December 25, 2014

Top Security Highlights from 2014
2014 has been a busy and exciting year for security at Cisco! The team has worked extremely hard to provide our customers with unmatched visibility, continuous control and advanced threat protection across the entire attack continuum. Among many things, Cisco launched the first threat-focused Next Generation Firewall: Cisco ASA with FirePOWER Services. This solution delivers integrated threat defense across the entire attack continuum by combining proven ASA firewall with Sourcefire threat and advanced malware protection (AMP) in a single device. We also announced the integration of AMP into our Cisco Web and Email Security Appliances and Cloud Services, known as AMP Everywhere.


E-readers, tablets can disrupt sleep
“We knew from other published reports that light can affect sleep, so we wanted to know what kind of impact light from these electronic devices specifically would have,” Chang said.Compared to those evenings when they read books, participants who used the electronic devices prior to bedtime took almost 10 minutes longer to fall asleep, the study found. They also weren’t as drowsy in the evening, and were sleepier in the morning. By reading on electronic devices before regular sleep time, the participants shifted their bodies’ typical circadian rhythms, the researchers posited. Circadian rhythms are the biological clocks that signal to humans, and other organisms, when to fall asleep.


Ready to embrace Everything-as-a-Service? Prepare to assume more risk
It’s usually about risk — specifically, risk being transferred to the buyer. Like it or not, business and commercial terms for most “as-a-service” offerings today heavily favor the provider. This is a shock for enterprise buyers who are used to dictating everything to providers on their own contract documents — everything from limits of liability to annual security audits. With as-a-service offerings, the tables have turned. The provider transfers risk to the buyer. This is a relatively new phenomenon, and it’s because of one primary reason: multi-tenancy. The broad-based acceptance of highly standardized, massively scaled shared architectures is transforming the enterprise technology landscape, especially in the areas of sourcing and contracting.


A Testable Idea Is Better than a Good Idea
There was no ‘”aha!” moment. But there was a slow recognition that defining a testable hypothesis requires more rigor than coming up with good ideas to improve products, services and or user experiences. What’s more, a testable hypothesis comes with accountability built in: the hypothesis needs to be tested. It will pass or fail that test. Ideally, you’ll learn either way. But what’s the accountability for a good idea? The fact that a lot of people think it’s a good idea? That’s a popularity contest. The harsh reality is that good ideas have to be tested. Why not insist that people undergo the rigor and discipline of crafting a testable hypothesis? That’s how good ideas get converted into real value.


2014 in Mobile: The Year of Wearable Gadgets
Though smart watches in particular often cram a ton of features into a small package, this year some wearable makers eschewed feature creep for simplicity in an effort to woo consumers. French company Netatmo unveiled June, a jewel-like device on a leather bracelet: it keeps track of the wearer’s sun exposure and works with an iPhone app to tell you when to grab a hat or seek shade. The Hong Kong company ConnecteDevice launched a simple smart watch called Cogito that has a traditional-looking analog face but also shows some notifications. There was also a greater focus on precise biometric tracking this year. In November, startup Empatica announced a wristband called Embrace, meant for people with epilepsy.


Speech Recognition Technology Better Than Human's Exists
Recent inventions in the field of speech and machine learning should lead to major changes in how we murmur, shout, question and interrogate our devices. One of the brains behind Siri says engineers are feverishly working toward speech recognition that's smart enough to engage in authentic conversations with users. "All areas of spoken language understanding have made a lot of progress," says William Mark, a vice president at SRI International, which developed the fundamental technology behind Siri before it was acquired by Apple. "This kind of conversational interaction is where the leading edge is right now."


Composition for Partial Aggregate Domain Model
The problem still arises for enterprise applications. Imagine the company works with Domain Driven Design (DDD), where the domain are business objects they loaded in their bounded context. Due to performance reason, sometimes we want to load the full bounded context, sometimes only a part of it, some classes but not the others. One solution would be splitting the bounded context into smaller bounded contexts but it’s not always possible because we don't work anymore with a logical business set of data, so we’ll need then to join data.


