Friday 30 October 2015

Apple applies for patent for making iPhones shatter proof

Ever If you have ever had the misfortune of your iPhone slipping away from your hands and its screen breaking..

from
via CERTIVIEW

Disney Researchers invent method for designing 3D printable connectors for connecting physical objects

Want to mount a smartphone on your car's dashboard? On the arm of a chair? On your guitar? The choice..

from
via CERTIVIEW

8 innovative ways WhatsApp is being used in India

WhatsApp is extremely popular among the youth as a popular messaging platform.  Dataquest brings you some innovative examples of organizations..

from
via CERTIVIEW

How To Track Processes With Active Directory Auditing

Active Directory Auditing is a free tool that offers a great way to see all the process activity going on on a set of domain-joined PCs. Here's how you can set up and use AD auditing.

from Tom's IT Pro
via CERTIVIEW

Building the Next Generation of Cyber Professionals

Building the Next Generation of Cyber ProfessionalsNew technologies lead to new products, which lead to a need for more cybersecurity professionals. It’s an ongoing cycle.

Future security professionals will need to focus on some key concepts in order to be knowledgeable and equipped to handle the stability and security issues of tomorrow’s technology.

Experience

Experience always has and always will be important in landing a job and keeping that job. You need to be able to perform the tasks required by a position. You might not be able to walk directly into the security profession of your dreams, but starting off in more mundane positions, excelling at accomplishing your work responsibilities will not only grant you experience, but also enable you to be recognized for your excellence, which usually equates to promotion and career advancement. More experience leads to more knowledge, and more applied knowledge leads to wisdom. Security professionals need wisdom to see the risks and responses that others overlook.

Coding Skills

There will always be IT positions that do not require programming ability, but a security professional is not likely one of them. Many future security positions will require coding skills. After all, with coding skills you can:

  • Analyze suspicious programs to determine their function and intent.
  • Craft filters and responses to attacks while waiting for a vendor to release a patch.
  • Improve the function of open source programs or write your own code to solve problems.

Certifications

Experience can be a trump card, but many HR managers will not take a second look at a prospect unless he or she has certain specific requirements. Such requirements often include not having a criminal record, having a college degree and having specific certifications.

While training for some certifications is often geared toward passing an exam, achieving a certification at least provides a rough measurement of your knowledge level and capability. Someone who has a certification has a better chance at being considered for a job than someone else who has the same overall background but lacks certification.

To determine which certifications to pursue, survey 10 to 20 job postings from various organizations for the specific job you would like to have. List the certifications recommended or required in those postings. Use that list as a road map to gain the needed training and pass the certification exams. Re-perform this survey every three to six months to keep your progress on target.

Penetration Testing

Checking or verifying that a security implementation functions as expected and designed is often referred to as ethical hacking or penetration testing. A security professional will likely find that the need to perform his or her own internal security analysis will be increasingly essential in security management. Hiring consultants to perform penetration tests can be dauntingly expensive, so the ability to perform your own penetration tests is a significant benefit compared to others without such skills.

End User Acceptance Testing

Often security experts get caught up in enforcing the most secure implementation without considering how it impacts the work tasks of individuals. Security should always be adjusted to business needs and requirements. It is of little value to have a highly secure network if essential business tasks cannot be accomplished.

While developing and deploying new security solutions, take the time to review how the security improvements will affect users and business tasks.

Whenever possible, develop training to help end users adjust to new business processes before implementing significant security changes. If workers do not accept and adjust to security, they will often find a way to bypass or disable the security that they see as too inconvenience or having no direct value to their specific work activities.

Staying Prepared

As security experts, it is our responsibility to continuously prepare for new technologies and to encourage the adoption of improved security measures in order to increase stability and reduce exploitation. In order to stay vigilant, the next generation of security professionals should have experience, coding skills, certification, penetration testing skills and the ability to perform pre-deployment end-user testing.

Recommended Training
Building Cybersecurity Champions



from
CERTIVIEW

Swipe launches premium yet affordable 4G smartphone ELITE 2 exclusively on Flipkart from 8th November onwards

Swipe Technologies, a mobile technology company, and No. 4 brand in the tablets space in the country, has announced the..

from
via CERTIVIEW

Gartner’s 2015 Hype Cycle identifies key green technologies

In response to growing demands from customers, partners and consumers, many organizations are moving beyond corporate social responsibility..

from
via CERTIVIEW

Net Neutrality activists from India write open letter to Mark Zuckerberg, CEO, Facebook

Following Mark Zuckerberg's speech in IIT Delhi, Indian net neutrality activists have written an open letter to Mark Zuckerberg.  We..

from
via CERTIVIEW

CCNA R&S Question of the Week: Switch vs. Hub

CCNAQuestionWeek12

How does a switch differ from a hub?

A. A switch does not induce any latency into the frame transfer time.
B. A switch tracks MAC addresses of directly-connected devices.
C. A switch operates at a lower, more efficient layer of the OSI model.
D. A switch decreases the number of broadcast domains.
E. A switch decreases the number of collision domains.

