Tue.Jun 06, 2017

article thumbnail

For More Cyber Operations Wins, Cheat…

Forrester IT

Before my last deployment (quite a while ago, thankfully) my unit was training on a variety of tactics to make us all more effective in an operational setting. That's the long way of saying we were all getting PT'd repeatedly and learning how terrible we were at stopping the bad guys, luckily we all got better as time went on. Anyway. One of the most valuable lessons we learned from working with the guys in some of the more "special" operational roles was that things shouldn't be fair.

Strategy 309
article thumbnail

Executive interview: Brian Kelly, chief security officer, Rackspace

Computer Weekly

The IT security business is a cat-and-mouse game to thwart attacks, and arm-wrestling determined hackers who adapt their code until they succeed, says Rackspace CSO

Security 247
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Three attributes a serial technology CEO looks for in a CTO

CTOvision

The Chief Technology Officer is now a core member of any C-suite, and needs to combine the traditional skills of technical know-how with a business-savvy approach and heightened product awareness. As a CEO, it can be tough to differentiate between highly-skilled CTO candidates, but viewing potential hires through the lens of these three competencies will […].

CTO 172
article thumbnail

Tieto and Verisec to develop eID for Sweden’s public sector services

Computer Weekly

Suppliers are reacting to the rapid adoption of digital government in Sweden with electronic ID technology that will replace passwords

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

CTOvision Assessment On The Megatrend of Mobility

CTOvision

There are seven key megatrends driving the future of enterprise IT. You can remember them all with the mnemonic acronym CAMBRIC, which stands for Cloud Computing, Artificial Intelligence, Mobility, Big Data, Robotics, Internet of Things, CyberSecurity. In this post we dive deeper into the trend of Mobility. This is the greatest leap in humanity's ability to stay connected since the advent of […].

Mobile 168
article thumbnail

Infosec17: Recruit agile people for agile security teams

Computer Weekly

Organisations should enlist agile people to join agile security teams that are able to deal with the continually changing cyber threat landscape, say security team leaders

Agile 195

More Trending

article thumbnail

Network tech helps BT customers cut carbon emissions

Computer Weekly

Telco claims it is now making 22% of its total group revenues from products contributing to the reduction of carbon emissions

Network 221
article thumbnail

Cloud-Based UC - Will You Really Save Money?

IT Toolbox

This is a big question for any cloud deployment, and at face value, you might assume the answer to be “yes” During my last series, I examined four distinct drivers – reasons – for deciding to use the cloud for collaboration. In most cases, that will mean deploying UC, but it could also apply to other solutions, such as CPaaS or team messaging.

Cloud 164
article thumbnail

Lloyds bank staff will move to IBM in outsourcing deal

Computer Weekly

About 1,500 IT staff at Lloyds Banking Group will join IBM as part of an IT infrastructure outsourcing agreement

IBM 217
article thumbnail

Three Big Misconceptions About Secondary Storage

Data Center Knowledge

An effective archiving solution must offer fast restores so both IT and business users can feel confident archiving data. Read More.

Storage 171
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Insurance giant Allianz opens up about how DevOps success is fueling its move to cloud

Computer Weekly

The German financial services giant reveals details of how a year-long push to embrace DevOps has set the scene for a move to cloud

Devops 184
article thumbnail

Vyatta Is Solid Tech, but AT&T May Be Late to the Game

Data Center Knowledge

In a crowded market, AT&T will face some stiff competition to do more with the Vyatta brand for enterprise users Read More.

article thumbnail

UK voters worried that election will be targeted by hackers

Computer Weekly

Online voting is being held back in the UK because of fears that cyber criminals could influence the results

193
193
article thumbnail

Local internet VoIP support goes under the scope

IT Toolbox

VoIP services rely heavily on the relative speed of an internet service provider – poor bandwidth can swiftly translate into jitter and/or unstable calls. For businesses, this can quickly lead to lost customers or being saddled with a VoIP system incapable of working properly with available bandwidth.

