Showing posts with label white paper. Show all posts
Showing posts with label white paper. Show all posts

May 26, 2015

How to Better Guard Against a Security Breach
Despite their investments in SIEM and the notable progress in developing strategy and policy, barely half (51%) of survey respondents that utilize security and event log data have strong confidence in their ability to detect or mitigate breaches. That may reflect the continuing focus on perimeter protection and firewall technologies—the top priority for coming investments, according to 56% of survey respondents. Interestingly, that’s despite the growing industry-wide recognition that building higher fences is no longer a viable security strategy in the face of sophisticated cyber assaults. Many enterprises “are investing, typically, in the same things they invested in last year and the year before,” says Schou.


Q&A on the Book More Fearless Change
The primary purpose of a pattern is to document a common, recurring problem with ​the solution that has been validated. This is why they are called "patterns"​ -- because the problem and solution have been seen in more than one instance. So, each of the Fearless Change patterns is not simply the idea of one person-- rather, each one has been used by different types of change leaders in different environments. Therefore, others can use the patterns ​knowing that they have been shown to work. In addition, each pattern documents the benefits and challenges of using ​ it​. Therefore, leaders of change can not only feel confident in the solution, but will also know the consequences. And, when each individual pattern is combined with other patterns (in the form of a pattern language), the organization now has a collection of powerful strategies for addressing complex problems.


Identity Management in the Cloud Goes Beyond Security
IAM (identity and access management) is clearly the best security model and best practice for the cloud. That’s why some cloud providers, such as AWS, provide IAM as a service out of the box. Others require you to select and deploy third-party IAM systems, such as Ping Identity and Okta. But you should be thinking of identity management not only as a security technology, but also as a business driver. Thus, when you deploy IAM, you need to focus on the core business processes and on the details around security. This is a shift from the recent thinking in which the business drivers were largely out of IT’s consideration. Enterprises that develop mature IAM capabilities can reduce their identity management costs and, more important, become significantly more agile in supporting new business initiatives.


Agile security lessons from Aetna and the state of Texas
Moving to an agile model can make some traditional security professionals nervous, he said, especially those with a command-and-control view of the process. "There's a perception among security people that developers don't care about security," he said. But agile offers security employees the opportunity to become resources early on in the development process, instead of coming in afterwards and looking for mistakes. "Which is still an important thing to do. but you don't want your development team to have all the interactions with the security team be negative," he said. "That creates a pretty toxic environment."


Entertain, inform, and connect with the AT&T ZTE Spro 2 Smart Projector
While the device works fine without a connected power source, you are limited to low and medium (100 lumen) brightness. In order to experience the full 200 lumen output, you need to connect the external power source. With dimensions of 5.3 x 5.2 x 1.2 inches and 19.4 ounces, the ZTE Spro 2 is quite portable. ZTE also includes a carrying case that holds the device, charger, and HDMI cable. The device is powered by a Snapdragon 801 quad-core 2.0 GHz processor, Adreno 330 GPU, 2GB RAM, 16GB integrated storage, WiFi, and Bluetooth. ... It performed flawlessly, projecting onto blank walls with good brightness and even included audio. I connected external speakers through the audio out port and also tested Bluetooth audio output, both of which were much better than the small internal speaker.


How a change in thinking can stop 59% of security incidents
So, how do you approach this problem with employees? ISO 27001, the leading information security standard, offers a less attractive, yet much more effective approach to this problem: (1) strictly defining the security processes, and (2) investing in security training & awareness. The security experts who developed this standard long ago realized that the technology itself cannot resolve the organizational and the people issues: technology is only a tool; it is only a part of the wider picture. Or, to view this issue from the management theory point of view, the organization is basically a mixture of three essential elements: people, processes, and technology.