Related Resources
Cisco White Papers

Related Course
CCNAX v2.0 — CCNA Routing and Switching Boot Camp
ICND1 v2.0 — Interconnecting Cisco Networking Devices, Part 1
ICND2 v2.0 — Interconnecting Cisco Networking Devices, Part 2



from
CERTIVIEW

Thursday 29 October 2015

India to realize the target of 25% share of manufacturing in economy at best by 2025: Dun & Bradstreet India

Dun & Bradstreet, provider of global business information, knowledge and insight, launched its publication, Manufacturing India 2025. The study provides..

from
via CERTIVIEW

VS Parthasarathy, Group CIO, Mahindra and Mahindra on how the group is using technology to prepare for the future

Mahindra & Mahindra’s core focus has always been to drive business transformation through use of technology and it has always..

from
via CERTIVIEW

Best Virtualization Certifications For 2016

These virtualization certifications are in demand in 2016. Find the most valuable certification for your career path on Tom's IT Pro.

from Tom's IT Pro
via CERTIVIEW

Researchers show trick to get around Uber’s surge pricing

You're in Manhattan's Times Square, running late for dinner at Le Cirque, on East 58th St. You open the Uber..

from
via CERTIVIEW

ASRock Rack Launches Xeon D Motherboards

ASRock Rack has just announced two new motherboards for the Xeon D1500 series, which come in micro-ATX and mini-ITX varieties.

from Tom's IT Pro
via CERTIVIEW

Typesafe Announces Full Lifecycle Support For Apache Spark

Typesafe, makers of the Typesafe Reactive Platform, announced a commercial support program for the Apache Spark in-memory data processing engine.

from Tom's IT Pro
via CERTIVIEW

Server-Side Caching Continues To Evolve As SanDisk Releases FlashSoft 3.8

FlashSoft 3.8 is now available for Linux, Windows Server and Hyper-V.

from Tom's IT Pro
via CERTIVIEW

Quickr eyes huge opportunity in services business; launches QuickrServices

Quikr has launched QuikrServices with a special focus on the unorganized sector of service providers across the country. Quikr has..

from
via CERTIVIEW

Skype partners with Yash Raj Films and ErosNow to develop custom Bollywood Mojis

Skype has announced the availability of Bollywood specific Mojis, bringing more ways for Skype users to express themselves in Skype..

from
via CERTIVIEW

Blue Coat Mobile Malware Report 2015 – Mobile attacks more vicious than ever

As mobile devices become more deeply woven into the fabric of our personal and work lives, cyber criminals are taking..

from
via CERTIVIEW

Videocon Mobile Phones adds excitement to this festivity; announces the Biggest Festive Offer on its cutting-edge smartphones

Celebrating the spirit of ongoing festivity, the home-grown handset maker Videocon Mobile Phones announced a special offer for its customers..

from
via CERTIVIEW

Helpchat crossed 1 mn downloads on the Android store

Helpchat, the chat-based personal assistant app that helps users get more things done, records a phenomenal 1 million downloads in..

from
via CERTIVIEW

JFrog Mission Control Expands Artifactory Managability Across Regional Datacenters

JFrog Mission Control joins Artifactory and Bintray to offer a more complete distribution for development artifacts for even the largest customers with distribution requirements that span multiple datacenters across separate regions.

from Tom's IT Pro
via CERTIVIEW

Real-Life IT Horror Stories: The Day the Logic Bomb Went Off

Part 4 of the Real-Life IT Horror Stories Series

Editor’s note: In celebration of Halloween, we’ve asked a few of our instructors to share some of the horror stories from their own consulting careers. This four-part series includes tales of espionage, employee sabotage and website theft. Read on if you dare.

ITHorrorStoryZombiesAMC’s television series “Halt and Catch Fire” shows North Texas’ rise as the “Silicon Prairie.” In the 1980s and early 1990s, it’s where IBM PC cloning was explored and where first-person shooter games were created. It’s also the site of the first “logic bomb”—the source of my horror story.

Very early in my career, a disgruntled employee used a logic bomb to digitally wipe out more than 160,000 corporate records. That happened at the first company where I had an IT job, in Fort Worth, Texas, my hometown.

A logic bomb is sometimes confused with a computer virus. However, a logic bomb is really a piece of code that is intentionally created to do malicious activities when a desired set of criteria is met. For example, a programmer could install a logic bomb to automatically delete a database if it didn’t receive some kind of code or signal after a set period of time.

The Effects of the Logic Bomb

That’s exactly what happened where I worked. There was a system programmer who had a reputation for being difficult to work with. A couple of years prior, he created code that would automatically delete corporate records if certain criteria were met. This programmer was fired in September 1987. A couple of days after his firing, the logic bomb went off, deleting about 168,000 important corporate records. The programmer who did this became the first person ever convicted of “harmful access to a computer.”

At the time, I was still in high school and was doing some IT work in the evenings. My mother had a connection in that company, which is how I was able to get the job. I was in a very entry-level role that involved running a printer attached to an IBM mainframe. I didn’t know much about organizations at the time, or really how they worked. I remember seeing the “higher-ups” running around with frantic looks on their faces. From my perspective, the volume of print that was produced increased dramatically, and I ended up working lots of extra hours while the organization was trying to recover from the data loss.

I remember at one point we had numerous federal agents on-site. At times, they would watch us print data and then they’d remove it from the printer to ensure that we didn’t look at what had been printed. It would not be the last time in my career that federal agents were involved. There was a time in the 1990s when some employees were accused of insider trading, and there was another time following 9/11 when some suspicious accounts at the company where I worked belonged to potential terrorists. But, those are stories for another time.

Young and Carefree No More

It took a while, but eventually the organization recovered from the data loss. I started that job in the summer of 1987, and I remember being so young and carefree at the time and generally having a good time at work. After that event, I began to realize how important IT is. This logic bomb had a profound effect on my career, and how I thought about IT.

I began to think a lot about this situation, and how it meant that those of us with technical IT jobs really do wield a lot of power under certain conditions. A few years later, when I had changed companies a few times and started to make my way up the corporate ladder, I thought of this event as being something that has always informed my view of IT change management. I’ve thought about how a good IT change management process would have detected the programmer installing the malicious code and would have saved the organization significant amounts of money related to recovery efforts.

