All posts on August, 2018


news

Mastering email security with DMARC, SPF and DKIM

Despite making some progress, a trio of email security protocols has seen a rocky road of deployment in the past year. Going by their acronyms SPF, DKIM and DMARC, the three are difficult to configure and require careful study to understand how they inter-relate and complement each other with their protective features. The effort, however, is worth the investment in learning how to use them.
To read this article in full, please click here
(Insider Story)

Read more 0 Comments
news

Why Apple’s AR glasses will transform your enterprise

Apple is working to develop augmented reality (AR) glasses. It has been working on these for years and is now expected to introduce them as soon as 2020. What use will they be?
Apple: The next generation Analyst Ming-Chi Kuo says these things will usher in “next-generation revolutionary UI,” likely referring to prevailing wisdom that says sophisticated virtual reality (VR) experiences will be controlled by a combination of speech, gesture, movement, and touch-based commands. Motion sensors will be activated by what you do with your arms, for example.
To read this article in full, please click here

Read more 0 Comments
news

The best antivirus software? Kaspersky, Bitdefender and Trend Micro lead in latest tests

The AV-TEST Institute recently tested the most popular Windows 10 client antivirus products on three primary criteria: protection, performance, and usability. Only four of the 16 products tested earned a perfect rating of 6 for each of those criteria: Bitdefender Endpoint Security 6.2 and 6.6, Kaspersky Lab Endpoint Security 11, Kaspersky Small Office Security 5 and 6, and Trend Micro Office Scan 12.
[ Get inside the mind of a hacker, learn their motives and their malware. | Sign up for CSO newsletters! ]
To read this article in full, please click here

Read more 0 Comments
news

How to get the most from Microsoft Intune

Microsoft's Intune, launched in 2011 and augmented with mobile management capabilities the following year, is part of Microsoft's Enterprise Mobility Suite — a bundle that includes Azure Active Directory and Office 365. At the most basic level, Intune delivers enterprise mobility management (EMM) capabilities in a cloud-based format.
To read this article in full, please click here
(Insider Story)

Read more 0 Comments
news

Throwback Thursday: How did…er, DIDN’T he do that?

It's 1977, and this network analyst pilot fish is working at a newly constructed data center — one with a big fence.
“The company had just gotten a new sense of needing physical security, so they had included a new, state-of-the-art security system,” says fish.
“It had electronic locks at a handful of doors in the building, a 10-foot-high fence with a motorized gate, and key-card reader stations by each of the locked doors and the gate.”
One day, company needs to bring a new communications line up between the data center and an office 10 miles away. Fish's team leader decides the best way to do this without disrupting the users is to have fish go to the remote office at 4:30 a.m., while his team leader goes to the data center.
To read this article in full, please click here

Read more 0 Comments
news

Why there are no shortcuts to machine learning

Big data remains a game for the 1 percent. Or the 15 percent, as new O’Reilly survey data suggests. According to the survey, most enterprises (85 percent) still haven’t cracked the code on AI and machine learning. A mere 15 percent “sophisticated” enterprises have been running models in production for more than five years. Importantly, these same companies tend to give more time and attention to critical areas like model bias and data privacy, whereas comparative newbies are still trying to find the On button.
To read this article in full, please click here
(Insider Story)

Read more 0 Comments
news

Introducing the Kubernetes Operator for TiDB

Shuan Deng and Greg Weber are cloud product engineers at PingCAP.
The rise of Kubernetes has significantly simplified the deployment and operation of cloud-native applications. An important part of that experience is the ease of running a cloud-native distributed database like TiDB. TiDB is an open-source, MySQL-compatible “NewSQL” database that supports hybrid transactional and analytical processing (HTAP).
In this tutorial, we’ll discuss how to use the TiDB Operator, a new open-source project by PingCAP to leverage Kubernetes to deploy the entire TiDB Platform and all of its components. The TiDB Operator allows you to monitor a TiDB deployment in a Kubernetes cluster and provides a gateway to administrative duties.
To read this article in full, please click here

Read more 0 Comments
news

Hack mobile point-of-sale systems? Researchers count the ways

Ever since the infamous and massive security breach at retailer Target nearly five years ago, more and more attention has focused on the potential flaws that can make payment systems vulnerable to digital attack.
And now, with payments increasingly shifting to mobile platforms, it appears that the potential for hacking the mobile point-of-sale (mPOS) systems that make it possible for merchants to accept card and even cryptocurrency payments on-the-go is also shifting.
[ Keep up with 8 hot cyber security trends (and 4 going cold). Give your career a boost with top security certifications: Who they're for, what they cost, and which you need. | Sign up for CSO newsletters. ] Presenting at the Black Hat USA information security conference last week in Las Vegas, prominent U.K. security researchers showcased recent research detailing the inherent vulnerabilities they discovered among four of the most popular mPOS systems operating in both the United States and Europe. In what is believ..

Read more 0 Comments
news

Augmented reality examples: 9 ways companies are putting AR to work

AR meets real worldImage by Getty Images
When your team works in the belly of an aircraft or inside a computer design, they all having the same sci-fi daydream: Augmented reality (AR) that can layer information onto the job to cut out their frustration and inevitable errors. Being able to walk through a design in three-dimensional space can make it easier to identify flaws that are hard to see in two dimensions. And looking at a schematic of the thing you are trying to fix, while you are working on it, could eliminate hours of frustrating back and forth with drawings and keyboards.
To read this article in full, please click here

Read more 0 Comments