Cyberwarfare: Digital weapons causing physical damage
While the attack on Sony is considered “unprecedented,” it was not the worst corporate hack in 2014. More records were stolen from JPMorgan, Home Depot and even eBay. But details of two of the scariest cyberattacks just hit the news in December...and one of those -- about Turkish pipeline explosion -- has been a secret since 2008. The other involves a digital attack on a German steel factory that resulted in 'massive damage.'


Sony hack timeline: How a silly comedy sparked real cyber-terror
The fallout has forced the studio to cancel the release of The Interview after major theatre chains decided not to premiere the movie. The comedy, which sees the two protagonists (Seth Rogen and James Franco) sent on a mission to assassinate North Korean leader Kim Jong-un, has sparked an international crisis, with hackers threatening moviegoers with a 9/11-style attack. The events mark one of the most poignant corporate breaches of security in history. MicroScope examines the events leading up to the current situation.


Lean Project Management Using “Oobeya"
Oobeya is a learning method: teams learn to evaluate the voice of customers, see problems as soon as they arise, resolve problems quickly and efficiently in order to protect customers, create and use standards that improve quality and remove variability in their process, and collaborate with the whole organization. All of this contributes to developing knowledge about our own work. Smarter, more motivated professionals make better products faster. If the team is already agile, Oobeya can increase the team’s velocity and give them the tools they need to match their pace to that of the customer.



Quote for the day:

“A good person will resist an evil system with his whole soul. Disobedience of the laws of an evil state is therefore a duty.” -- Gandhi


December 24, 2014

PCLinuxOS and UEFI systems
First, when I boot the Live image, the screen comes up at the wrong resolution as noted above. Of course, this is not a fatal problem, you could just ignore it and go ahead with the installation, and deal with this on the installed system. But the screen is rather small and ugly, and it's not easy to read. The way to correct it is relatively simple, you just need to delete (or rename) the file /etc/X11/xorg.conf, and then restart the X server. It will then figure out the correct display size on its own, and the world will be a wonderful place again.


Google Wants to Turn Browser Signals of Web Encryption Upside Down
"We, the Chrome security team, propose that user agents (UAs) gradually change their UX to display non-secure origins as affirmatively non-secure," the engineers said in messages spread across several discussion forums, including Google's own Chromimum project. "The goal of this proposal is to more clearly display to users that HTTP provides no data security." Chrome's argument was that, without HTTPS and SSL/TLS encryption, traffic between a user's browser and a website is inherently unsafe. The visual display should explicitly call that out.


Ten Ways to Make Your Cloud More Efficient
Believe it or not, we are at a very critical junction point when it comes to cloud computing. Although growth has been steady, we’re about to hit a very big boom. According to the recent Cisco Global Cloud Index Report, “while the amount of global traffic crossing the Internet and IP WAN networks is projected to reach 1.6 zettabytes per year by 2018, the amount of annual global data center traffic in 2013 is already estimated to be 3.1 ZB, and by 2018 will triple to reach 8.6 ZB per year.” So in the midst of this rapid growth, how can you improve cloud efficiency to keep your environment up and running in a proactively healthy state?


A Robot Really Committed A Crime: Now What?
Two London-based artists coded a bot that randomly purchased items from a hidden or “darknet” market using Bitcoin. The bot purchased, among other things, fake Diesel jeans and ten pills of ecstasy. But it also purchased perfectly lawful items such as a stash can and baseball cap with a camera in it. You can see the items here. Are these artists liable for what the bot bought? Maybe. In the United States, at least, criminal law is predominantly statutory. We would have to look to the precise wording of the federal or local law and then apply it to the facts at hand. If, for instance, the law says a person may not knowingly purchase pirated merchandise or drugs, there is an argument that the artists did not violate the law.


