Archive for category Security
A Massachusetts company called Prelert released a new application yesterday that combines machine learning and predictive analytics to detect and report anomalous behavior emanating from IT infrastructure. If that sounds a lot like what Splunk does, you’re right.
The mobile transformation is at the intersection of every large IT trend including cloud, big data and application modernization. Think about the major changes IT will face over the next five to ten years.
As more people become comfortable with technology, new strains will be placed on the IT group, which will have to adapt to meet evolving business demands. Tablets and smart phones will continue to be white-hot technologies that spans between the consumer and business worlds.
CIOs needs to tackle issues such as BYOD and the consumerization of IT so they can build a stronger partnership with the workforce in order to tackle future transformational projects.
Virtual Desktop Infrastructure or VDI has long been kind of the lesser flashy sidekick to server virtualization and the cloud. We often hear so much about virtualization, and especially the cloud, because they are flashy, they do have that element of consumerization of IT. VDI however has been making consistent increased presence in the enterprise for a number of years now. For some organizations, it can be complicated to ingest the kind of changes that VDI introduces and the advantages it brings about. VDI products typically build on virtualization platforms, and that is one sure advantage. It also delivers improvements and efficiencies to the enterprise environment that is changing the ways a lot of environments are conducting business.
Network security forensics is often overlooked or lightly regarded when composing an overall security strategy. Be it forecasting a budget for forensic tools, or planning of an all-new green-field environment, the protection that proper forensics strategy provides in an environment can save countless resources when it comes to restoring a stable state, ensuring integrity, analyzing an intrusion or outage event, and learning information that can be used in the future. Forensic concepts also aid in reinforcing that secure data remains confidential. Forensic tools buttress the elements of a network that ensure integrity and availability. Sometimes this means a secure chain of custody or access, touching on the administrative model, it is often affected or in compliance with legal assertions or mandate.
As we continue this journey into the age of big data, cloud, mobility, social media and so forth, vast amounts of data are being generated daily. The volume of digital information continues to grow with no end in sight. More and more, personal and company information are becoming more and more digitized, both in storage and transfer. Securing this information is a growing challenge, and is becoming more complex by the day. Protecting digital assets means utilizing the best of available technologies and methodologies to achieve security goals. Not only must they ensure that the quality and performance of the solution is maintained, they must also assure undoubtedly that the information they seek to protect stays uncompromised.
With an abundant array of ways to hack and numerous reasons to do so, it’s no wonder that hacking has come such a long way since the old school hackers of yesterday. While a good number of today’s hackers are untouchable geniuses, some of them have yet to overcome the first rule of hacking– don’t get caught! Here is a list of the greatest Hacker #FAILS:
Busted by Boasting
Hacktivism was intended to refer to the development and use of technology to foster human rights and the open exchange of information (via Wired). Hacktivism could also be defined as “the nonviolent use of legal and/or illegal digital tools in pursuit of political ends.”
The tools used in Hacktivism include web site defacement, redirects, denial-of-service attacks, information theft, web site parodies, virtual sit-ins, typo-squatting, and virtual sabotage.
The team at SiliconANGLE and Wikibon have been following and reporting on the rise of several significant hacktivist groups over the past year plus. Here is a visual representation of the most recent Hacktivist Timeline, with links and additional references below.
There are plenty of people out there who want to break systems, gain secret information, and edit the world to their fancy. There are some who accomplish this by hacking the world’s most guarded data systems, then there are those who take a slightly less code-genius approach to hacking the world. Take a look at some of the best no skill hackers.
The Jealous Girlfriend
No-Skills required: sticky fingers
Whether you go to hone your black hat hacker skills, white hat hacker skills, or just to get on the good side of some of the world’s most powerful system security experts, hacker events are where it’s hat… errr at. Hacker events provide hackers a chance to gather, learn, and compete with each other. Events often include lectures from world renowned hackers, break off groups, and hacker games such as Capture the Flag where teams hack and defend systems or Hackathons– 24 hours of collecting hacked systems. Word to the wise, undercover FBI agents attend hacker events by the drove, trying to recognize creative code and learn new faces in the hacker world. Even with the Fed presence, hacker events are notorious for extracurricular hacker pranks outside of the scheduled rubric. A quick synopsis of such pranks include hijacked hotel wifi, gaining access to hotel billing systems, and even an instance of hacking an ATM in the hotel lobby. Here’s a list of hacker events to look forward to in 2012.