Thu.Oct 27, 2016

article thumbnail

The Shifting Cyber Attack Target Set And Why It Matters To The Mid-Sized Business

CTOvision

Bob Gourley. For years now the firms with the most to lose by cyber crime have been investing in cyber defense technologies, techniques and procedures designed to mitigate threats. Motivation do enhance defenses has largely been directly correlated to the potential for loss. Resources put on cybersecurity and threat mitigation has been correlated to size of a business.

article thumbnail

Dyn reveals details of complex and sophisticated IoT botnet attack

Computer Weekly

DNS services provider Dyn, which was the victim of a large-scale DDoS attack perpetrated by an IoT botnet earlier in October, discusses details of its experience

204
204
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Are Your Agency’s Management Tools Defeating Your Efforts?

CTOvision

AJ Morris. Poor employee performance might be a result of poor choice of tools. Here are a few signs it might be time to look for some new ones. What does your agency’s workflow look like? Are your employees happy, productive, and efficient, or do they frequently struggle to get work done? Are tasks completed in a timely fashion, or do your teams run into frequent bottlenecks?

Tools 212
article thumbnail

GDS loses yet another senior leader as CTO Andy Beale quits

Computer Weekly

Government Digital Service chief technology officer Andy Beale is the fifth senior executive to leave since appointment of new chief Kevin Cunnington

CTO 191
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Storage Innovations Spur a Second Look at Cloud and On-Premise Options

Data Center Knowledge

Recent changes in the storage market have weakened the argument that storage in the public cloud is the only cost-effective option. Read More.

Storage 184
article thumbnail

Open source no longer scares the enterprise

Computer Weekly

Open source breaks the rules on corporate procurement, but developers never play by the rules and now open source has sneaked in through the back door

More Trending

article thumbnail

Information security set for steep trajectory, says (ISC)2

Computer Weekly

By helping to create a thriving, diverse and open information security community, (ISC)2 hopes to ensure a steep rise for the profession

article thumbnail

IBM CEO Says Watson Stands Out by Protecting Clients’ Data

Data Center Knowledge

Rometty sees proprietary data combined with AI as the competitive advantage for companies going forward. Read More.

IBM 167
article thumbnail

Galaxy Note7 recall hits Samsung’s profits, but not market lead

Computer Weekly

Samsung retained its smartphone market leadership in the third quarter despite recalling and scrapping the Galaxy Note7 and taking a 30% hit in operating profit

178
178
article thumbnail

Delete unused Android apps now, or risk a security nightmare

Tech Republic Security

Your Android device most likely contains unused apps that could still use data or fall prey to vulnerabilities. The solution to this potential security problem: delete those apps.

Security 164
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

BT reports solid growth despite weak pound

Computer Weekly

The collapse in the value of the pound following the EU referendum has not dented BT’s confidence, with strong growth reported across multiple business units

Report 174
article thumbnail

Report: CenturyLink and Level 3 in Merger Talks

Data Center Knowledge

Deal may be announced in coming weeks, but talks can break down Read More.

Report 180
article thumbnail

Schneider Electric praised for positive response to ICS security flaw

Computer Weekly

Schneider Electric has patched a security flaw that highlights the vulnerability of industrial control systems to cyber attack

Security 182
article thumbnail

Aerohive's new IoT security solution could have blocked Dyn DDoS attacks, company claims

Tech Republic Security

Aerohive Networks recently unveiled a new security offering to protect against network attacks from compromised IoT devices, including botnets like Mirai.

Security 111
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Government launches inquiry into Emergency Services Network

Computer Weekly

The Public Accounts Committee is to scrutinise the controversial Emergency Services Mobile Communications Programme

article thumbnail

Personal data of 550,000 Red Cross blood donors was breached

Network World

The Australian Red Cross said its blood donor service has found that registration information of 550,000 donors had been compromised, which the agency blamed on human error by a third-party contractor. The moot issue at this point, which may decide how the breach unfolds, is that nobody knows how many people have the data. The information from 2010 to 2016 was available on the website from Sept. 5 to Oct. 25. this year.

Data 98
article thumbnail

World wide web inventor Tim Berners-Lee to join Oxford University

Computer Weekly

The University of Oxford has appointed Tim Berners-Lee as a professor at its computer science department

193
193
article thumbnail

Pennsylvania man sentenced to 18 months for celeb hacking

Network World

A Pennsylvania man was sentenced to 18 months in federal prison on charges of hacking the Google and Apple email accounts of over 100 people including celebrities, and getting access to nude videos and photographs of some people. The sentencing against Ryan Collins, 36, of Lancaster is the offshoot of a Department of Justice investigation into the online leaks of photographs of numerous female celebrities in September 2014, widely referred to as "Celebgate.