NoSQL Databases: comparing MongoDB, HDInsight, and DocumentDB
Availability is not a problem with both MongoDB and DocumentDB. MongoDB ensures there is high availability through the configuration of a secondary server to act as the primary server when the primary server goes down. DocumentDB uses the Azure feature to manage server availability. DocumentDB is designed specifically for web applications and mobile devices. This means you will not get the best from it if you are not using web applications or mobile devices. ... For consistency, both DocumentDB and MongoDB are good options because they use ACID properties (at the document level) to ensure safe updating of documents. If there is error, the operation rolls back. With MongoDB, developers can specify the write concerns.


Hybris-as-a-Service: A Microservices Architecture in Action
Micro Services are a new paradigm for software architecture: small services in separated processes take the place of large applications. This way monolithic architecture can be avoided, and systems are easily scalable and changeable. The microXchg conference looks at a variety of aspects of Micro Services. ... Andrea Stubbe explains how to create cloud applications with microservices using Hybris’ platform and API. Andrea Stubbe is Product Lead of the core part of the as-a-service product at Hybris. Having been a software developer for most of her career, she loves working on an architecture that addresses many of the problems and challenges she has observed in earlier projects. She also finds this a perfect fit for lean and agile development principles.


5 Critical Ways to Take a More Collaborative Approach to IT Security
First, it seems that most organizations‘ approach to security is inward-focused. Call it the “outrunning the bear“ response: the IT team at your organization doesn‘t have to be faster than the cybercriminals, only faster than the other organizations trying to outrun them. While about 75 percent of IT security staffers say they have plenty of opportunity to collaborate with peers within their organization, 60 percent say they have little to no opportunity to collaborate with peers at other companies. ... Second, IT security staffers get most of their information about security trends, threats, vulnerabilities, warnings, and technologies not from their peers, but from online forums and cybersecurity news sites.


Mobile Internet To Be Worth More Than Apple By 2018
Despite huge scale and growth, mobile is still evolving. M-commerce remains the primary engine of growth, which is why VCs bet more than half of $41 billion invested in mobile in the last 12 months into m-commerce-related sectors. Mobile advertising is set to leapfrog in-app purchases to move from third to second place in the revenue hierarchy by 2018, as app developers rebalance their business models to capture new opportunities. Enterprise mobility growth continues, although not as fast as the consumer market. Finally, the Apple Watch is helping the wearables sector to gain deeper penetration and revenue.



Quote for the day:

"A leader has the vision and conviction that a dream can be achieved.He inspires the power and energy to get it done." -- Ralph Nader

July 31, 2014

Develop and Implement your customized plan for adopting healthy agile-lean practices
Effective impediment management can be learned with practice and improved with process maturity and experience; management support is still needed for removing organizational impediments. As multiplexing and multitasking reduces, and the team starts following Stop-Starting-Start-Finishing lean mantra, the number of NT events should reduce over a period of time. Moving away from non-lean behaviors (3B and 4B) to healthy agile-lean practices (3P and 4P), shown along the Y-dimension of Figure 1 is a challenge that can be addressed at the team-level. It usually doesn’t depend on and need not wait for senior management support.


Infographic: Capitalizing on the Internet of Things
Let us give you three figures that show why the IoT creates challenges both long-term and immediate. First, consider the number of IP-enabled devices such as cars, heating systems or production machines. Based on research by the analyst firm Machina Research 14 billion of those things will be connected by 2022. Second, the ITU predicts that by 2015, 75 percent of the world’s population will have internet access. And third, the omnipresent mobile revolution: according to the mobile forecast from Cisco’s Visual Networking Index, more than 3 billion smartphones and tablets will be in use globally by 2017.


Hulu Chooses Cassandra Over HBase and Riak
“We looked at HBase and Riak at first,” said Rangel. “Cassandra was an afterthought.” ... “With Cassandra, it managed to handle the load, it’s very reliable, it allows range queries without limitations, and it’s easy to maintain,” said Rangel. “It’s night and day compared to HBase.” The team had to do some hardware changes because Cassandra specs are different. Cassandra is optimized for SSDs, which improved performance. Rangel also said that Cassandra was better at replication.


