May 18, 2016

Your Business’ Network Needs IPS and IDS – Here’s Why

If you are simply looking for IDS, which is intrusion detection services, then what you want to do is have the devices working out of the direct line of your traffic flow so that you can detect abnormalities on different scales. However, if your focus is on IPS, which is intrusion prevention services, then you want to put the device that is sorting through your traffic in line with your network so that it can be the barrier your network needs to stay safe. ... Some of the different streams that are used for intrusion pose a larger threat than others, and this is worked into the device itself that you are using. Your device will detect the intrusion, figure out what type of intrusion it is, and evaluate the information that it can get from the intrusion. From there, you will be able to get a rating as to just how much potential danger your network is in, and decide on what type of steps you want to take next, such as blocking that type of intrusion,


On Blockchain Disillusionment and Bitcoin's Big Bad Wolves

For all the investment, it remains increasingly unclear exactly how banks will use blockchain technology or distributed ledgers, or if the areas where it seems most effective will be lucrative or interesting enough for incumbent financial firms to pursue. As noted by Coin Sciences CEO Gideon Greenspan in a recent CoinDesk opinion piece, shared ledger efforts have hit a roadblock when it comes to confidentiality, as every institution operating in such environments today sees every transaction. "This turns out to be a huge issue, both in terms of regulation and the commercial realities of inter-bank competition," Greenspan writes. "While various strategies are available or in-development for mitigating this problem, none can match the simplicity and efficiency of a centralized database managed by a trusted intermediary."


DevOps model, a profile in CIO leadership, change management

Proponents tout the many benefits of DevOps, the practice of putting software developers and the IT operations together so that building, testing and releasing software can happen very quickly, frequently and more reliably. They say this approach (or culture or movement, as some call it) produces faster delivery of features, more stable operating environments and better quality products. They also say that the DevOps model means continuous software delivery and faster resolutions of problems, which lead to more satisfied users. Results like that get attention, said Donnie Berkholz, research director for the development, DevOps, and IT ops channel at 451 Research. In fact, he points out that 40% of the 568 infrastructure professionals his firm recently surveyed are using DevOps somewhere in their organizations.


10 most in-demand Internet of Things skills

Insufficient staffing and lack of expertise is the top-cited barrier for organizations currently looking to implement and benefit from IoT, according to research from Gartner. "We're seeing tech companies around the globe getting organized and creating IoT strategies, but where they're struggling is they don't have the processes and talent in-house to make these things happen," says Ryan Johnson, categories director for global freelance marketplace Upwork. By tracking data from Upwork's extensive database, Johnson and his team have identified the top 10 skills companies need to drive a successful IoT strategy. Data is sourced from the Upwork database and is based on annual job posting growth and skills demand, as measured by the number of job posts mentioning these skills posted on Upwork from October 2014 to December 2015.


SAP Technology Targets Inequity in Workplaces Around the World

“Diverse teams are high performing teams,” said Mike Ettling, president of SAP SuccessFactors.* “We’re always looking at how innovative HR technology can improve people’s work lives. Our HCM solutions simplify and standardize HR processes for organizations across the globe. Addressing inequity fits into our focus on built-in intelligent services and recommendations. Today’s innovations, and those to come, are designed to help companies find and address opportunities to build inclusive cultures, prompting managers and HR professionals to make intentional decisions as they attract, hire, develop, reward and promote people.” The use of technology to tackle workplace issues like gender inequity has not grown at the same pace as that of the digital economy.


Cloud security and compliance concerns rise as investment grows

“As organisations look to cloud computing to reduce IT costs, increase agility and better support business functions, security of data and applications in the cloud remains a critical requirement,” says Holger Schulze, founder of the 300,000-member Information Security Community on LinkedIn. “The 2016 Cloud Security Report indicates that as organisations increase investments in cloud infrastructure, they are seeking a similar level of security controls and functionality to what’s available in traditional IT infrastructures. “However, they are finding traditional security tools ineffective in the cloud. In a shared responsibility model, this is an opportunity for organisations to implement effective cloud security solutions to strengthen their security posture and capitalise on the promise of cloud computing”.


Towards a whole-enterprise architecture standard – 6: Training

In short, training only make sense in those parts of the context that map to the left-side of that boundary. To the right, we’re going to need real skills, which in turn arise only from some form of education or self-education. The vertical axis on SCAN is an arbitrary scale of the amount of time available for assessment and decision-making before action must be taken – the latter indicated by the ‘NOW!’ as the baseline, with time-available extending ever upward towards an infinite future relative to the ‘NOW!’. The green dotted-line across that axis represents a highly-variable yet real transition from theory to practice, or from plan to action. For humans at least: above the boundary, there is time for considered or ‘complicated‘ evaluation, and plans and decisions are rational – or may seem so, at least; and below the boundary, there is time only for simple evaluation in real-time, and plans and decisions are emotional


How to manage workers in the gig economy

HR has developed into a department that is devoted to employee engagement and company culture. "As companies shift from having traditional paper pushing HR departments to becoming more focused on the employee experience, a PEO system can create a huge benefit allowing HR to focus on their talent brand vs compliance," says Harris. PEO models can also help minimize the workload and paperwork associated with gig workers, who are in and out of the company like a revolving door, says Harris. These systems take away a lot of the grunt work associated with onboarding employees, as well as managing their benefits, compensation and even seeing them out of the company once they move on. PEO systems are freeing up HR so they can focus on ensuring gig workers are engaged, feel a part of the culture and aren't treated any differently than typical full-time workers.


Cybersecurity in 2020: The future looks bleak

Scenario planning or scenario thinking started in military intelligence circles as a way to create flexible long-term plans. "Scenario planning may involve aspects of systems thinking, specifically the recognition that many factors may combine in complex ways to create surprising futures,"according to Wikipedia. "The method also allows the inclusion of factors that are difficult to formalize, such as novel insights about the future, deep shifts in values, unprecedented regulations, or inventions." ... Wearables will track more than heart rate and the number of steps taken. "With devices monitoring hormone levels, facial expressions, voice tone, and more," suggest Weber and Cooper, "the Internet is now a vast system of 'emotion readers,' touching the most intimate aspects of human psychology. These technologies allow an individual's underlying mental, emotional, and physical state to be tracked—and manipulated."


Global Lenders on Edge as Cyber Attacks Embroil More Banks

While Swift has for decades made sure its own financial messaging network was secured, less attention was paid to the security surrounding how member banks -- each with their own codes and varying levels of technology -- were connecting. Even today, when it discusses the cyber attacks, Swift emphasizes that its own network wasn’t breached and says its members are responsible for their own system interfaces. Some U.S. banks are pushing to open discussions with Swift about whether it should have responded more quickly to the breaches and should now help member banks better secure their systems, according to one of the people familiar with the thinking within a large U.S. bank. BITS, the section of the Financial Services Roundtable aimed at combating cyberfraud and other technological issues, could be tapped to broker those discussions, the person said.



Quote for the day:


“The common question that gets asked in business is, ‘why?’ That’s a good question, but an equally valid question is ‘why not?’” -- Jeff Bezos