cloud software starting with the autonomous database on view this week at OpenWorld would be vastly different if the database was still running primarily on disk drives.
6 Tips for Managing Data Before an Emergency Strikes
October 18, 2018
Think about planning for a natural disaster emergency that might affect your home. You'd likely store some water, flashlights, food, blankets and other essentials. The key element of your planning would be proactivity. You'd do all of the work before an emergency occurred, not during the actual crisis. If your supplies were used up after the emergency passed, then you quickly would restock.
Software Security Best Practices Are Changing, Finds New Report
October 2, 2018
Independent software vendors, along with Internet of Things and cloud vendors, are involved in a market transformation that is making them look more alike. The similarities are evident in the way they approach software security initiatives, according to a report from Synopsys. Synopsys has released its ninth annual Building Security in Maturity Model, or BSIMM9.
Protecting Against 'Natural' Cybersecurity Erosion
September 21, 2018
Every child who's ever played a board game understands that the act of rolling dice yields an unpredictable result. In fact, that's why children's board games use dice in the first place: to ensure a random outcome that is -- from a macro point of view -- about the same likelihood each time the die is thrown. Consider what would happen if someone replaced the board game's dice with weighted dice.
Oracle Releases Second Half of Autonomous DB
August 10, 2018
A lot of people might have thought Oracle's announcement of the autonomous database at last year's OpenWorld and its subsequent release earlier this year were the whole story, but there's a lot more. This week's webcast featuring Larry Ellison was proof. Ellison must find his CTO role -- since he handed the CEO reins to Safra Catz and Mark Hurd -- to be stimulating and liberating at the same time.
Security Economics: The Key to Resilience
July 5, 2018
There are times when looking at something narrowly can be more effective than taking a wider and more comprehensive view. If you don't believe me, consider the experience of looking at organisms in a microscope or watching a bird through binoculars. Distractions are minimized, allowing optimal evaluation and analysis of what's under investigation.
Red Hat Launches Fuse 7, Fuse Online for Better Cloud Integration
June 5, 2018
Red Hat has launched its Fuse 7 cloud-native integration solution and introduced Fuse Online, an alternative iPaaS. Red Hat Fuse is a lightweight modular and flexible integration platform with a new-style enterprise service bus to unlock information. It provides a single, unified platform across hybrid cloud environments for collaboration between integration experts, application developers and business users.
Oracle's Security Jag
June 2, 2018
Oracle has been on a security campaign ever since Larry Ellison openly began discussing the new "autonomous database" -- so called because it can manage itself, including self-patching and upgrading, without human effort. The hands-off database can eliminate human labor to keep it tuned and running, according to Oracle, greatly reducing the time between availability and implementation.
The Cloud's Hazy Security
May 31, 2018
A significant percentage of IT systems are cloud-based, according to a recent survey. The cloud is a key enabler for emerging technology, suggests the CompTIA poll, which was conducted last month. Cloud computing was one of four trends respondents expected to feature heavily in IT conversations over the next 12 to 18 months, the survey found. Others were AI, the IoT and cybersecurity.
DevOps: Plenty of Devs, Not Enough Ops
May 29, 2018
In spite of all the high-profile breaches that seem to sweep the headlines with greater frequency, companies slowly but surely have been getting a handle on internal security practices. At this point, it's hard to imagine any employee, in or out of the tech sector, who hasn't been run through antiphishing training. However, security is only as strong as its weakest link.
Realistic 'Zero Trust' for Your Cybersecurity Program
May 29, 2018
If you're a cybersecurity practitioner, chances are good that you've heard the term "zero trust" over the past few months. If you attend trade shows, keep current with the trade media headlines, or network with peers and other security pros, you've probably at least heard the term. Depending on whom you're talking to, you'll get a different answer about what it is and why it might be useful.
WhiteSource Rolls Out New Open Source Security Detector
May 24, 2018
WhiteSource has launched its next-generation software composition analysis technology, dubbed "Effective Usage Analysis," with the promise that it can reduce open source vulnerability alerts by 70 percent. The newly developed technology provides details beyond which components are present in the application. It provides actionable insights into how components are being used.
Open Source Is Everywhere and So Are Vulnerabilities, Says Black Duck Report
May 15, 2018
Black Duck by Synopsys has released the 2018 Open Source Security and Risk Analysis report, which details new concerns about software vulnerabilities amid a surge in the use of open source components in both proprietary and open source software. The report provides an in-depth look at the state of open source security, license compliance and code-quality risk in commercial software.
Fedora 28 Comes With New Software Options
May 1, 2018
The Fedora Project has announced the general availability of Fedora 28, which introduces a new software delivery system based on a modular repository. The new system provides alternative versions of the software and updates that come with the default release, according to Fedora Project Leader Matthew Miller. It enables users to update specific components at the speed that meets their needs.
See More Articles in Network Management Section >>
Digital River - Start Here. Sell Anywhere.
Which of these topics being featured at CES 2021 interest you most?
5G & Internet of Things
Advertising, Entertainment & Content
Automotive Technologies
Blockchain / Cryptocurrency
Esports / Sports Tech
Health & Wellness
Home & Family
Immersive Entertainment & Gaming
Product Design & Manufacturing
Robotics & Machine Intelligence
Women in Tech