I’ve worked all over the world, but stories like this are really what’s kept me in North Texas. There’s always something happening here in a behind-the-scenes way that is a significant contribution to the world of technology. These events have a way of shaping those of us in the area, which is why I think there are so many IT and telecommunications people that hail from North Texas.

Do you have any stories of your own? If so, please share below or on Twitter and make sure you use #ITHorrorStories.

Related Posts
When Your Website Goes Dark: Tales of DNS Malfunctions
The Espionage Denial Nightmare
The Avoidable DNS Disaster



from
CERTIVIEW

5 areas where Drones are making a huge impact

" If we wait until we're ready, we will be waiting for the rest of our lives," says Lemony Snicket...

from
via CERTIVIEW

“CTE is focused on building the partnerships and talent base”

  • What is the 2nd inning plan for Cambridge Technology Enterprise? 
CTE has witnessed growth in..

from
via CERTIVIEW

5 areas where Drones are making a huge impact

" If we wait until we're ready, we will be waiting for the rest of our lives," says Lemony Snicket...

from
via CERTIVIEW

Can Dell Clear the Nebulae Around the EMC deal?

Does size matter? It looks like it does when it comes to acquisitions in the tech industry. The recent EMC..

from
via CERTIVIEW

Wednesday 28 October 2015

Researchers find vulnerabilities in use of certificates for Web security

Consumers use the Internet for banking, emailing, shopping and much more nowadays. With so much personal and private information being..

from
via CERTIVIEW

Unitrends Takes Its Enterprise Backup To Version 9.0

Unitrends, a cloud backup and recovery solution provider, announced the 9.0 version of its flagship Unitrends Enterprise Backup software.

from Tom's IT Pro
via CERTIVIEW

Seagate 8 TB Surveillance HDD Points To Increasing Video Surveillance Capacity Needs

Seagate's new surveillance drive brings 8 TB of capacity to bear, which can store up to 800 hours of HD content captured by up to 64 different cameras simultaneously.

from Tom's IT Pro
via CERTIVIEW

QNAP Announces Fanless Small Package NAS

QNAP announced the newest member of its Silent NAS series, the HS-251+.

from Tom's IT Pro
via CERTIVIEW

HP Announces Helion OpenStack 2.0 With Enhanced Lifecycle Management And Security Features

HP announced the latest version of the Helion OpenStack 2.0 Cloud platform with enhanced lifecycle management and security features.

from Tom's IT Pro
via CERTIVIEW

Wrapping Up Dell World 2015 With Tom's IT Pro Interviews

We cover a range of topics with key Dell Executives in a series of interviews at Dell World 2015.

from Tom's IT Pro
via CERTIVIEW

Security Operations Center (SOC) 101

How do you deploy an effective Security Operations Center that can combat today's advanced threats? This article discussed what a SOC is and how to build, grow and foster SOC talent within your organization.

from Tom's IT Pro
via CERTIVIEW

A smart city of 1 million will generate 180 million gigabytes of data per day by 2019, predicts Cisco study

The fifth annual Cisco Global Cloud Index (2014-2019), released today, forecasts that global cloud traffic will more than quadruple by..

from
via CERTIVIEW

Netmagic launches India’s largest data center in Mumbai

Netmagic, an NTT Communications Group Company, today announced the launch of its 9th data center in Mumbai. One of the..

from
via CERTIVIEW

nGenx nWorkspace Gets Integrated File Sharing With nFinity Drive Release

nFinity Drive provides a secure and built-in option for managed workspace customers to sync files between multiple devices and share those with either internal or external users.

from Tom's IT Pro
via CERTIVIEW

Real-Life IT Horror Stories: The Avoidable DNS Disaster

Part 3 of the Real-Life IT Horror Stories Series

Editor’s note: In celebration of Halloween, we’ve asked a few of our instructors to share some of the horror stories from their own consulting careers. This four-part series includes tales of espionage, employee sabotage and website theft. Read on if you dare.

ITHorrorStoryNerd01While acting as vice president of a performance-based Internet marketing company, I oversaw the migration to a new infrastructure, an important part of which involved changing over 300 of our DNS records. Imagine my horror when I discovered that we’d mistakenly misrouted nearly all of those records, taking the entire company down.

DNS Goes Down Taking Revenue Along With It

Performance-based marketers take all the risk, like buying media and sending emails, and are only reimbursed when and if, a resulting sale or conversion occurs. Our company ran the strong chance of bleeding cash just by advertising a product that didn’t convert. Days like our DNS outage were tough not only because they took the company offline, but mainly because they were completely avoidable.

What we did wrong is a checklist of all the top no-nos:

  • Too few resources — First, our tiny team was already stretched to the limit, with everyone juggling six to eight mission critical deliverables every day. We didn’t give this migration the elevated “holy” status it needed to succeed.
  • Not vetting employee qualifications – I assumed the person I’d assigned the task to (let’s call him “Mr. P.”) had DNS experience because of his two decades in software development. I only asked high level questions like, “Are you OK doing this?” and “Can you do it on Friday?”
  • Bad timing – What was maybe the biggest mistake was performing a major change like this on a Friday, or more specifically, EOD Friday. Too many times at this company, employees sacrificed their weekends because executives insisted on Friday releases.
  • Inadequate TTL settings — I did not personally ensure that the time to live (TTL) settings, which represent the time it takes to propagate DNS records, were set to the lowest value possible. Lower TTLs would have allowed us to quickly roll back any issues.
  • A false sense of security — I shoulder surfed the start of Mr. P.‘s work on that Friday, witnessing five to seven of the DNS records get correctly get re-assigned. That made me think, “Of course he’ll do the other 300 correctly”.