The gift of time
The holiday season is often spent frenetically buying gifts, attending or hosting parties, and celebrating the end of one calendar year and the start of the next. This activity is in addition to your regular work and life activities. It can be exhausting! I think we all would be well-served by taking a close look at how we spend our time each day. Are we choosing the most effective ways to act, interact, and behave? If we slow down for a few minutes and analyze how we spend our time, we can refine our choices to serve ourselves and others better.


New per-user Windows license pricing cuts VDI costs
Microsoft has been tight-lipped about the per-user license pricing. The company declined to release list price details this week, only saying volume licensing pricing is available to customers through Microsoft partner resellers. Windows license pricing is often negotiable depending on the volume or agreements organizations have with Microsoft. But glimpses of the per-user pricing indicate some possible savings for Microsoft customers, said Paul DeGroot, analyst at Pica Communications in Camano Island, Wash., and author of Microsoft Licensing Concepts.


The CISO, the CIO, the CEO, or you: Who is really responsible for cybersecurity?
"IT security is a commodity where you can go and buy products and expertise from a provider," he says. "The same is true in regards to business security in many cases - the processes and governance are a commodity that you can purchase as a managed service." Shiraji says he would rather spend his limited IT budget on front-line operations, and then draw on specific expertise to help protect his data and guide his staff. The organisation recently received ISO 27001 accreditation and the communications support from the chief executive proved essential.


The hottest wireless technology is now sound!
Using sound for transferring data is nothing new. In the 1940s, when IBM tried to solve the problem of how to use regular telephone lines to connect two computers, it figured out a way to convert data into sound, send the sound over the phone and then convert it back into data. (Yes, I'm talking about the modem.) The benefit of using sound for data transmission was that equipment to handle the process was widely available. In the wireless era, sound is still a great option for data transmission and other uses, and for the same reason. Lately there's been a surge of innovations that harness sound waves to transmit data and do other creative things. Here's what's going on.


Seven steps to becoming a digital leader
All transformations – digital or otherwise – start with a vision from the top. The CEO and the board need to create a credible and compelling vision for the business in the digital age. And this vision has to be shared with the rest of the business to maximise the chances of it becoming a reality. In Don’t wait for a crisis to go digital I described how creating a vision for the digital age required a fresh perspective on the organisation – the outside-in view. ... in the course of conducting hundreds of interviews with organisations about their approach to digital, it became clear to him and co-authors George Westerman and Andrew McAfee that firms that struggle to become truly digital “fail to develop the leadership capabilities required to set and execute a digital vision.”


Making CIO-CMO Relationship A Success In 2015
Organizations succeed only when CMOs and CIOs share a single, customer-focused business technology agenda, says a Forrester report, and hails the CMO and CIO as the two roles that matter most for 2015. Forrester analyst and Chief Research Officer, Cliff Condon, explains in his blog that unlike before it makes little sense for CMOs to focus only on marketing and promotion. In the age of the customer, the CMO of 2015 must own the most important driver of business success — the customer experience — and represent the customer’s perspective in corporate strategy.



Quote for the day:

"Let him who would be moved to convince others, be first moved to convince himself." -- Thomas Carlyle

December 23, 2014

CIO interview: Catherine Doran, CIO, Royal Mail
According to Doran, one main concern during the recruitment exercise was avoiding a "scattergun approach". Given that it was an extended campaign, the last thing the CIO wanted was seeing job applications dwindle because of a possible impression that something was wrong. The solution to that risk was driving targeted campaigns to different communities using LinkedIn. "LinkedIn was a big deal for us, to be honest. When we were looking for architects we would target that community, do a campaign with them for a bit, then we wouldn’t do anything with them for a while. Then we’d release a set of jobs to, for example, testing professionals, then programme and project management people and so on," Doran says.


