October 30, 2015

Preventing cyber attacks: making successful attacks unaffordable for cyber criminals

One of the negative consequences of an increasingly digital world is cyber criminals’ ability to launch numerous, sophisticated attacks at lower and lower costs. These adversaries continue to develop and use unique tools that cause great damage to businesses, governments, and organizations. As technology becomes less expensive, the cost of launching automated attacks decreases, which allows the number of attacks to increase at no net increase in cost. In the face of this increasing onslaught, the defenders generally rely on decades-old security technology, “often cobbled together in multiple layers of point products; there is no true visibility of the situation, nor are the point products designed to communicate with each other.”


Robots Can Now Teach Each Other New Tricks

The work is part of an effort to figure out how robots might share information in useful ways. That could reduce the need for meticulous reprogramming, and it could allow robots to adapt to quickly when faced with a new task or an unfamiliar setting. “It’s pointing in an interesting direction,” says Stefanie Tellex, an assistant professor at Brown University, whose group enabled the Baxter robot to learn. “When you put a robot in a new situation—and in the real world it happens in every room the robot goes into—you somehow want that same robot to engage in autonomous behaviors.” Speaking last week at the Bay Area Robotics Symposium, held at the University of California, Berkeley, Ashutosh Saxena, who led the development of TellMeDave and RoboBrain, said that robots will increasingly share information in the future.


SDN will play key role in mobile network security

Fortunately, today's organizational networks can address many of these issues, with centralized authentication, VPNs and mobile network security policy enforcement capabilities. But a major challenge remains: Security threats are not static -- they change and evolve with frightening regularity. So, traditional network-centric security is going to have to evolve to meet these new challenges. Again fortunately, though, we have at least a conceptual framework for the future of mobile network security: software-defined networking (SDN). SDN's most visible appeal is that it extends the traditional mix-and-match interoperability that has defined networking to date with a degree of programmability and adaptability that brings new cost, management and operational benefits.


12 Important Lessons Learned by Experienced Scrum Masters

So simple, yet powerful. The conversation is the most often used tool by the Scrum Masters we interviewed. Conversations are a simple tool, but often forgotten. One way to improve your conversation skills is to read How to win friends and influence people, by Dale Carnegie. The author talks about a list of things you must have in mind when you want to grow a relationship with people you work every day. You should always start talking about something other person cares about, don´t judge or argue, be interested in what their opinions are. ... Scrum Masters do not get successful unless the team succeeds too. For that Scrum Masters must learn to work with the team. That means they must enable the team and their work, not do the work for them or solve their problems for them.


DevOps and security, a match made in heaven

The promise of DevOps for advancing the information security objective is phenomenal, but unfortunately, the way most information security practitioners react to DevOps is one of moral outrage and fear. The fear being verbalized is that Dev and Ops are deploying more quickly than ever, and the outcomes haven't been so great. You're doing one release a year, what will happen if they are doing 10 deploys a day? We can understand why they might be just terrified of this. Yet, what Ashish described is that DevOps represents the ideal integration of testing into the the daily work of Dev and Ops. We have testing happening all the time. Developers own the responsibilities of building and running the test.


Millennials and the Retail Revolution

As Millennials shift toward online research and purchasing, the physical presence of their preferred brands under immense pressure to keep people coming to their store. The movement towards online retail has created a disparity in physical retail, causing many brands to shut down low-performing stores and rally their efforts to maintain consistent traffic in other stores. Retailers like Walmart and Target are getting ahead of this trend by launching smaller urban stores that target high-demand needs of their customers. Similarly, brands are adopting more pop-up retail strategies, where they set up shop for short periods of time and offer exciting limited time deals, enticing shoppers to take advantage of the temporary offerings. These trends are catching fire as more retailers make these strategic changes to adopt the "Millennial style".


50+ Data Science and Machine Learning Cheat Sheets

There are thousands of packages and hundreds of functions out there in the Data science world! An aspiring data enthusiast need not know all. Here are the most important ones that have been brainstormed and captured in a compact few pages.  Mastering Data science involves understanding of statistics, Mathematics, Programming knowledge especially in R, Python & SQL and then deploying a combination of all these to derive insights using the business understanding & a human instinct—that drives decisions.  Here are the cheatsheets by category:


Three baseline IT security tips for small businesses

"A lot of companies rely on the idea of 'security through obscurity,'" said Crellin. "They're focused on running their business and probably don't spend a lot of time thinking about hackers." These attackers probably aren't interested in any one particular small business, said Crellin, but they tend to rely on a shotgun strategy. "Small and middle-market businesses are targets because there are so many of them. It's like a thief in a parking lot looking for one unlocked car." If your organization is unlocked, he said, you're a likely target. Common methods of hacking—phishing, brute-force password attacks,keylogging spyware, and social engineering—can cost small and medium businesses thousands of dollars.


Steps For Getting an IoT Implementation Right

“While the research uncovered some intriguing differences across geographies and industries, the generally held consensus is that the opportunities will be met with challenges,” Janet Jaiswal, vice president of enterprise marketing at Aeris, noted in a statement. “As the number of connected devices grows, organizations will not only be under increased pressures to better manage their devices and obtain data-generated insights to improve operational efficiencies, but they will also need a deeper understanding of how best to address the complexities associated with connectivity and data consumption to lower operational costs,” Jaiswal says. Big data and application development are other significant concerns within the enterprise, the study notes.


Better late than never? Samsung IT arms push into autos

"There are two trends: the car becomes a connected software device, and the entire mobile and ICT ecosystem is getting very interested in playing a part in that evolution," Bonte said. That is particularly welcome as demand for smartphones, TVs and computers slows, but Samsung is arriving late at a party where some of the best partners are already taken. ... Samsung patent filings show a wide range of technologies including a drowsy-driving detection system, an alert system for break-in attempts and a transparent display for directions and traffic information. Samsung Electro-Mechanics Co Ltd recently formed a dedicated team to sell components such as camera modules to new auto clients and says it would consider acquisitions to boost car-related businesses.



Quote for the day:

“Stories are the single most powerful weapon in a leader’s arsenal” -- Howard Gardner

No comments:

Post a Comment