The Nightmare Continues

That next day (Saturday, of course) while enjoying brunch with my family, I got a panicked call from our senior vice president of ad buying:

“All the URLs are going to other websites. The mortgage URL is going to the acne products, the acne products URL brings up the cell phone landing page. I’ve shut off all campaigns.

I pulled up some URLs, and sure enough, each one was completely misrouted, at the exact time (weekend) when they’re supposed to be making the most money. I tried to call Mr. P, but only got voicemail. I immediately went into the office only to find that, (again, because we were all so busy, and because I’d not made this a priority for Mr. P.), we’d not documented how to access the DNS provider.

Lessons Learned

When we were finally able to track Mr. P. down, hours later, he discovered that the TTLs had not been set to five minutes as we’d thought. Most were still at six hours or more. Only after much internal stress, completely destroyed weekends, apologies to clients and the loss of over $20,000, did we get our 300 DNS records going back to the correct servers. Looking back, this incident really reinforced that fact that you can never take anything for granted. Just because somebody should know how to complete a task does not mean that they do. My advice to you is to make sure your team has the necessary skills to complete a task before you turn them loose. It’s much easier to address items with your staff than with your clients – trust me.

Do you have any stories of your own? If so, please share below or on Twitter and make sure you use #ITHorrorStories.

Related Posts

When Your Website Goes Dark: Tales of DNS Malfunctions
The Espionage Denial Nightmare



from
CERTIVIEW

Improving customer experience a top business priority- Accenture Study

Improving the overall customer experience is a top business priority for companies and a main driver behind their digital transformation..

from
via CERTIVIEW

Godaddy launches Godaddy pro program for web developers & designers

GoDaddy announced the launch of the GoDaddy Pro Program for web developers and designers with automated tools to manage and monitor..

from
via CERTIVIEW

CISSP Question of the Week: Customer Credit Card Information

CISSPQOWGreenCISSP Question of the Week courtesy of Transcender Labs.

Your company has an e-commerce site that is publicly accessible over the Internet. The e-commerce site accepts credit card information from a customer and then processes the customer’s transaction. Which standard or law would apply for this type of data?

A. The Economic Espionage Act of 1996
B. PCI DSS
C. Basel II
D. SOX

Related Course
CISSP Certification Prep Course

CISSP Question of the Week Series



from
CERTIVIEW

Flipkart goes offline with Spice Hotspot

In a unique instance of online and offline retail coming together, Flipkart, India’s leading e-commerce portal, has tied up with..

from
via CERTIVIEW

What happens to a lost smartphone?

 Avast Software, maker of the world’s most-trusted PC and mobile security, today revealed the results of their experiment to lose..

from
via CERTIVIEW

Wipro wins 5-Year strategic engagement with Coop Norge Handel AS

Wipro  announced that it has won a five-year IT contract from Coop Norge Handel AS. Coop Norge is a leading..

from
via CERTIVIEW

Dyn brings Internet Intelligence solution to strengthen foothold in India

Following the successful launch of Internet Intelligence in USA and EMEA Dyn, the worldwide leader in Internet Performance today announced..

from
via CERTIVIEW

Orange Business Services drives digital transformation through IT service management platform with ServiceNow

To meet customer demand for infrastructure that can support digital transformation, Orange Business Services has launched Service Management Suite. Incorporating..

from
via CERTIVIEW

Ericsson completes acquisition of Envivio

Ericsson  announced the completion of the acquisition of Envivi.  The transaction was completed through a merger of its indirect wholly-owned..

from
via CERTIVIEW

Polycom partners with directorate general supplies and disposals (DGS&D) to boost uptake of video collaboration solutions in government sector

As Polycom looks to target more government opportunities, the company’s collaborative technology and market presence are strongly placed to support..

from
via CERTIVIEW

Lenovo launches digital marketing campaign to engage B2B customers

Have you ever thought how loud is loud enough? Lenovo India recently launched a creative B2B marketing campaign, to spread..

from
via CERTIVIEW

Tata Sky deploys Brocade’s data center network solution to manage high volume traffic

Tata Sky has been using Brocade FCX network switches for its call center operations. Now, as part of a broader..

from
via CERTIVIEW

Improving customer experience is top business priority for companies pursuing digital transformation: Accenture Study

Improving the overall customer experience is a top business priority for companies and a main driver behind their digital transformation..

from
via CERTIVIEW

Wipro wins 5-Year strategic engagement with Coop Norge Handel AS

Wipro  announced that it has won a five-year IT contract from Coop Norge Handel AS. Coop Norge is a leading..

from
via CERTIVIEW

Tuesday 27 October 2015

Arvind Lifestyle Brands chooses 3DEXPERIENCE platform from Dassault Systèmes

Dassault Systèmes  announced that Arvind Lifestyle Brands Limited, a pioneer in apparel designing and retailing in India, has selected Dassault..

from
via CERTIVIEW

Indian consumers increasingly comfortable using mobile apps for managing finances, survey finds

Amdocs released the results of a new survey around mobile financial services (MFS), which revealed that Indian consumers are increasingly..

from
via CERTIVIEW

Oracle sees traditional rivals IBM and SAP nowhere in the cloud

In the new era of cloud computing, the concept of IT service delivery are changing drastically and so is the..

from
via CERTIVIEW

Only 10 percent of startups will be very successful: TV Mohandas Pai

Mohandas..<br><br> from<br> via <a href=CERTIVIEW

The social impact of mobility

A report by the GSMA developed in collaboration with PwC, states that innovative mobile solutions can revolutionize people’s lives over..

from
via CERTIVIEW

Oracle Announces Enhanced Integration Platform For Cloud, Mobile, IoT

Oracle announced new enhancements to the Oracle Cloud Platform for Integration that simplify management of on-premises, cloud-based, mobile or IoT applications and services across an enterprise.