Using the Open FAIR Body of Knowledge with Other Open Group Standards
The Open FAIR Body of Knowledge provides a model with which to decompose, analyze, and measure risk. Risk analysis and management is a horizontal enterprise capability that is common to many aspects of running a business. Risk management in most organizations exists at a high level as Enterprise Risk Management, and it exists in specialized parts of the business such as project risk management and IT security risk management. Because the proper analysis of risk is a fundamental requirement for different areas of Enterprise Architecture (EA), and for IT system operation, the Open FAIR Body of Knowledge can be used to support several other Open Group standards and frameworks.


Conflict and Resolution in the Agile World
Collaboration means conflict: Any time more than one person works on a problem, there will be disagreements about how to solve it. Whether you disagree over methodology, philosophy, tools, technology, personality or even the basic understanding of the problem, you will have to work through your disagreements to get to a solution. The more people that work together, the harder it is to get consensus. Transparency means conflict: Agile practices place a premium on transparency. Transparency allows problems to surface and be squashed. Without transparency, problems can fester, grow and ultimately become insurmountable. But with the good comes the bad. With increased transparency, there is also an opportunity for more disagreements, and conflict within the team and with external stakeholders.


Success of Health IT Rests With Business Alignment
Some in the medical community suggest that EHRs and other health IT systems would be most effective if they were to fade into the background and minimize the interaction required with the care provider. Kavita Patel, managing director of clinical transformation at the Engelberg Center for Healthcare Reform, says that practitioners would welcome technologies like motion-capture gesturing systems that would "do away with the computer in the room." "Any of these workarounds or kind of 'life hacks' that I think we can do in clinical medicine are probably something that every physician or every clinician who sees patients would want millions of," she says. "So there's an entrepreneurial mission waiting to happen."


Getting Your Data House in Order
When we talk about getting our houses in order, sometimes we mean our financials, relationships, or our actual house. What about an organization’s data house? I see many correlations between data problems and companies’ lack of organization. When I talk about getting our data house in order, I am talking about the nitty-gritty of solid data governance practice. Much has been written and discussed on the principles and frameworks of data governance, but sometimes the mechanics of making data decisions are overlooked. To me, it is a matter of embedded organization practice.



The Power of Cloud Computing
“Arguably the most essential aspect of the Cloud is its ability to provide an integration of nearly limitless numbers of data sources involving structured, semi-structured, and unstructured data,” Dataversity’s Jelani Harper writes. “Such integration spans geographic location and includes both on-premise and Cloud sources, and is frequently typified by a speed of access that comes in real time or close to real time.” Obviously, that’s not something that would be cheap or easy or maybe even possible with traditional data management tools, she adds. The article includes three sample use cases that show off cloud computing’s mad data integration skills.


5 things you should know about DDoS attacks, outages, SSL, and web performance
Last week at Radware, we released our annual Global and Network Security Report. This report is based on data gathered from a survey of 330 organizations worldwide. The survey was designed to collect objective, vendor-neutral information about the issues organizations face when preparing for and fighting against cyberattacks. The report gives a comprehensive and objective review of the past year’s cyberattacks from both a business and a technical perspective. It also offers best practice advice for organizations when planning for cyberattacks in 2015. But my favourite aspect of this report is the fascinating play-by-play insight into how today’s sophisticated attacks take place.


20 Netstat Commands for Linux Network Management
netstat (network statistics) is a command line tool for monitoring network connections both incoming and outgoing as well as viewing routing tables, interface statistics etc. netstat is available on all Unix-like Operating Systems and also available on Windows OS as well. It is very useful in terms of network troubleshooting and performance measurement. netstat is one of the most basic network service debugging tools, telling you what ports are open and whether any programs are listening on ports.


2015: The Year of the Compliance-Created Cyber Confidence Collapse?
The biggest security risk now faced by employers is not outside hackers. It is compliance experts who stay just long enough to help you tick the latest regulatory boxes, having acquired the necesary understanding of your systems and security credentials necessary to do so. The drive by the European Commission to address supposed "data protection" problems, supported by the US obsession with "Data Breach Notification", could not have done a better job in opening up opportunities for serious fraud (both high value and mass market) if they had been actively planned by organised crime.


