October 31, 2014

In contrast with the China-based threat actors that FireEye tracks, APT28 does not appear to conduct widespread intellectual property theft for economic gain. Instead, APT28 focuses on collecting intelligence that would be most useful to a government. Specifically, FireEye found that since at least 2007, APT28 has been targeting privileged information related to governments, militaries and security organizations that would likely benefit the Russian government.

Experts: Major cyberattack will hit in next 11 years
Almost two-third of technology experts expect a "major" cyber attack somewhere in the world that will cause significant loss of life or property losses in the tens of billions of dollars by 2025. A survey released Wednesday by the Pew Research Center found that many of analysts expect disruption of online systems like banking, energy and health care to become a pillar of warfare and terrorism. The survey asked over 1,600 technology experts whether a major attack that would cause "widespread harm to a nation's security and capacity to defend itself" would be launched within the next 11 years.

Top CIOs Start the Journey to the 'Digital Enterprise'
The digital enterprise is more than just a CIO catchphrase. In a recent Altimeter Group survey, 88 percent of 59 digital strategy executives interviewed said their organizations are undergoing formal digital transformation efforts this year. Even CIOs who think the phrase "digital enterprise" is mushy, like Mojgan Lefebvre, CIO of Liberty Mutual Global Specialty, say that consumers wielding smartphones have shifted the balance of power. "The one thing that comes in and absolutely disrupts industries is giving the end-user customer, consumers, the ability to do anything and everything they want on their mobile device," Lefebvre says.

Enterprise Cloud Service Broker—A New Identity for IT, CIOs
A cloud service brokerage, as defined by Gartner Group, is “an IT role and business model in which a company or other entity adds value to one or more (public or private) cloud services on behalf of one or more consumers of that service.” Gartner recently challenged CIOs to explore how they should position themselves as CSBs within the enterprise by “establishing a purchasing process that accommodates cloud adoption, and encourages business units to come to the IT organization for advice and support.” Why not just bring in an outside organization to manage cloud vendors? Indeed, many new companies have sprung up recently to help IT departments procure their cloud services.

The science behind the ebb and flow of Ubuntu Unity's popularity
This has surprised a lot of people, but I would argue that it shouldn't. Why? Unity has been around for a while now, and it's had plenty of time to evolve and get things right. The initial release was 2010, and the Unity we have now is not the Unity we had then. Users have had plenty of time to acclimate. The HUD, the Dash, Scopes -- they all work in a harmony that most desktops can't replicate. Even with the current state of popular that Unity is enjoying, I remember the reaction of the Linux community when the desktop first arrived -- it seemed as if Ubuntu was on a collision course with disaster.

Healthcare IT: User Empathy Comes First
Too often we see information systems organizations driving and delivering products and services without first understanding what to deliver. One great companion tool for enabling the customer empathy mindset is an empathy map. ... Underlying an empathetic mindset is a deep curiosity to find out the answers to these and many more questions. It is also supported by a desire to delight users with your product or service. As mentioned in my previous blog, defining a product's or service's success in terms of a "Love Metric" is key to moving an organization toward becoming one that is known for its customer empathy mindset.

Setting Traps, and Other Internet Security Tips
The cold truth is that the JPMorgan breach and the rest are not symptomatic of anything new—online businesses have been under constant cyberattack for well over a decade. What’s different today is that there is a lot more at stake because so much of what we do every day is online. Here is what I recommend: use two-factor authentication—essentially verifying via SMS on your mobile phone that you are the owner of a particular account online, every time you sign on. Google, Facebook, Twitter, and just about every major bank provides this option. Also, since everyone gets hacked online eventually, make sure the damage is limited.

Small Businesses Investing in Mobile Technology
"Small business should pay attention to some of the same places they have been getting their cloud and mobility information," Seth Robinson, senior director for technology analysis at CompTIA, told eWEEK. "These two areas provide the foundation for IoT and will help give some insight as to how SMBs will begin using the technology." obinson said just as small businesses have learned about the benefits of cloud and mobility in their space--which are often different than enterprise benefits--they will learn about the benefits of IoT as the trend takes shape.

Following the launch of Apple Pay, Juniper Research thinks NFC will finally be a success
Juniper had been pessimistic about the market after the dismal showing of the NFC-based Google Wallet, launched in 2011, and Apple's failure to include NFC in the iPhone 5. Apple had also said that BLE (Bluetooth Low Energy) and Wi-Fi had "more desirable characteristics for maintaining the link over time than NFC", and it could have adopted BLE instead. With the arrival of Apple Pay, based on industry-standard EMV contactless protocols running over NFC, Juniper has changed its view. In the context of the US market's development, Apple Pay has arrived at a better time than Google Wallet.

Microsoft Adds IoT, Big Data Orchestration Services to Azure
"Every day, IoT is fueling vast amounts of data from millions of endpoints streaming at high velocity in the cloud," says Joseph Sirosh, corporate vice president of Machine Learning at Microsoft. "Examples of streaming analytics can be found across many businesses, such as stock trading, fraud detection, identity protection services, sensors, web clickstream analytics and alerts from CRM applications. In this new and fast-moving world of cloud and devices, businesses can no longer wait months or weeks for insights generated from data."

Quote for the day:

“You can't connect with something you're not passionate about.” -- Gemma Arterton

No comments:

Post a Comment