Home Tags Segment

Tag: Segment

Aricent Rated as the leading player in Experience Engineering by Zinnov

Zinnov named Aricent as the leading player in the Experience Engineering technology segment and as a mature and emerging player in its Intelligence Platforms and Solutions, Content Security, Immersive Technology, and OTT Video segmentsZinnov placed Ari...

R and Python drive SQL Server 2017 into machine learning

Microsoft last week announced a wave of new features for its data platform, along with the SQL Server 2017 name and what Microsoft calls a “production quality” beta release. Other important changes include a new containerized deployment model for databases, which simplifies installation on Windows and Linux.But it was SQL Server’s new machine learning tools that grabbed my attention.[ Roundup: TensorFlow, Spark MLlib, Scikit-learn, MXNet, Microsoft Cognitive Toolkit, and Caffe machine learning and deep learning frameworks. | Download the InfoWorld megaguide: The best Python frameworks and IDEs. | Download the InfoWorld quick guide: Learn to crunch big data with R. ]Machine learning remains one of Microsoft’s big themes for 2017, and it’s an important segment of SQL Server 2017. Mixing code and data has always been part of SQL Server, first with T-SQL, then with the Azure-focused U-SQL, which extended T-SQL with C# elements.
SQL Server 2016 added support for embedded R code, and SQL Server 2017 continues that evolution by improving its support for R and adding Python. (By renaming SQL Server 2016’s R Services to Machine Learning Services in SQL Server 2017, Microsoft has made clear where it’s aiming its SQL tools.)To read this article in full or to leave a comment, please click here

Man claims his Bose headphones intercept what he’s listening to

Illinois man: my headphones transmit audio metadata to data miner Segment.io.

Prysmian Strengthens Its Position In Offshore Wind

Two new inter-array projects awarded in Germany and DenmarkFocus on product innovation and installation capabilities Milan, 10 March 2017. Prysmian Group, world leader in the energy and telecom cable systems industry, has been awarded two new contracts...

HUBER+SUHNER to showcase state-of-the-art satellite interconnect and cable technologies at SATELLITE...

Global connectivity supplier, HUBER+SUHNER, is showcasing the breadth of its latest Interconnect and Cable technologies during SATELLITE 2017, taking place March 6-9 in the Washington Convention Center, Washington D.C. On display will be the latest in Ground Test and Space Flight hardware addressing both the traditional Space market as well as the needs of the evolving “NewSpace” segment. “Connectivity is a critical requirement in demanding environments, especially space,” said B.J. Lyman, Aerospace and Defense Market... Source: RealWire

How Security Products are Tested – Part 1

The demand for tests appeared almost simultaneously with the development of the first antivirus programs.

Demand created supply: test labs at computer magazines started to measure the effectiveness of security solutions, and later an industry of specialized companies emerged with a more comprehensive approach to testing methods.

The 2017 Infiniti QX30: A stylish crossover let down by its...

Think luxury rather than sporty.

Review: HP’s Elite Slice is a cool possible future for the...

This little PC doesn't quite live up to its promise, but it's a neat idea.

BrandPost: What does the future hold for hyperconverged?

By Bharath Vasudevan, Director of Product Management, Hewlett Packard Enterprise Software-defined and Cloud Group It doesn’t take a fortune teller to look into a crystal ball to see where the future of IT is headed.

A few years ago, the world was introduced to the value a hyperconverged appliance delivers to IT.
Smaller, easier to set up, deploy, use…well, just about everything! According to Gartner, “HCI (or hyperconverged infrastructure) is the fastest-growing segment of the overall market for integrated systems, reaching almost $5 billion by 2019.” And in 2016, Gartner reported that the hyperconverged segment grew by 79%.To read this article in full or to leave a comment, please click here

Aqua Container Security Platform 2.0 Delivers Advanced Isolation

New release of Container Security Platform aims to help further segment application container traffic and adds support for secrets management.

