Mon.Oct 24, 2016

article thumbnail

DDoS Attacks: What Happened And What We Should Do About It

CTOvision

Bob Gourley. The security community has been watching the DDoS threat grow to incredible levels. DDoS attacks are up 75% over last year. Over 30% of attacks reach sustained peaks of over 10 Gbps, an amount that will swamp most every business user. Some very large attacks have gone as high as 600 Gbps, a size that is overwhelming to the largest infrastructure providers.

Internet 249
article thumbnail

Dyn DDoS attack highlights vulnerability of global internet infrastructure

Computer Weekly

Last week’s DDoS attack on DNS firm Dyn has highlighted both the vulnerability of the world’s internet infrastructure, and the dangers of leaving internet of things devices unsecured

Internet 188
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Business Users Should Do To Mitigate DDoS Threats

CTOvision

Bob Gourley. Businesses have long known of the threats of DDoS to their operation, and the security community has been watching this threat evolve to the point where we all need to take collective action to prevent attack. Businesses of every size need to know what devices you have and what you have them for. This gets hard but must be done if you are to optimize your IT.

Firewall 225
article thumbnail

UK National Cyber Security Centre a positive development, says CNI expert

Computer Weekly

There needs to be greater understanding of cyber threats facing business, and the UK's new National Cyber Security Centre is a step in the right direction, says CNI expert Barrie Millett

Security 185
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Why Measure the Value of an Organization’s Information?

CTOvision

Dennis D. McDonald. Information value. CTOvision.com recently posted an interesting article by John Mancini titled Putting a value on your company information. In it Mancini says, it is imperative that standard models to measure information are introduced as a matter of urgency in this digital age. But two major hurdles stand in the way: how to measure the value of information you don’t control and understanding that it can only realistically be measured in the context in which it is being used.

Data 218
article thumbnail

In the digital era, customer identity is key

Computer Weekly

Identity is vital for presenting a consistent customer relationship across digital channels, but not everyone in all organisations understands this shift, according to identity veteran Ian Glazer

185
185

More Trending

article thumbnail

More than 100 MPs ask Obama to halt extradition bid against Lauri Love

Computer Weekly

UK MPs across all parties call for US President to save activist from extradition to the US on hacking charges on humanitarian grounds

200
200
article thumbnail

What Local, State, Federal Governments Should Do To Mitigate DDoS Threats

CTOvision

Bob Gourley. Governments have special roles in helping prevent DDoS attacks. Governments at Local, State and Federal Levels have massive infrastructures that should be protected to help prevent DDoS on others and they have important citizen-facing missions that need protection themselves. Governments can also help us all take collective action. We have all been tracking the the threats of DDoS evolve to the point where we all need to take collective action to prevent attack.

article thumbnail

UAE telco launches mobile wallet

Computer Weekly

Etisalat signs deal with technology company to offer its customers a mobile wallet service, as fintech expands in the Middle East

Mobile 204
article thumbnail

O’Reilly Security Conference NYC Oct 30- Nov 2

CTOvision

Bob Gourley. The O'Reilly Security Conference is the best place on Earth to learn how to build better defenses to protect your data, systems, privacy, and more. You’ll have the opportunity to learn from leading minds in security, like Katie Moussouris and Nick Sullivan (see full speaker line-up) on important subjects like machine learning, cloud security, Docker security, incident response, patch management, cryptography, encryption and much more (see full schedule).

article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

GDS faces review by public spending watchdog

Computer Weekly

National Audit Office wants to review Government Digital Service's relations with Whitehall departments as a result of 2015 rural payments IT problems

article thumbnail

How to Leverage AWS as a Secondary Data Center

Data Center Knowledge

For many enterprises today, running a standalone traditional data center doesn’t cut it. Customers and business partners demand and expect externally-facing applications to be available and performing around the clock. Read More.

article thumbnail

Self-driving taxi roll-out in Singapore gathers intelligence

Computer Weekly

Autonomous vehicle startup nuTonomy launched a fleet of self-driving taxis in Singapore in August

205
205
article thumbnail

Rackspace Boosts International Team, Opens Munich Office

Data Center Knowledge

Reinhard Waldinger has been promoted to Managing Director, International, and Alex Fuerst, Regional Leader for DACH. Read More.

171
171
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Microsoft hikes UK enterprise software and cloud prices as pound tumbles

Computer Weekly

The software giant's policy of harmonising prices across Europe means charges go up from 1 January 2017

Software 180
article thumbnail

Chinese Firm Says Its Cameras Were Used to Take Down Internet

Data Center Knowledge

Xiongmai says all cameras it made before September 2015 were potentially vulnerable. Read More.