Charlatans: The new wave of privacy profiteers
Within two days the Kickstarter project, which began at $7500, blew up into a $600,000 funding sensation. It also drew enough attention to Germar's dangerously false promises that Germar's con unraveled, fast. Within a week of all the great PR, funders began withdrawing their dollars in droves, and public outcry pushed Kickstarter to suspend Anonabox's funding campaign. But not before things got quite ridiculous -- in large part due tothis blistering Reddit thread. As it turned out, Germar's custom open source hardware product wasn't custom, or open source. Thanks to infosec community chatter on Twitter and the Reddit thread, funders and observers discovered Anonabox's entire hardware package was actually an off-the-shelf Chinese router.



Quote for the day:

“You will never see an eagle of distinction flying low with pigeons of mediocrity.” -- Onyi Anyado

December 22, 2014

Hybrid cloud adoption set for a big boost in 2015
What's helping to bridge that gap is the hybrid cloud -- a combination of using a private cloud and a public cloud, giving the user the security of a private offering and the low cost of public. While the cloud market is still immature, enterprises are starting to get their feet wet with the hybrid cloud. While they may not make a huge shift to put critical workloads or even production workloads into the hybrid cloud this year, companies are looking to experiment with it and try it out with basic apps and information. "Hybrid is at the early stages of the maturity cycle," said Krans. "Hybrid is growing, but it will take a lot of experience to really grow it for more critical applications."


10 Ways Data Center Industry Will Change in 2015
As we approach the end of 2014, those in IT who like to ponder industry trends send us their predictions for next year. Here are some of the more interesting predictions we have received from folks so far. Stay tuned for more 2015 predictions on Data Center Knowledge in the coming weeks. Here it is, our list of data center industry trends that will dominate the conversation in 2015:


Five Rules for Strategic Partnerships in a Digital World
Partnerships have also always been notoriously tricky to make work. Too bad, because in today’s hypercompetitive, hyper-connected marketplace, partnerships have taken on even greater strategic importance and complexity. Both business-to-consumer and business-to-business companies are in an arms race to develop innovative user experiences, expand distribution, and capture new sources of monetization. Digital leaders are discovering that their future depends not just on what their own companies can do, but on the capabilities, functions, channels, and insights they can tap by partnering with others.


Fog Computing and the 'Internet of Things' Analytics Hardware
Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. With the concept of Fog Computing, where by the network locally analyze the IoT data and take a decision on what data to be passed on to cloud. It's a concept called fog computing. And Cisco® makes it possible today with the Cisco IOx platform. Cisco IOx takes the best of Cisco IOS® Software capabilities, combines them with compute, storage, and memory at the network edge.


5 lessons to help security pros craft a New Year’s resolution
People often find themselves stressed and overwhelmed during this time of year. Looking back, they realize all the goals that are still unmet. The cyber security holiday season is no different. While some organizations might be happy they did not get breached this year, behind closed doors everyone, including the CEO, is likely wondering at what point a breach will happen; will it be in 2015? The answer, which no one wants to hear, is that a breach will happen. However, if handled correctly, the damage can be very minimal. Consider these lessons from 2014:


Obama Vows U.S. Response to North Korean Hacking Attack on Sony
There is no evidence of direct Chinese participation but the country does keep a close eye on data moving through its networks, suggesting it may have been aware of the North Korean attack and did nothing to alert officials in the U.S., the person said. When asked if China assisted in the Sony attack, Obama said the U.S. has “no indication that North Korea was acting in conjunction with another country.” ... “We will respond,” Obama said, without specifying any actions. “We will respond proportionally and we will respond in a place and time and manner that we choose.”