Attention Agile Programmers: Project Management is not Software Engineering
Many software developers today are working on client/server systems such as Web sites and Smartphone Apps. These systems are based on the exchange of requests and responses between a client and a server. In such systems, the Latency is the time interval between the moment the request is sent and the moment the response is received. The Throughput is the rate the requests are handled, i.e., how many requests are responded per unit of time. In client/server systems it is essential to constantly measure the latency and the throughput. A small code change, such as making an additional query to the database, may have a big impact on both.


Answer to OTP Bypass: Out-of-Band Two-Factor Authentication
When users attempt to visit their bank’s landing page, they get redirected to a fake bank page that steals their username/password. Then, they’re asked to type in the one-time password (OTP) sent by their bank’s mobile app - but, the SMS never arrives, so then the website prompts the user to install a malicious mobile app that’s pretending to be an OTP generator. Whew. This malicious Android app actually intercepts the real two-factor SMS tokens sent by the bank, thereby gaining access to the user’s account and stealing all their monies.


LibreOffice 4.3: The best open-source office suite gets better
According to Coverity, "LibreOffice has done an excellent job of addressing key defects in their code in the short time they have been part of the Coverity Scan service." Like previous versions, LibreOffice is available for Linux, Mac, and Windows systems. You can also run an older version, LibreOffice 4.2, from the cloud using a Software-as-a-Service (SaaS) model. With the United Kingdom making LibreOffice's native ODF its default format for government documents, LibreOffice is certain to become more popular. Other cash-strapped governments, such as Italy's Umbria province, have found switching to LibreOffice from Microsoft Office has saved them hundreds of thousands of Euros per thousand PCs.


'Software-defined' to define data center of the future
Simply being written in software shouldn't qualify as "software-defined"; the term should also apply to the overall resource served (e.g., networking or storage). Just as there are network switches for SDN, appropriately designed hardware and firmware solutions should exist for software-definable infrastructure. In other words, a well-designed physically assembled pool of modular (possibly proprietary and/or highly specialized) resource units could be elastically provisioned, dynamically partitioned and configured programmatically.


A New Hat for Negotiators
Kopelman, who broadly defines negotiations, thinks that even more enlightened win-win negotiators can find themselves impaired by the hat they wear. It’s as if the negotiator’s hat includes a set of blinders that artificially limits the options of every party in the negotiation. She says that we all wear multiple hats in our lives, and that each one represents a different role that comes with its own resources and constraints. (For instance, a business executive may also be a parent, a child, a spouse, a soccer fan, a scuba diver, or a church deacon.) But, Kopelman says, if we can integrate our hats, we might be able to use their combined assets to negotiate in a more genuine way and craft superior outcomes.


Top 5 Wearable Tech You Haven’t Heard of Yet
Forecast calls for 19 billion connected things by 2016, and the wearable technology sector is set to skyrocket from $3-5 billion in revenue to $30-50 billion over the next 2 years. The economic impact estimates as high as $14 trillion over the next decade (AllthingsCK.com). The products in beta and those already created are leading in the market. Fitbit fitness devices are available in 30,000 retail stores across 27 countries worldwide (Amazon published rankings). Google Glass expanded with Google Contact Lens. And the market for jackets that navigate, dresses that change color with mood, and bras that can track your heart rate are popping up everywhere.


Big Digital Leadership
Technology trends such as big data and the Cloud are driving the IT agenda, as are technology-fuelled trends such as mobility and social media. Increased user empowerment as demonstrated by the Byod movement is changing the CIO’s role from technology manager to digital leader. This white paper explores these trends from a strategic perspective. It also offers operational advice thus enabling you to turn these emerging themes into business value.