VOIP 133
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

UK firms stockpiling bitcoins for ransomware attacks

Computer Weekly

Large UK firms are prepared to pay out more than £136,000 on average to cyber criminals who launch ransomware attacks, a survey has revealed

Survey 164
article thumbnail

How to Connect with your Clients on Social Media

IT Toolbox

When you develop a marketing strategy, one of your main goals is usually forming a direct connection with your customers. You want your customers to feel respected and appreciated by your business, and see how your products or services are instantly relevant to their lives.

Media 128
article thumbnail

Vodafone mobilises against fake news and hate speech

Computer Weekly

Mobile network operator has introduced new global rules to prevent its advertising from appearing on outlets that create and share hate speech and fake news

article thumbnail

Can Technology Push Your Body Too Far?

IT Toolbox

We’re moving fast into the future, as far as technology is concerned. In many ways, our great technological advancements are making our lives easier and more enjoyable. However, in other ways, our advances are doing harm to our bodies. Devices like smartphones have been shown to pose a significant health risk to our bodies.

128
128
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Cybersecurity researchers claim every network router at risk of secretly leaking data

Tech Republic Security

Researchers at Ben-Gurion University of the Negev recently demonstrated a hacking technique that utilizes a router's LED to transmit sensitive information.

Research 148
article thumbnail

Innovation in the Broadband Business

IT Toolbox

Broadband is no longer a premium service but a basic need, and in some cases, government-mandated. Furthermore, internet usage is changing from a service-consumed through fixed locations to a service that is used ubiquitously. The broadband industry needs to step up their game if they want to catch up.

Internet 128
article thumbnail

Report: 10 trends in application security that will impact your cyberdefense strategy

Tech Republic Security

At Infosecurity Europe 2017, High-Tech Bridge reported on the latest cybersecurity trends, touching on mobile and IoT security, DevSecOps, Bug Bounties, OWASP Top Ten and encryption.

Trends 137
article thumbnail

Seven Qualities of Collaboration that Enhance ERP Integration Success

IT Toolbox

Collaboration flourishes when individuals are open-minded, strategic, respectful, communicate effectively, and remain patient with individual competencies. Organizational traits that facilitate collaboration are an orientation towards and expectation for compromise, teamwork, and trustworthiness.

124
124
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Object storage will be 'huge' in stateless world of web and mobile

Computer Weekly

SNIA Europe director says traditional SAN and NAS are not built for the stateless world of web-based apps and workloads, with object storage set to become dominant

Storage 118
article thumbnail

First Data moves into ERP with CardConnect purchase

IT Toolbox

In a move toward better integration with enterprise resource planning systems, card payment processor First Data is acquiring financial tech start-up CardConnect for $750 million.

Data 113
article thumbnail

Researchers find gaps in IoT security

Network World

Researchers from the University of Michigan and Stony Brook University published a paper explaining a novel approach to IoT security challenges (pdf). The researchers pose the question: “What are the new intellectual challenges in the science of security when we talk about the Internet of Things, and what problems can we solve using currently known security techniques?”.

Research 129
article thumbnail

Partnership paves way for more streamlined VoIP set-up

IT Toolbox

Many service providers spend a great deal of time and effort implementing VoIP networks at customer businesses, but in fact much of this task set can be automated. For example, under a new partnership automation specialist Phonism is bringing its VoIP provisioning and management services to customers of Accent’s VoiceOne cloud services.

VOIP 114
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Apple Pay: The smart person's guide

Tech Republic Security

Apple Pay is a mobile payment solution that's accepted by millions of retailers in various countries. This guide covers what you need to know to use Apple Pay.

Apple 133
article thumbnail

The OTA Has Good Intent, But Will its Campaign Be Effective?

IT Toolbox

To fight the potential danger, a new report from the Online Trust Alliance calls for businesses, consumers, and governments to work together to keep IoT devices from being weaponized.

article thumbnail

HSBC launches global social network for businesses

Computer Weekly

HSBC Bank is helping its business customers connect with potential partners through a digital hub

Social 127
article thumbnail

#NSW17 SuiteSuccess - Netsuite's Better Way

IT Toolbox

SuiteSuccess appears to be a significant advance for Netsuite, and possibly a clue to a better way to producticize and deliver services in the cloud application space.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.