Exploring Microsoft Licensing, Part 2: Don’t Get SAM’d
Microsoft isn’t auditing everyone equally. They’re cherry-picking areas that are in decline or showing signs of slowed growth. I’ve seen another area that attracts audits. Generally, customers have some sort of non-compliance that are met with steep fines. However, Microsoft will almost always offer the customer a “true up” of the non-compliance licenses as long as the customer agrees to sign a new, three year, Enterprise Agreement. This process locks you in for another three years with Microsoft with no assurances that at the end of that time they won’t audit you again. One of our recent customers was audited by Microsoft during the evaluation process and faced a steep penalty.


Version 3 of FoundationDB's Key-Value Store database announced
Let's get around all of the hype in FoundationDB's release and get to the point. Relational databases have been pressed into service in many applications because it has become a tradition, not because it is the best or most cost effective tool in the shed. I suspect this is because many developers were trained to use relational databases and now see the world though that lens. I'm reminded of something Abraham Maslow once said "If you only have a hammer, you tend to see every problem as a nail." Other approaches to database management can be more cost effective, offer better performance in some applications, be more reliable and also use system resources much better.


Decisions, decisions: Choices abound as data center architecture options expand
More companies are opting to move away from traditional data centers with rows and racks of servers because there are a number of issues to contend with in a conventional data center model, including buying your own equipment, figuring out a floor plan, installing it, testing it and maintaining it, experts say. The number of data centers worldwide will peak at 8.6 million in 2017 and then begin to decline slowly, IDC predicts, although the amount of total data center space will continue to grow as mega-data centers replace smaller ones.


Inject Novelty into Your Innovations
We look at game participation using the information about in-game achievements, which are now common practice across video-games: measures of how accomplished players are, so that they can have bragging rights with their friends. The evolution of participation in the expansion “The Wrath of the Lich King” is displayed in the graph and shows clear insights about how players respond to product updates. Before each product update, users are forward-looking, anticipating new content that is very likely more exciting than what was launched before, which leads to waiting for the new content and drops in participation (red circles in the graph).



Quote for the day:

"You got to be careful if you don't know where you are going, because you might not get there." -- Yogi Berra

December 21, 2014

2014 Is Ending, but This Wave of Technology Disruptions Is Just Beginning
The sun is setting on 2014, but we're about to watch a new wave of technologies rise and remake the world. (Katherine Frey/The Washington Post) Changes in technology are happening at a scale which was unimaginable before and will cause disruption in industry after industry. This has really begun to worry me, because we are not ready for this change and most of our leading companies won't exist 15-20 years from now. Here are five sectors to keep an eye on:


Data science handbook: 3 tips for becoming a data scientist
To get a clearer picture of the state of data science, how employers and employees alike can take advantage of it, and how you can enter the field, we spoke with some of the field’s most prominent voices: DJ Patil, co-coiner of the term “data scientist”; Michelangelo D’Agostino, formerly of Obama 2012’s data team; and Clare Corthell, creator of The Open Source Data Science Masters. We’ve distilled their insights into three main pieces of insight that we will share below.


New Ransomware Avoids Hitting the Same Victim Twice
OphionLocker uses infected websites to install itself on unpatched computers, then encrypts the victim's data with strong opensource Cropto ++ elliptical curve cryptography. The cost to recover the files is typically around 1 Bitcoin, or about US $333. According to KnowBe4, the ransom amount varies based on the victim's country, with the U.S. having the highest rates. After victims are infected and their files encrypted, the malware sends the victims to the ransomware site where they are given payment instructions. However, the ransomware does not secure delete the files or remove shadow volume copies, so a file recovery tool or a program like Shadow Explorer could be used to recover the files.


