October 16, 2013

The New HIPAA/HITECH Rules: Compliance vs. Cybersecurity
Whether you are a covered entity or BA, it is imperative you understand the difference between being secure and being compliant. The two are not mutually exclusive. The law requires you to be compliant, and with privacy a huge issue in the news, your customers and your reputation require you be secure. Complying with the HIPAA/HITECH rules does not mean you will be secure. In fact, it’s important to remember that 100% security is nearly impossible.


What the Internet of Things Means for Security
Experts say the security threats of the Internet of Things are broad and potentially even crippling to systems. Since the IoT will have critical infrastructure components, it presents a good target for national and industrial espionage, as well as denial of service and other attacks. Another major area of concern is the personal information that will potentially reside on networks, also a likely target for cyber criminals. One thing to keep in mind when evaluating security needs is that the IoT is still very much a work in progress.


Webservices Security: Potential Threats to Combat
Securing webservices is more complicated than any other end user systems, as the webservices are built as the conduit between systems rather than human users. Most of us are very familiar with the first line of defense, namely authentication, data integrity, confidentiality and non repudiation. These are certainly critical security concerns, but there are well established tools and practices that help address these security issues. But, this it not just be enough to be contempt with solving these concerns, as the services are no longer constrained within the trust boundaries.


Is Radical Business Transformation the Only Way?
In its annual Predicts research on industry trends titled "Top Industries Predicts 2014, it has featured 12 strategic planning assumptions that CIOs, senior business executives and IT leaders should factor into their enterprise planning and strategy-setting initiatives. Harris-Ferrante, vice president and distinguished analyst at Gartner says, “Transformation remains a critically important phenomenon across all industries. Many industries will face intense challenges in 2014 and beyond, and will have no choice but to radically change their established business models.”


How the Internet of Things will transform our lives forever!
In an interview to Govindraj Ethiraj, Karthikeyan Natrajan, Global head, Integrated Engineering Solutions at Tech Mahindra says, "If you look at what has happened to the products in the last 20 years, it became smart and the real piece of things that is likely to happen in the next 20 years is that there is going to be lot more intelligence and they are going to be helping you lot more than you're supposed to"


Oracle says open source has no place in military apps
It also warns that open source software may not scale. “Commercial software companies have developed highly refined methodologies to perform these tasks,” the document suggests. “Don’t underestimate the difficulties associated with testing open source software and incorporating required changes into the main development stream, especially when it comes to testing for robustness and reliability under load”.


Webcast: Security controls to help confront modern cyberthreats
In this four-part SearchCompliance webcast, Ross joins Theresa M. Grafenstine, inspector general of the U.S. House of Representatives, to discuss cyber-risk and effective security controls companies can implement to protect corporate data. Here in part one, they discuss common cybersecurity threats facing modern organizations.


The next server operating system you buy will be a virtual machine
If you visit VMware's Virtual Appliance Marketplace, you'll get an idea of what you're in for in days to come. There are hundreds of virtual appliances ready for you to download and run in your virtual environments. True, due to licensing, most of them are Linux-based, but it won't be long until you're able to purchase and download Windows-based VMs — VMs tailored and tuned for a variety of purposes and applications. In fact, it wouldn't surprise me if application vendors started delivering their applications on VMs too.


Ethernet's 400-Gigabit challenge is a good problem to have
The complexity of the task has only grown since the last standard-setting process, which produced the 802.3ba standard that covers both 40-Gigabit and 100-Gigabit Ethernet, D'Ambrosia and others at the event said. That project started out focused solely on a 100Gbps standard, which service providers wanted, but expanded to include 40Gbps because enterprise servers weren't ready for the higher speed. If the 802.3ba experience is any guide, the next standard -- to be called 802.3bs -- will probably not be ratified until the first half of 2017, D'Ambrosia said.


A lot of data could be stored here one day
It’s not just the power generation features that make Niobrara a good site for a data center: There is also massive network infrastructure already at the site. The Denver area serves as a hub for traffic flowing across the country so the site has 6 long-haul fiber carrier connections nearby, and another 21 fiber connections in close proximity. Sprint, CenturyLink, AT&T, Verizon and Level 3 all run fiber connections by the location. Whoever builds out this data center has plug-and-play network connections that can send data out to the entire world at high speeds.



Quote for the day:

"You are the only one who can use your ability. It is an awesome responsibility." -- Zig Ziglar