Backup 96
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Google suspends US FTTP broadband roll-out

Computer Weekly

Google parent Alphabet calls a halt to its roll-out of FTTP broadband in the US as it embarks on a strategic rethink

Google 177
article thumbnail

CIO security lessons: Dark thinking on IoT & exploding enterprise networks

Network World

“How many of you or your staff had trouble getting on the internet Friday?” That was how cybersecurity consultant Bryce Austin kicked off his talk Tuesday at SIMposium 2016, a big gathering of CIOs and IT execs at the Mohegan Sun resort in Connecticut, on the "Unintended Consequences of the Internet of Things." Uncomfortable laughter ensued. Austin, who then went on to make attendees even more uncomfortable, swears that even though his session didn't make the original program, it wasn’t added to

article thumbnail

IDG Contributor Network: Align intelligence, UX and data to power exceptional customer moments

ComputerWorld Consumerization IT

The optimism and demand for innovation has never been higher. We are on the verge of a massive change in the day-to-day experiences of employees and customers as applications become more cognitive, but there is significant work to be done. Today, our most advanced applications are intelligent. Look no further than IBM Watson or Salesforce Einstein A.I.

Data 95
article thumbnail

The secret behind the success of Mirai IoT botnets

Network World

There’s no magic behind the success of Mirai DDoS botnets that are made up of IoT devices: the software enabling them is publicly available, which makes it easy for relatively inexperienced actors to create them and turn them loose on anyone. Flashpoint speculates that the attacker in the case of the Dyn DDoS, which had an enormous impact on major Web sites, was the work of low-skilled script kiddies – a frightening prospect that contributes to Trend Micro’s assessment that “the Internet of Thin

Trends 95
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Demystifying the “black box”: a look at hiring in the VC world

The Investing Edge

Last week, we announced that Baiyin Zhou joined Ascent Venture Partners as our newest senior associate. This is particularly exciting because adding to our team is the most important thing we do – and it’s not something we do often. Baiyin is our first new investment team member in 10 years. At Ascent, we treat hiring very seriously, and our process reflects this.

article thumbnail

No need to shoot down drones! Many of them can now be hijacked

Network World

A security researcher has devised a method of hijacking a wide variety of radio- controlled airplanes, helicopters, cars, boats and other devices that use a popular wireless transmission technology. The attack was developed by Jonathan Andersson, manager of the Advanced Security Research Group at Trend Micro DVLabs, and targets a "wideband, frequency-agile 2.4GHz signal protocol" called DSMx.

article thumbnail

BlackBerry is focusing on security and software with the new DTEK60 phone

Tech Republic Security

BlackBerry's new Android phone is intended to feature security functions a step above the competition.

article thumbnail

DARPA looking to develop drone destroying, personnel protection system

Network World

Looking to protect military personnel from a swarming drone attack is the goal behind a new system that the researchers from the Defense Advanced Research Projects Agency are set to develop. The three-phase program, called Mobile Force Protection will in the next few years potentially develop a prototype system that could sense an attack, identify the attacker and then use a number of techniques, from communications jamming to capturing mid-flight any attacking drones.

System 95
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Demystifying the “black box”: a look at hiring in the VC world

The Investing Edge

Last week, we announced that Baiyin Zhou joined Ascent Venture Partners as our newest senior associate. This is particularly exciting because adding to our team is the most important thing we do – and it’s not something we do often. Baiyin is our first new investment team member in 10 years. At Ascent, we treat hiring very seriously, and our process reflects this.

article thumbnail

The FIDO Alliance provides strong authentication for online services  

Network World

This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe. For many security professionals, passwords are the scourge of the authentication world, and their death can't come soon enough. Passwords are too often stolen, shared, forgotten or simply too weak or obvious to be effective. According to the 2016 Verizon Data Breach Investigations Report, 63% of confirmed data breaches involve the use of weak, default or stolen passwords.

article thumbnail

When coffee makers attack

ComputerWorld IT Management

It was shocking to learn that the recent distributed denial-of-service attack of the nation’s internet infrastructure via DNS provider Dyn was aided and abetted by a hijacked army of products from the internet of things. It is thought to be the first DoS attack to rely overwhelmingly on a lot of “dumb” appliances that have little processing power of their own but are connected to the internet.

article thumbnail

Malware from Friday's DDoS attack continues to harass in short bursts

Network World

It's still unclear who pulled off Friday's massive internet disruption, but the malware largely responsible for the cyber attack has since assaulted new targets -- possibly including video gamers. Since last Friday, botnets created by the Mirai malware have been launching distributed denial-of-service attacks at seemingly random targets, in short bursts, according to a security researcher who goes by the name MalwareTech.

Malware 93
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.