Mon.May 15, 2017

article thumbnail

Data is the perimeter, defend it that way

Forrester IT

Data is the perimeter, defend it that way. Unless you have been living under a rock or possibly hiding in the mountains of Montana with a giant beard and eating way too many government issued MRE's you probably heard about the nuclear bomb of a ransomware attack that kicked off last week. Welcome to the post apocalypse folks. For years, many of us in the cybersecurity industry have been jumping up and down on desks and trying to get the world (writ large) to pay attention to managing and patchin

Data 319
article thumbnail

Cybersecurity Executive Order Provides Agency Leadership with Opportunities and Challenges

CTOvision

Marty Meehan. President Trump’s “Presidential Executive on Strengthening US Cybersecurity and Critical Infrastructure" is significant as it discusses improvements to the Nation’s digital infrastructure, protection of the power grid, replacement of antiquated IT systems, protection against cyber threats. It also makes government leadership accountable for cyber deterrence.

Budget 158
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ASHRAE 90.4: Why This Data Center Standard Matters

Data Center Knowledge

In September of 2016, the American Society of Heating, Refrigerating, and Air-Conditioning Engineers (ASHRAE) published a new and improved standard that establishes the minimum energy efficiency requirements for data centers. ASHRAE 90.4-2016 has been in development for several years. Overall, this.

article thumbnail

Businesses urged to apply Windows patch to avert WannaCry attacks

Computer Weekly

Security advisers are urging organisations to patch their Windows systems to avert a possible second wave of an unprecedented, indiscriminate ransomware attack

Windows 184
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Should You Go With AWS or Azure? That May Be the Wrong Question

Data Center Knowledge

RightScale’s “2017 State of the Cloud” report also indicates that 85 percent of enterprises have multi-cloud strategies, a three-point rise over the previous year. This is as it should be. Read More.

Cloud 164
article thumbnail

Attackers have no need of zero-days, breach data shows

Computer Weekly

Cyber attackers do not have to use previously unseen or extremely sophisticated attacks to bypass defences, analysis of publicly reported breaches in the past year reveals

Analysis 154

More Trending

article thumbnail

United flight attendant accidentally leaked cockpit security codes to public website

Tech Republic Security

United Airlines recently alerted staff that cockpit access codes has been posted online, raising concerns about the chain of ownership for sensitive data.

Airlines 166
article thumbnail

Toys R Us introduces tablets for store staff

Computer Weekly

Toy and games retailer Toys R Us is trialling the use of tablets for store assistance to provide a better customer service experience

Retail 144
article thumbnail

FTC looks to shut down fake tech support scams with Operation Tech Trap

Tech Republic Security

The Federal Trade Commission recently announced new efforts to end scams that target consumers through fake security alerts. Here's how to spot them and stay safe.

Security 143
article thumbnail

Manchester trams halted by communications failure

Computer Weekly

A communications systems fault at Transport for Greater Manchester halted Metrolink tram services across the city on Sunday 14 May

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Getting To and From Workgroup Computing

IT Toolbox

That was then ? now with everything connected to everything plus the internet, we take some of the stepping stones of the past for granted on how we got to our current connected world?

Internet 113
article thumbnail

More than half of consumers trust reviews over retailer advice

Computer Weekly

Consumers are now more trusting of other customers and product reviews than they are of advice given by retailers

Retail 147
article thumbnail

3 ERP Benefits Every Accounting Department Should Know About

IT Toolbox

Accounting departments are constantly juggling tasks -- tax filing, compliance, audits and more. They examine financial records, manage cash flow and analyze account options. This is often a challenge.

Financial 113
article thumbnail

How Microsoft is extending the benefits of Office 365

Computer Weekly

There are now over 100 million corporate users of Office 365, which provides a great developer opportunity.

