July 22, 2016

Internet of Things: From sensing to doing

The value that IoT brings lies in the information it creates. It has powerful potential for boosting analytics efforts. Strategically deployed, analytics can help organizations translate IoT’s digital data into meaningful insights that can be used to develop new products, offerings, and business models. IoT can provide a line of sight into the world outside company walls, and help strategists and decision makers understand their customers, products, and markets more clearly. And IoT can drive so much more—including opportunities to integrate and automate business processes in ways never before possible.

Software-Defined Everything: Beyond the Cloud

Software-Defined Compute is expanding past now-traditional virtualization into containers. SDN is branching out of the Cloud providers and telco infrastructure into enterprise networking. And SDS is building upon core storage abstractions like object storage, database storage, and elastic block storage to a range of data virtualization and orchestration capabilities that support Big Data use cases as well as traditional enterprise “small” data needs.In fact, vendors like Primary Data are extending this SDS vision by essentially building a Software-Defined abstraction on top of Cloud-centric storage abstractions. With Primary Data, an enterprise doesn’t have to worry whether underlying storage is object storage or database storage, for example, simplifying Hybrid Cloud scenarios and complex tasks like Big Data processing and software upgrades.

Top 10 Considerations for Efficient IoT Deployments in Smart Cities

Citizens are core to the success of any technology implementation done in the context of a city. As they are the main consumer and the biggest beneficiary of this solution, their involvement in the solution is highly critical. Many countries have adopted the concept of “Create or Join a Project”, which aims at involving citizens at the very early stages of conceptualization and then implementation. Citizens are not just any other involvement, they are actually a major source of data that is fed back to the system during the implementation process. For example, a broken Water pipe, can be bought to the quick attention of the system if the solution provides a provision to allow the citizen to upload an image and the location of the broken water pipe. The same can be applied for a broken street light or a possible security breach.

Cloud Computing's Big, Disruptive Multiple Hundred Billion Dollar Impact

Companies that sell hardware and software to corporate customers are all threatened by this shift. In the old days, a company would sell an operating system and software for each user. In the cloud realm, operating system are parcelled out on shared servers for use on a pay by the hour basis. Public cloud deployment is seen as a godsend for small companies, which used to have to spend almost all of their initial funding on servers and software. AWS upended that model to let startups get going fast and cheap by paying pennies per hour for computing power. However, the notion that public cloud is always the cheapest option once startups get big, is still debatable. Once a company hits a certain size and has to deal with lots of data, some analysts and corporate execs say it’s time to bring IT back in-house because cloud has gotten too pricey

Cyber security basics: 4 best practices for stopping the insider threat

The insider threat, simply meaning a threat that comes from within an organisation, is a growing concern for cyber security practitioners. Unlike with external threats such as hackers or the latest malware, organisations can not simply buy a shiny new antivirus or firewall product and rest assured that they have it covered. This is because the insider threat can follow any number of patterns. There are both malicious and inadvertent insider threat actors in abundance. On the inadvertent side, 65 percent of office workers use a single password among applications, according to the 2016 Market Pulse report commissioned by SailPoint. The survey also found that a third of employees shared passwords with co-workers, while 26 percent admitted to uploading sensitive information to cloud apps with the aim of sharing it outside the company.

GOP cyber platform "detrimental to global stability"

“There is a distinct lack of clarity about rules of the road for peacetime, and the norms and laws that do and will govern offensive cyber operations in peacetime [are] still highly malleable,” explained Robert Morgus, a policy analyst with D.C.-based think tank New America. “This means that operations conducted by the U.S. and others are highly influential in shaping those rules, and pushing the red line too far — while useful for short-term strategic goals like disrupting the Iranian nuclear program — may prove detrimental to global stability in the long run,” he added.  ... “it’s important to draw a line between offensive cyber operations conducted for espionage or intelligence gathering purposes and offensive computer network operations,” he said.

Google Sprints Ahead in AI Building Blocks, Leaving Rivals Wary

"It’s the next big area, and people are worried Google’s going to own the show," said Ed Lazowska, a computer science professor at the University of Washington who has served on the technical advisory board of Microsoft Corp.’s research lab. "There is a network effect, and it’s a really excellent system." Google initially used TensorFlow internally for products like its Inbox and Photos apps. The company made it available for free in November. Technology companies like Microsoft Corp., Amazon.com Inc. and Samsung Electronics Co. rushed to give away their own versions, hoping to get the most outside developers using their standards.  The company that wins will benefit from the collective efforts of thousands of developers using, but also updating and improving, its system. That’s an advantage when it comes time to make money from the new asset.

Cloud Services Now Account For A Third Of IT Outsourcing Market

We’ve known for some time now that the as-a-service sector has been eating into the market share of traditional service providers. How else to explain that contract counts are soaring, but contract values are remaining relatively stagnant in the traditional market? We knew anecdotally that a lot of client work was moving to the public cloud infrastructure and cloud software markets, and we also knew it was time to begin an empirical measurement of that growing shift. That’s why we decided to move beyond our initial examinations of this phenomenon and officially expand the coverage of our [index]. The drivers for cloud have changed noticeably over the past three years. Initially, cloud interest and adoption was concentrated primarily on cost reduction, in line with what we traditionally have seen as a driver for outsourcing.

Trojanized Remote-Access Tool Spreads Malware

"There is no problem with detecting the malware," Vasily Berdnikov, a security expert at Kaspersky, tells Information Security Media Group. "The problem is that, in this case, the malware came packed with legitimate software. The thinking behind this strategy is simple: Criminals expect that the system administrator will simply ignore the warning from the security solution, because he will be sure that he is downloading legitimate software from the legitimate source." Attackers have long favored gaining access to remote-access tools present inside victim organizations, because they provide an easy way to remotely launch further attacks or exfiltrate data. But Berdnikov says this is the first time Kaspersky's researchers have seen a criminal group hide malware inside a legitimate remote-access tool.

Effective Third-Party Risk Assessment – A Balancing Process

The very practical need for thorough third-party assessments is the fact that third-parties are increasingly targeted by criminals, and continue to be the primary source of breach incidents. Rather than attempt to breach the systems of large and usually well protected company networks, criminals look for the weakest link in the chain, which is all too often a third-party. The growing demand for more comprehensive third-party assessments necessarily requires expanded resources, budgets and timelines for completion. These needs run contrary to very real budget and staff constraints, and the pace at which business units need to bring new (often web/cloud based) products and services to market. So, how do you satisfy the growing demand for more comprehensive assessments of third-party risk controls without substantially increasing the cost and time for conducting assessments?

Quote for the day:

"In the realm of ideas everything depends on enthusiasm. In the real world all rests on perseverance." -- Johann Wolfgang von Goethe

No comments:

Post a Comment