from Tom's IT Pro
via CERTIVIEW

Oracle Announces Oracle Cloud Platform For Big Data

Oracle announced a number of new additions to the company’s Platform-as-a-Service that deliver enhanced Big Data functionality.

from Tom's IT Pro
via CERTIVIEW

Best Telecommunications Certifications For 2016

These telecommunications certifications are in demand in 2016. Find the most valuable certification for your career path on Tom's IT Pro.

from Tom's IT Pro
via CERTIVIEW

Ethernet HDDs Gain Traction, Exablox Demos NAS With Kinetic-based Toshiba KVDrives

Toshiba showcased its scale-out object-based NAS software with Toshiba's new KVDrives (Ethernet HDDs) at the OpenStack Summit 2015.

from Tom's IT Pro
via CERTIVIEW

Epson WorkForce Pro 6000 Series Printers Designed To Fit Nicely Into A Workgroup Setting

The printers offer full color ink cartridge printing for a lower cost than comparable laser printers, full featured A4 (letter/legal) printing, and multifunction devices with higher monthly volume than the WorkForce Pro 5000 series.

from Tom's IT Pro
via CERTIVIEW

Object Storage Uptake Expands As SwiftStack Launches Ver. 3.0

SwiftStac released SwiftStack 3.0 at the OpenStack Summit Tokyo.

from Tom's IT Pro
via CERTIVIEW

Almost 50% of Indian children admit to meeting a stranger they first met online, reveals Intel Security study

Intel Security today released the findings of the 2015 edition of its Teens, Tweens and Technology Survey which examines the..

from
via CERTIVIEW

IT departments face obstacles to user mobility for fear of data breaches

Organizations are challenged to meet demands for greater mobility as 92% of IT departments worldwide still restrict users from accessing..

from
via CERTIVIEW

Gemalto delivers IoT smart data to emergency responders throughout the U.S.

Gemalto is delivering actionable, up-to-the minute data to first responders in the field. Working with Intrado, a leading provider of..

from
via CERTIVIEW

Asus Zenfone 2 Laser 5.5 available on Flipkart, priced at Rs. 13,999

 ZenFone 2 Laser 5.5 with 3GB of RAM and octa-core Snapdragon 615 went on sale on Flipkart and..

from
via CERTIVIEW

Diwali comes early for Meizu fans Bring home the Meizu m2 for INR 6,999 and get a 32 GB Micro SD card free

Meizu, one of the leading smartphone brands in China, today announced its third consecutive open sale for the Meizu..

from
via CERTIVIEW

Coolpad Note 3 completes another successful flash sale

Coolpad, which is into  smartphone manufacturing and integrated wireless data solutions announced that the company completed yet another successful flash..

from
via CERTIVIEW

Narendra Nayak appointed as new Managing Director for BlackBerry India

BlackBerry Limited recently  announced that it has appointed Narendra Nayak as its new Managing Director in India.   Based in New..

from
via CERTIVIEW

Real-Life IT Horror Stories: The Espionage Denial Nightmare

Part 2 of the Real-Life IT Horror Stories Series

By Phill Shade

Editor’s note: In celebration of Halloween, we’ve asked a few of our instructors to share some of the horror stories from their own consulting careers. This four-part series includes tales of espionage, employee sabotage and website theft. Read on if you dare.

ITHorrorStoryHandDoorAbout three years ago while in a galaxy, unfortunately all too nearby, I was working as a consultant for a small design company when I came across the nightmare of all nightmares: industrial espionage.

I was contacted by another consultant who had been analyzing the client’s network to optimize performance. While the first engineer was able to address several routine network issues, he had requested assistance in analyzing a possible data breach.

The Problem: Design Theft

Arriving on-site, the initial brief revealed that the company designed the distinctive cases used by major vendors to house their products. The issue was that their designs were showing up in illegal markets, sometimes before they were even in production.

Several days’ worth of investigation using Wireshark, GeoIP and graphical traceroute utilities showed an internal connection originating in the company’s design servers and reaching to St. Petersburg, Russia.

Capturing the Culprit

To confirm this observation, we created several fake designs and uploaded them to the server in question. We then attached Wireshark to a hub and connected the server back to the network switch. A capture filter was set inside Wireshark and set to the IP address of the server.

Within a matter of only a few hours, using Wireshark, we were able to observe a stealth connection originating in St. Petersburg and connecting into an open port on the design server. What followed wasn’t that much of a surprise as we watched the very designs we had loaded into the server copied and transferred back to Russia. We had our villain!

We saved all of our evidence, created a quick report and prepared our presentation before leaving for the day. The next day dawned and we met with our client contact to reveal our evidence and supporting documentation.

Initially, the presentation appeared to go well as we laid out our evidence, explained our methodology and concluded with a series of logical recommendations such as securing the network with a series of firewalls, implementing logging of transactions and basic data encryption.

It All Starts to Go Wrong

What ensued still lingers in my mind to this day for its colossal arrogance and blind adherence to a single view of things with all evidence to the contrary. Rather than accepting our findings and thanking us, the client instead stated:

“That can’t be true; you’re reading it wrong!”

To say I was surprised at this response was the understatement of the week. When I gathered my thoughts and asked why, the next shock ensued:

“Our network can’t possibly be compromised since we only use Mac computers and they are safe from hacking!” the client uttered with blind belief in modern advertising.

When we dared to ask what sort of security software or hardware they used to protect the network and infrastructure, we received nearly the same answer.

So hoping for the best, we presented our presentation to the department head, then the CTO and finally the CEO. Each piece of evidence, the Wireshark capture files, the GeoIP information and the traceroute results as well as the IANA address resolution was covered; only to be met with the same statement that there had to be a mistake and there was no need to follow any of the recommendations as this would make operating the network to difficult.