Microsoft 151
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

CIO Jury: 100% of tech leaders still run on-premise data centers

Tech Republic Data Center

Despite the growth of the cloud, all tech decision makers surveyed by TechRepublic said they are still running on-premise data centers.

article thumbnail

MPs and peers urged not to use personal email as WannaCry spreads

Computer Weekly

MPs and peers have been warned not to use personal emails on parliamentary Windows computers in the wake of WannaCry ransomware outbreak

Windows 131
article thumbnail

What to do about WannaCry if you’re infected or if you’re not

Network World

Today is likely to be painful for many organizations all over the world that took the weekend off and are returning to the work-week to find hundreds or thousands of computers on their networks encrypted by WannaCry ransomware, which surfaced Friday and has been propagating ever since. Estimates by law enforcement agency Europol estimated yesterday that more than 200,000 computers in 150 countries were infected, but with the worm continuing to spread to vulnerable Windows machines, that number w

SMB 122
article thumbnail

Airport group uses cloud-based software to support insourcing

Computer Weekly

Manchester Airport Group is using cloud-based ITSM software to support its in-house service

Groups 154
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Catching up with Mobile Payments

IT Toolbox

Cash, check or credit card? Well, none of them, really. The future is actually happening now and the way we conduct business and how we pay for goods and services is about to change completely.

Mobile 100
article thumbnail

mSecure 5 password manager: Why Dropbox, iCloud, Wi-Fi, or shared file cloud syncing aren't available

Tech Republic Security

mSecure assists Apple, Windows, and Android users in securely managing passwords across various devices, though some syncing features are not included in the latest release. Erik Eckel explores why.

Windows 120
article thumbnail

Enterprise Integration

IT Toolbox

World’s Leading Provolone Adds Infor M3 to the Mix. The Auricchio company was founded by Gennaro Auricchio in 1877. Auricchio’s specialty was provolone cheese, and today his company is a world leader in the production of provolone, holding some 50 percent of the entire world market.

article thumbnail

Nordea moves staff to Stockholm Fintech Hub

Computer Weekly

Nordic bank is shifting some of its workforce closer to fintech activity in the Swedish capital

Banking 137
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The Bygone days of LAN Gateways and Bridges

IT Toolbox

That was the state as we grew networks through the 1990s. But these devices also disappeared into routers and switches such that it was easier to simply light up a port in a switch that was used to bridge to another switch representing another network. These sorts of devices are rarely seen today as stand-alone hardware products.

LAN 100
article thumbnail

GDPR: a quick start guide

Computer Weekly

We look at how UK organisations can prepare for the General Data Protection Regulation

Data 135
article thumbnail

FireEye, Symantec Jump as Ransomware Hack Seen Boosting Spending

Data Center Knowledge

Attacks seen as ‘wake-up call’ for governments, companies Read More.

Symantec 147
article thumbnail

How to use blockchain: Following an asset through its lifecycle to learn more

Network World

This contributed piece has been edited and approved by Network World editors Possession is nine-tenths of the law, right? But thanks to blockchain, this old adage may no longer be a viable way to settle property disputes. Artists and enterprises alike have long struggled to prove ownership of their work after it has been disseminated, especially when it is uploaded online.

How To 106
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Why patching Windows XP forever won't stop the next WannaCrypt

Tech Republic Security

Security experts argue there would be unintended consequences were Microsoft to provide critical security updates to old operating systems.

article thumbnail

Build 2017: Prepare for an Ecosystem of Devices Connected Through Windows

Data Center Knowledge

There is a broad message from last week's event that will impact IT pros and system admins. Read More.

Windows 117
article thumbnail

Security-as-a-service supplier Alert Logic started with IDS and blossomed from there

Network World

Gray Hall, CEO of Alert Logic, cut his teeth delivering enterprise-class services when he started VeriCenter, one of the earliest managed hosting companies. Hall eventually sold that company to SunGard Data Systems in 2007, and in 2009 joined Alert Logic where he has since driven revenue growth 12x. Network World Editor in Chief John Dix recently caught up with Hall to learn more about Alert Logic and the security-as-a-service movement.

Security 102
article thumbnail

5 ways to reduce insider security risks

Tech Republic Security

Known (and trusted) insiders can pose an even bigger security threat than faceless hackers. Learn how to reduce associated risks.

Security 127
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.