Quote for the day:

"Your time is limited, so don't waste it living someone else's life. -- Steve Jobs

April 22, 2014

Security Manager's Journal: Virtual machines, real mess
We found that those virtual machines were not running any antivirus software and hadn't been patched in more than two years, so we ran a virus scan of one of the virtual machines. Suddenly, everything became very clear. The virtual machine was infected with a virus whose characteristics matched the activity that caused the denial of service to the office. In fact, all 30 desktops in the classroom were infected. But that's not the worst of it. The installed images were derived from a base image maintained at a cloud provider. That base image contained the virus, which explains how 30 machines became infected.


Microsoft Azure SQL Database Security - Firewall Configuration
Deployment of cloud-based technologies introduces a wide range of challenges; however few of them are subjected to the same degree of scrutiny, concern, and public debate as security. In order to properly analyze security related challenges, it is important to note that they encompass several distinct but interrelated concepts, such as data integrity and confidentiality, access control, authentication, and authorization. In this article, we will start reviewing them in the context of Microsoft Azure Software as a Service-based SQL Database, focusing in particular on the SQL Server and database-level firewall access control functionality and methods that can be employed to implement it.


New iOS malware highlights threat to Apple mobile devices
The malware is designed to listen for outgoing connections. Once it recognises an Apple ID and password, it sends these unencrypted IDs and passwords to the cyber criminals behind the malware. The Unflod malware also highlights the risks of installing unknown apps on jailbroken iPhones. Reports of the malware targeting Apple iOS emerged in posts on reddit by iOS users hit by repeated system crashes after installing iOS customisations that were not part of the official Cydia market. A developer for the Cydia market, an alternative to the Apple App Store, has responded to news by in a reddit comment, saying that the probability of Unflod coming from a default Cydia repository is fairly low.


It’s Official: 2013 Was the Busiest Year Yet for Cyber Criminals
The finding comes in a report from the security arm of the telecom giant Verizon set to be published on Wednesday. The Verizon annual Data Breach Investigations Report is one of the most highly regarded in the industry and is now in its tenth year. It contains data on attacks from 50 companies and organizations, covering more than 63,000 computer security incidents and 1,347 confirmed breaches in 95 countries. As these things go, the report contains more data to analyze than any other report of its kind, said Jay Jacobs, a Verizon analyst and one of the report’s co-authors. If combating nine kinds of attacks sounds too ambitious, then maybe this will make it sound a little easier: On average, roughly 72 percent of all attacks were carried out using one of three methods, though the specifics tend to vary by industry.


What Is A Distributed Database And Why Do You Need One?
Grab this technical whitepaper to learn more about the NuoDB distributed database. Learn more about how NuoDB: Cracked the code and finally built a distributed database; Conceived the Durable Distributed Architecture (DDC) by studying the shortcomings of traditional designs; Built a database designed to scale-out on demand in the cloud; and Can provide your app with on-demand scale out, geo-distributed data management and resilience to failure


Managing the Demand for IT Infrastructure
To save costs and prepare for adoption of next-generation infrastructure technology and hybrid-cloud models, leading organizations are adopting commercial-style demand and service management that has two key characteristics. The first is a standard services catalog with clearly priced offerings that can be consumed on a price-times-quantity basis. Such a catalog requires creating bottom-up unit costs for each service based on a detailed bill of materials. This means that unit costs should be an aggregation of all the components making up the service and not an arbitrarily stipulated cost mostly based on averages and allocations.


Business success increasingly hinges on supply chain innovation and procurement advantages
The power of data-driven business networks and the analytics derived from them are increasing, but how do enterprises best leverage that intelligence as they seek new services, products and efficiency? How do automation and intelligence enter the picture for better matching buyers and sellers? BriefingsDirect had an opportunity to learn first-hand at the recent 2014 Ariba LIVE Conference. To learn more about how business—led by procurement—is changing and evolving, and how to best exploit this new wave of innovation, we sat down with Rachel Spasser, Senior Vice President and Chief Marketing Officer at Ariba, and Andrew Bartolini, Chief Research Officer at Ardent Partners.