The Client Isn’t Always Right

Completely at a loss for words all we could do was present the invoice for services rendered and make our somewhat chagrined departure. Keeping a watch on the company revealed they were out of business in another year or so. I learned that sometimes all you can do is capture the culprit, present the evidence and hope for the best.

Do you have any stories of your own? If so, please share below or on Twitter and make sure you use #ITHorrorStories.

Related Post

When Your Website Goes Dark: Tales of DNS Malfunctions



from
CERTIVIEW

Canon India steps into surveillance domain with new intelligent network cameras

Canon India has stepped into the surveillance domain with their new range of intelligent network cameras. The portfolio will come..

from
via CERTIVIEW

Apple Pay will accelerate biometric transactions to nearly 5 billion by 2019, says Juniper Research

A new study from Juniper Research has found that the increased rollout of contactless payment services using fingerprint scanners will..

from
via CERTIVIEW

Kodak Capture Pro Software v5.1 helps businesses eliminate the hidden cost of bad data

Poor data quality as a result of incorrect, missing, or duplicate data costs businesses on average $14.2 million annually. One..

from
via CERTIVIEW

“Launch by Quixey” now available on Google Play for mobile users in India

Quixey, a mobile technology company,  introduced a cutting-edge Android launcher designed to put Indian users, who have come to expect..

from
via CERTIVIEW

FreeCharge wallet reaches 5 million user landmark within four weeks of launch

FreeCharge, India’s leading digital payments platform, today announced that it has crossed 5 million mark in mobile wallet users, a..

from
via CERTIVIEW

Monday 26 October 2015

Sony LIV launches its third exclusive online series, ‘Tanlines’

After the phenomenal success of its first-ever original content show for online audiences, #LoveBytes, Sony LIV, Multi Screen Media’s (MSM)..

from
via CERTIVIEW

flydubai to enhance customer experience with NIIT Technologies

NIIT Technologies announced a long-term strategic agreement with Dubai-based airline flydubai .

The agreement will enable flydubai to..

from
via CERTIVIEW

BFSI takes a digital leap

From a brick and mortar environment to a new tech regime where technology has become the backbone of the entire..

from
via CERTIVIEW

Stanford University Offers Killer Online Certificates in Data Mining

One of the better recommendations we’ve received from reader input recently is a pointer to this great online certificate program from Stanford University.

from Tom's IT Pro
via CERTIVIEW

Researchers develop 3D concrete printer that can print smart walls

Last month Eindhoven University of Technology (TU/e) began using a concrete printer that enables objects of up to 11 meters..

from
via CERTIVIEW

Samsung SM863 3D V-NAND Enterprise SSD Review

The SM863 wields Samsung's 2nd-gen 32-layer 3D MLC V-NAND, which increases density to 128Gbit per die, and at an economical price point.

from Tom's IT Pro
via CERTIVIEW

Equinix Cloud Exchange Expands To Include Rackspace And IBM SoftLayer

The additions grows its datacenter-to-cloud service offering, which already included Microsoft Azure, Amazon Web Services (AWS) and Google Compute Engine (GCE) as clouds that can connect directly to the datacenter.

from Tom's IT Pro
via CERTIVIEW

Indian public cloud services market will reach $731 million in 2015, predicts Gartner

Public cloud services revenue in India will reach $731 million by the end of 2015, an increase of $176 million..

from
via CERTIVIEW

When Your Website Goes Dark: Tales of DNS Malfunctions

Part 1 of the Real-Life IT Horror Stories Series

Editor’s note: In celebration of Halloween, we’ve asked a few of our instructors to share some of the horror stories from their own consulting careers. This four-part series includes tales of espionage, employee sabotage and website theft. Check back each day for a new post. Read on if you dare.

Almost every IT administrator, whether they work in storage, networking, servers, or clients, has a story about the Domain Name System (DNS) not functioning properly. I collect DNS horror stories like some people collect bottle caps.

The Case of the Disappearing Domain

ITHorrorStoryUnderTheBedI was working at a start-up company that had grown from a dozen people to about 80 employees in a couple of years. It was a busy time, Web traffic was picking up every day. And then one Wednesday, we noticed a dramatic drop in incoming email, and the hits on the website dropped like a rock. But not rock bottom. Frantically, I tested from the outside and inside. Everything was fine.

The vice president of engineering called me. Some important quotes and contract negotiations from our customers weren’t coming through. I sent test messages. All of mine went through. The chief financial officer stopped by my office. He had just gotten off the phone with an investor. Our website was down, and we weren’t receiving emails from them. Then the CEO was in my office.

My sweaty fingers were wildly typing frantic magic incantations, desperately struggling to resuscitate our presence and existence in the networked world. We were slipping away. Hour by hour it was getting worse. And then nothing. Our network communications flatlined. All inbound communications had ceased. Yet we could still ping out. No one could get into our business. We were dead.

That was the painful day that I discovered the agony and defeat that having someone buy your domain name out from under you can cause. I knew the network was solid and working at the Internet Protocol level. We could get out to the rest of the world with the exception of PTR record authentications for outbound email that had begun to fail to some destinations. I discovered that another registrar had allowed some company to register the domain name we already “owned.” Our company name was stolen out from under us.

You might not think that DNS is a dangerous business that involves theft, espionage, sabotage, or outright hacker malice with no competitive angle. I know of several other second-hand occurrences of domain theft, including people having to file certification of their right to their business name, and other cases that went to court. But I have never had it happen to me again directly. We got our domain back, though it took several days for the email and Web services to start flowing fully again. I am now sure to lock in the registration so that no one can unregister the domain names of my business or those of my clients. Please be safe and always protect yourself.