Internet 174
article thumbnail

A must-read IT security handbook: TAG Cyber's massive 2017 guide

Tech Republic Security

TAG Cyber CEO Dr. Edward Amoroso has created a 1,200+ page resource for cybersecurity pros. The handbook includes tech recommendations on 50 controls, interviews, and vendor lists.

Handbook 167
article thumbnail

Was Friday’s DDoS Attack Part of a Troubling Trend?

Data Center Knowledge

The unfortunate thing is that last week’s event is not isolated. Read More.

Trends 174
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Interview with a hacker: S1ege from Ghost Squad Hackers

Tech Republic Security

Ghost Squad Hackers has emerged as one of the world's most influential indie hacking teams. S1ege, the group's 'administrator,' explains his tactics, how the group works, and the ethics of hacking.

Groups 131
article thumbnail

Brexit bombshell: Microsoft raises cloud pricing 22% for UK businesses

Tech Republic Cloud

Microsoft recently announced a price hike for British customers purchasing enterprise software and cloud services due to the fall of the pound after the Brexit vote. Here's what you need to know.

Microsoft 123
article thumbnail

Dyn DDoS attack: 5 takeaways on what we know and why it matters

Tech Republic Security

On October 21, a Distributed Denial of Service attack on Dyn took many key web properties such as Twitter and Netflix offline. Here are some more details on the attack and the breadth of its impact.

129
129
article thumbnail

SnapChat, Skype among worst messaging apps for not respecting users’ right to privacy

Network World

Amnesty International set out to determine which technology companies met “their human rights responsibilities in the way they use encryption to protect users’ online security.” The research resulted in ranking messaging apps of 11 tech companies based on the use of encryption to protect users’ privacy. According to the detailed list of Message Privacy Rankings ( pdf ), Facebook did the best, scoring 73 out of 100 for WhatsApp and Facebook Messenger.

Apple 103
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

New Mastercard feature that lets you pay with a selfie coming to North American market

Tech Republic Security

Mastercard will debut Identity Check Mobile, which allows mobile users to verify their identity for mobile payments with a selfie or fingerprint, in North America in early 2017.

Mobile 107
article thumbnail

White House: Small satellites bring “Moore’s Law” into space

Network World

Small satellites, sometimes called cubesats or just smallsats are a very popular way of getting inexpensive communications and surveillance into space quickly. Looking to bolster that notion, the White House recently revealed a number of program that it says will help drive the use of smallsats even further. The White House Office of Science and Technology Policy (OSTP) announced what it called the “Harnessing the Small Satellite Revolution” initiative, which basically brings together National A

Policies 100
article thumbnail

Report: Android and iOS apps both leak private data, but one is definitely worse for the enterprise

Tech Republic Security

iOS apps are actually leaking more data than Android apps, with one important qualifier: The countries where the most leaks are happening.

Data 118
article thumbnail

Lyft customers face potential hack from recycled phone numbers

Network World

Giving up an old cell phone number for a new one may seem harmless. But for Lyft customers, it can potentially expose their accounts to complete strangers. That's what happened to Lara Miller, a media relations specialist living in California. Earlier this month, she discovered two credit card charges made in Las Vegas, over 400 miles away. "I thought it was legit fraud on my debit card," Miller said.

Media 99
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Electronic health records: The new gold standard for cybercriminals

Tech Republic Security

Electronic health record (EHR) systems are being compromised by script kiddies, cybercriminals, self-radicalized threat actors, and nation states. Learn how and why.

System 108
article thumbnail

Answers to ‘Is the internet broken?’ and other Dyn DDoS questions

Network World

The massive DDoS attacks that took down internet address-translation service Dyn and its customers last week raise a lot of need-to-know questions about the overall security of online infrastructure and its performance. While the attacks were ultimately mitigated and have subsided, the means for carrying out others are still viable and could crop up at any time with other targets.

article thumbnail

Video: Top 5 ways Brexit will affect tech

Tech Republic Cloud

Tom Merritt examines five ways Brexit could affect the tech landscape, including EU regulation, data portability, IT hiring, and more.

Video 99
article thumbnail

New products of the week 10.24.16

Network World

New products of the week Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow. The Back-UPS battery backup Key features: APC by Schneider Electric’s new Back-UPS battery backup solutions are designed to deliver reliable/secure power protection for wireless networks, computers and other home/business electronics to help users stay connected.

Backup 95
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.