VU#167623: SHDesigns Resident Download Manager does not authenticate firmware downloads

SHDesigns' Resident Download Manager(as well as the Ethernet Download Manager)does not authenticate firmware downloads before executing code and deploying them to devices.

Cyber Lessons From The NSA's Admiral Michael Rogers

Security teams must get better at catching intruders where we have the advantage: on our own networks. The Russians spent a year inside the Democratic National Committee before they were discovered.
It took five months for OPM to catch the thieves that stole the records of more than four million federal employees.
Intruders broke into Yahoo’s systems in 2013, and we don’t even know how long they were inside; Yahoo only discovered the hack when stolen data turned up for sale on the dark web. We invest more and more in our security, but the breaches just get bigger. How many more times does this have to happen before we accept that what we’re doing isn’t working?Earlier this month, during a Senate Armed Service Committee hearing, Admiral Michael S. Rogers, the director of the National Security Agency, told us what we need to do to fix the problem, recognizing two different kinds of cybersecurity: Keeping intruders out of networks. Identifying, containing, and ejecting them once they get inside. We must be able to do both, Admiral Rogers argued, noting that there is an entirely “different thought process, methodology, prioritization, and risk approach to dealing with someone who is already in your network versus trying to keep them out in the first place.”The head of the best offensive agency in the world is telling us exactly what we’re missing, but we aren’t listening. Most organizations still focus heavily on keeping attackers out, rather than trying to catch the ones that get in. A common bit of security wisdom is that hackers have the advantage because they only need to be right once to get in.

This is largely true today - hackers can launch assault after assault to try to break through your defenses, probing for a weakness until you slip.

And every security team, no matter how good, slips up eventually.

But once inside, the intruders are in your network - unfriendly territory.

They have to hide inside your environment, and they only have to slip up once to get caught.Consider the White House, one of the most secure buildings on the planet. Jumping the wrought iron fence on Pennsylvania Avenue isn’t the challenge.

The challenge is dealing with the Secret Service agents that tackle you as soon as your feet hit the lawn.

Cybersecurity teams should play to our strengths, and follow the example of both Admiral Rogers and the Secret Service. We should always work to keep intruders out, but some will always get in. We should heavily invest where we have the advantage: on our own networks. Image Source: By: Orhan Cam via Shutterstock At the White House, it is the Secret Service’s visibility and control inside the grounds that shuts down intruders.

Crossing that lawn is exposed, and the Secret Service detects intruders in seconds.

Access within the compound is limited to only where you need to go for purposes of your meeting, so visitors that step out of bounds are easy to spot.

And once an intruder is detected, there is almost always an agent nearby, with a wide range of tools at their disposal to contain the intrusion.

This is the essence of the defender’s advantage: visibility linked with control means that intruders are at a huge disadvantage once they get in.Unfortunately, we have largely ceded this advantage on our networks.
Security teams often don’t know what devices are connected, or how those devices are talking to each other.

This offers an incredible opportunity for intruders, because by understanding our networks better than we do, they can operate at their strongest when they should be at their weakest.If we are going to take Admiral Rogers’ advice, this is what we must correct.

There are emerging technologies that could help us correct this imbalance. Organizations need real-time visibility into how their devices are communicating so they can identify intruders quickly. We should limit access to important systems; segment networks and important data; patch vulnerable systems; encrypt data.

Each of these steps increases visibility and control.

They enable organizations to quickly identify intruders, act to constrain their movements, and eject them from the network. None of these tools are rocket science, but they require that we focus not just on keeping intruders out, but on catching them when they get in.This reality makes Admiral Rogers’ comments during the Senate hearing all the more poignant.
If there are two types of cybersecurity, why have we invested so heavily in the one where we are at a disadvantage, and given up the advantage we hold for the other? Related Content: As head of cybersecurity strategy, Nathaniel is responsible for thought leadership, public engagement, and overseeing Illumio's security technology strategy. Nathaniel is a regular speaker at leading industry events, and his writing has appeared in industry publications, the ...
View Full Bio More Insights