Not-So-Active Directory

Domain names are everywhere—on billboards, radio, television, web videos, Skype, Lync, business cards and any other kind of communications. To have a DNS is to be able to communicate in business and personal aspects of life. All internal computer-based business operations, and all Internet-based and personal communications depend on the Domain Name System. Even being able to log in to computers with Active Directory, depends on DNS. Servers also need to log into their computer accounts in Active Directory and that depends on a properly functioning DNS too.

A colleague of mine was setting up a new Active Directory domain. They scripted the configuration and population of the domain for a development environment to be a clone of test system so that a team of people could work with realistic test data during development. The new domain controller worked perfectly. Redundancy is always a good idea. So they were setting up another Active Directory server.

The promotion of the second domain controller kept failing, telling them that the domain didn’t exist. They tried the domain several times and had been troubleshooting, but they were running out of time. The system needed to go live. They asked me to take a look. We had 15 minutes to get the second domain controller up and get 20 client machines joined into the domain and inoculated with group policies.

I was in the middle of another build, so I talked them through the troubleshooting of the problem. “Domain does not exist or cannot be contacted” they muttered. “But it’s right here!” they said, pointing at the console of the first—and only—domain controller.

I asked them to tell me the DNS settings. They brushed off the request, claiming that they had checked it a dozen times and it worked great, while they kept trying to get the second server online. It failed again.

I walked over to their console. “Show me the preferred and alternate DNS servers on the second machine,” I asked. The settings popped up and I noted coolly, “Those are the DNS servers on the client’s network, not the development network. Show me the first server.”

They brought up the DNS settings. Both the preferred and alternate DNS settings for the first domain controller were set to the client’s network. We didn’t have permissions to register any records in their DNS infrastructure. My colleague had simply forgotten to set up an independent DNS zone and host it on our systems, then forward other requests to the client’s DNS servers. They adjusted the configuration and after a couple of hours of frustration were able to get everything running within a few minutes, just in time for the team of developers to arrive.

Always double-check your work when overtired. Always ask for help or another person to cross-check the settings when in doubt, or even when you’re sure of yourself. And always suspect DNS. I always say that “there are two things that can go wrong with Active Directory—time and DNS.”

Do you have any stories of your own? If so, please share below or on Twitter and make sure you use #ITHorrorStories.



from
CERTIVIEW

Mobiles at Rs 99, Laptops at Rs 6499, and Mini Flash Sales in Overcart’s Festive OTT Sale

Taking the value delivered in the unboxed and refurbished domain for consumers to the next level, Overcart offers the first..

from
via CERTIVIEW

Why #ITForParivahan is needed?

Road network in India, in all its vastness provides last mile connectivity to the masses and also proves to be..

from
via CERTIVIEW

IT Taskforce – Ministry of Shipping and Road Transport & Highways

India’s transportation sector that constitutes six percent of the country's GDP, is a priority sector under “Make in India” initiative...

from
via CERTIVIEW

PMP Formula of the Week: Project Schedule Information

PMPFormulaOTW475166460

What piece of work performance information provides the most valuable information about a project behind schedule?

A. Cost Variance
B. Status of deliverables
C. Schedule variance
D. Estimate to complete

Related Resources
PMP Exam Prep Mobile App
Project Management White Papers

Related Courses
IT Project Management
Project Management Fundamentals
Project Management, Leadership, and Communication
PMP Exam Prep Boot Camp



from
CERTIVIEW

Vodafone Business Services to power connectivity for JCB’s construction equipment in India

Vodafone Business Services (VBS) - the enterprise arm of Vodafone India, announced its strategic technology partnership with JCB India Ltd..

from
via CERTIVIEW

IT for Parivahan

IT For Parivahan’ is a nationwide initiative from IT stalwarts such as Dr...

from
via CERTIVIEW

Friday 23 October 2015

Why we all need a Ravana in our lives

[caption id="attachment_3964" align="alignnone" width="200"]Alok Kejriwal Alok Kejriwal[/caption] “The evil that men do lives..

from
via CERTIVIEW

Carnegie Mellon researchers show how 3D printing can be used to repair damaged hearts

With failing hearts, these patients have no other options; heart tissue, unlike other parts of the body, is unable to..

from
via CERTIVIEW

V5 Systems Quietly Exits Stealth At Dell World With IoT Security System

V5 Systems exited stealth at Dell World with its flagship product line of portable Internet of Things (IoT) devices, which includes two security camera-and-sensor systems: the V5 Soteria and the V5 Theia.

from Tom's IT Pro
via CERTIVIEW

MOFCOM Approves Samsung, Seagate HDD Business Integration

MOFCOM allows the long-overdue Seagate/Samsung HDD businesses to fully integrate.

from Tom's IT Pro
via CERTIVIEW

Google Chrome’s Mute Tab feature lets you kill noise from auto playing videos

Many users are fed up with sound that is played from videos that play automatically on their Facebook timeline. Google..

from
via CERTIVIEW

5 Must-Have Time Management Tips For IT Pros

For IT professionals, good time management is a must. Here are five tested tips for staying on track and getting more things done.

from Tom's IT Pro
via CERTIVIEW

AWS’ Hottest New Products Launched at re:Invent 2015

AWS-reinventAmazon Web Services’ yearly shindig, re:Invent, turned out to be yet another whirlwind of information and product releases. Here’s the skinny on all of the important new services, in the order of what I see as the most impactful. Like all major cloud providers these days, AWS is launching these services in beta or preview mode. But in AWS parlance, that simply means that the services don’t yet have all features they’d like to see in production. All of the services below are available for immediate use.