SEC seeks data on cyber security policies at Wall Street firms
The SEC Office of Compliance Inspections and Examinations (OCIE) will review each company's tools and policies regarding governance, risk identification and assessment, network and data security controls, remote access and third party cyber risks. In a security alert released last week, the SEC said the effort was launched after participants at an SEC-sponsored roundtable discussion in March stressed the importance of strong cybersecurity controls at Wall Street firms. During the roundtable, SEC Commissioner Luis Aguilar recommended that the Commission collect information from broker-dealers and other financial firms about their cyber readiness.


Now is the time to switch back to Firefox
Mozilla's commitments to your privacy and to the open web are much more important than what any of its staff might have done in the past. In any case, Mozilla co-founder and former chief executive Brendan Eich has already quit, and Mozilla chairman Mitchell Baker has very publicly apologised. At this point, anybody who still thinks boycotting Firefox is a good idea is behind the times. It needs -- and deserves -- your support. Businesses, of course, tend to judge things on merit, which is where the argument for Firefox is strongest. I switched back to Mozilla Firefox in the middle of last summer, when it first became a better browser than Chrome, at least for me.


Intuitive, Robust Date and Time Handling, Finally Comes to Java
When dealing with dates and times we usually think in terms of years, months, days, hours minutes and seconds. However, this is only one model of time, one I refer to as “human”. The second common model is “machine” or “continuous” time. In this model, a point on the time-line is represented by a single large number. This approach is easy for computers to deal with, and is seen in the UNIX count of seconds from 1970, matched in Java by the millisecond count from 1970. The java.time API provides a machine view of time via the Instant value type. It provides the ability to represent a point on the time-line without any other contextual information, such as a time-zone.



Quote for the day:

"People grow through experience if they meet life honestly and courageously. This is how character is built." -- Eleanor Roosevelt

July 22, 2012

HostGee Innovates Cloud Hosting with Cloud Servers in Saudi Arabia
Designed to give users the power they need rapidly, Cloud Servers in Saudi Arabia combines convenient control panels, a strong infrastructure and frequently used features, like firewalls and load balancers – all at a fraction of the cost of other services.

VMware Clusters – Scale up or out?
Is is it better to Scale up or out? The answer is of course, it depends. First lets define the two terms. Put simply, Scale Up is having larger hosts, and less of them. Scale Out is having more smaller hosts.


Power Pwn: This DARPA-funded power strip will hack your network
The Power Pwn may look like a power strip, but it's actually a DARPA-funded hacking tool for launching remotely-activated Wi-Fi, Bluetooth, and Ethernet attacks. If you see one around the office, make sure to ask if it's supposed to be there.


Big Data: The Coming Sensor Data Driven Productivity Revolution
... “Boeing jet engines can produce 10 terabytes of operational information for every 30 minutes they turn. A four engine jumbo jet can create 640 terabytes of data on just one Atlantic crossing ...

Act Bigger than You Are
 Not bigger in the bad sense, with the arrogance and complacency that has made some banks, for example, feel they are above the rules. But bigger in terms of having the confidence to propel growth and set courageous goals.

Whitepaper archive for Business Analysts
Here is a collection of Whilte paper archives published by DEA, which would be useful for those handling the Business Analysis functions.

Which EA tools? – and why?
Question about EA Tools… What tools do you use to help you with EA tasks and why? What do you perceive their Pros and Cons to be?

Top 20+ change management mistakes to avoid
Driving and managing change will remain the number one priority for leaders according to a recently published study. But the reality is that most change efforts fail. Many of these failures can be traced to these common mistakes:


Enterprise Spring Best Practices – Part 2 – Application Architecture
This blog presents a look at the overall application components and architecture.



Quote for the day:
"Punctuality is one of the cardinal business virtues: always insist on it in your subordinates." ~Don Marquis