Policy frameworks can help or hinder India's tech revolution
By 2025, India could reach a "tip ping point," where the economic benefits of large-scale technology adoption accrue at an accelerating rate. For example, digital tech nologies such as verifiable digital ID and the mobile Internet used in concert will enable universal financial inclusion, potentially raising incomes of people who lacked access to banking and credit by 5 to 30%, which could add economic value of $32 billion to $140 billion per year in 2025. The administration of school and online teacher certification and training, along with blended learning--using online systems and MOOCs can boost the quality of K-12 and post-secondary institutions, and deliver $60 billion to $90 billion in economic value per year by 2025 through a better skilled workforce.


New Chip Points the Way Beyond Silicon
The semiconductor industry is finding that scaling any smaller introduces a range of problems. At one panel held during the IEDM conference, Mark Bohr, a senior fellow at Intel, estimated that silicon scaling would end in about a decade. “My general response is wild enthusiasm for any new idea,” he said. With superb electrical properties, germanium has always promised to make speedier circuits than silicon. But engineers were unable to use it to make compact, power-efficient circuits based on the industry’s established manufacturing technique, known as complementary metal-oxide semiconductor, or CMOS, technology.


Coder, sell thyself
Assuming that you have your goals in mind and are serious about the pursuit of new business, you now have to create the space to allow your business to develop. If you are currently employed by someone, you have to quit your job. If you are currently engaged in a 100% on-site contract position, you have to step away. You must create a vacuum in order to draw in new clients and project work. If you are mentally in a space where you want to find new work, but are physically occupied by an opposing force, you will repel potential opportunities. You must be aligned mentally and physically in order to draw new clients and paid project work to you.


Setting Up a Redundant Internet Connection With BGP
Many organizations have identified the Internet as a critical resource that should never be down. As a result, a redundant Internet connection is configured to help ensure there’s at least one connection to the Internet up at all times. In this post, we’ll consider the topology for a network with a redundant Internet connection that uses Border Gateway Protocol (BGP) routing. Here, BGP will do two things: learn the Internet routing table, and announce the local, publicly accessible network to the Internet. To keep things as simple as possible for those of you who’ve never worked with BGP before, we’ll do this with a single Internet router.


Point-to-Point Generic Routing Encapsulation ( GRE ) over IP Security ( IPSEC )
Diverse multi protocol traffic requirements forces the use of a Generic Routing Encapsulation ( GRE ) envelope within the IPSEC tunnel. The p2p GRE tunnel is encrypted inside the IPSEC crypto tunnel. Native IPSEC is not multi protocol and has no support IP multicast or broadcast traffic. As a result, proper propagation of routing protocol control packets cannot take place in a native IPSEC tunnel. With a p2p GRE over IPsec design, all traffic between hub and branch sites is firstly encapsulated in the p2p GRE packet BEFORE the encryption process takes place.


Organizational Resilience: The Business Continuity Institute's View
The Business Continuity Institute realises the value of BS 65000 and the thinking that comes behind it. It affirms its premise of strengthening the collaboration among ‘protective disciplines’ in order to create a coherent approach to achieving resilience. Business continuity as a discipline has resilience at its heart and the BCM Lifecycle explicitly relates to building resilient organizations. In participating in the ongoing development of organizational resilience, the BCI makes a positive case for the ‘protective disciplines’ and enabling top management buy in into our work. It also makes practitioners responsible for resilience more visible to top management, taking their work as a matter of strategic importance to the organization.


Don’t trivialise the internet of things
Walport said IoT could have a much greater impact on society than the first digital revolution, with the potential to support “an extraordinary range of applications and economic opportunities”. However, he warned there will also be potential for significant challenges around security and privacy breaches, and it will be critical that scientists, programmers and entrepreneurs behave and act responsibly. “Equally,” wrote Walport, “policy makers can support responsible innovation and decide whether or how to legislate or regulate as necessary. Everyone involved in the IoT should be constantly scanning the horizon to anticipate and prevent, rather that deal with unforeseen consequences in retrospect.”



Quote for the day:

"The problem with being a leader is that you're never sure if you're being followed or chased." -- Claire A. Murray