Amazon QuickSight – QuickSight is a pay-as-you-go, cloud-based data analytics and visualization platform. With it, AWS is taking direct aim at the lucrative business intelligence (BI) visualization market currently monopolized by a handful of players like Tableau, MicroStrategy, QlikView and others. It includes an in-memory analytics engine, collaboration capabilities, easy data discovery and report recommendation/creation for common tasks like Web log analysis, out of the box integration to AWS’ data sources, and a SQL interface. QuickSight claims to be a 10th of the cost of traditional visualization tools.

AWS IoT – With this service, AWS addresses one of the biggest challenges in creating an Internet of Things (IoT) architecture: how to scale your back-end system to deal with millions or trillions of disparate devices, each of which is sending or receiving only small packets of data on an unknown or sporadic schedule. It provides MQTT or REST interfaces; a responsive, highly scalable message broker bus; and uses a SQL-based real-time rules engine to transform messages and route part or all of the data to AWS data stores. Many partners like Intel have also released $100– $200 IoT starter kits to allow users to easily experiment with building IoT applications and interfacing with the AWS IoT back-end.

AWS Import/Export Snowball – One of the biggest challenges in using AWS has always been securely and cost-effectively migrating data into or out of the platform. To move vast amounts of data, customers typically had to drop that data onto dozens or hundreds of 1-2TB hard disks and then FedEx the disks back and forth. Snowball provides customers with a 50TB durable, easy-to-configure, secure, completely self-contained shipping crate. It’s about as simple as you can get, and only costs $200 per snowball.

AWS Config RulesAWS Config is a service that lets users inventory and track changes to AWS-side resources. It’s been around for some time, but was limited to only reporting static configurations and histories. With Config Rules, users can now set actions to be taken if/when configurations go out of spec. Users can also programmatically ensure compliance with tagging taxonomies, security guidelines and other best practices. The service hooks into Lambda, which now supports even Python scripts, to call functions that can do anything from terminating servers and rolling back configurations to raising alerts.

AWS Database Migration Service – One of the most complicated and nerve-wracking steps in any migration is cutting over the database layer – a process that normally involved some downtime and/or overtime. With AWS Database Migration Service (DMS), users can now push-button migrate a running database. All data synchronization and cutovers happen transparently behind the scenes, allowing systems to remain up and running during the migration. The DMS also includes a Schema Conversion Tool which automagically assesses and converts data formats, syntax, and stored procedures/functions from the source to the target. This greatly simplifies migration from costly, proprietary engines like Oracle or SQL Server to lower cost, open source alternatives like MySQL and PostgreSQL.

Amazon Kinesis Firehose – Kinesis, launched only two years ago, is a highly scalable managed service to ingest huge amounts of streaming data. One of the biggest limitations to the service, however, was that performing a simple load of streamed data into AWS required a fleet of expensive EC2 instances which you had to set up and maintain yourself. Firehose completely obviates the need for these EC2 fleets behind Kinesis. If you’re looking to load that data into S3 or Redshift, Firehose can complete that operation with just a few clicks in the console. AWS also alluded to Kinesis Analytics – a soon-to-be-announced service to run standard SQL queries against live streams of Kinesis data, again removing the need for EC2 instances. AWS also upped the maximum retention period of Kinesis data from 24 hours to seven days.

Amazon Elasticsearch ServiceElasticsearch (ES) is a document-oriented, popular open source text search engine for uploading, indexing, and querying massive document stores like journals, web pages, or Web logs. It does everything Apache Lucene can do, plus more. With ES, AWS offers the functionality of Elasticsearch as a scalable, fault tolerant, pay-as-you-go managed service — greatly reducing the time and costs required to create and maintain the infrastructure behind Elasticsearch. At first glance, ES directly competes against another AWS service called CloudSearch, and it will be interesting to see how, or if, they choose to differentiate the two.

Some of the other interesting announcements were a host of changes for Lambda, including Python support; Web Application Firewall as a Service (AWS WAF); Amazon Inspector , an automated security assessment service; RDS support for MariaDB; and a swath of changes around EC2, Container support, and Mobile Hub.

Although we’ve presented what we feel are the most exciting announcements to come out of AWS re:Invent, a full list of all service announcements can be found on AWS’ New Announcements page. At any rate, the announcements at re:Invent 2015 signal that AWS is only pushing the gas pedal harder to put yet more distance between themselves and the competition.

Related Training
AWS Training



from
CERTIVIEW

CCNA R&S Question of the Week: No Acknowledgment of Receipt

CCNAQuestionWeek13Which transport layer protocol provides best-effort delivery service with no acknowledgment of receipt?

A. HTTP
B. IP
C. TCP
D. Telnet
E. UDP

Related Resources
Cisco White Papers

Related Course
CCNAX v2.0 — CCNA Routing and Switching Boot Camp
ICND1 v2.0 — Interconnecting Cisco Networking Devices, Part 1
ICND2 v2.0 — Interconnecting Cisco Networking Devices, Part 2



from
CERTIVIEW

Thursday 22 October 2015

How Flipkart prepared itself for the Big Billion day

  [caption id="attachment_28770" align="alignnone" width="191"]Vaidyanathan S Vaidyanathan S, Flipkart[/caption] For the first time in..

from
via CERTIVIEW

How Flipkart prepared itself for the Big Billion day

  [caption id="attachment_28770" align="alignnone" width="191"]Vaidyanathan S Vaidyanathan S, Flipkart[/caption] For the first time in..

from
via CERTIVIEW

Best Wireless Networking Certifications For 2016

These wireless networking certifications are in demand in 2016. Find the most valuable certification for your career path on Tom's IT Pro.

from Tom's IT Pro
via CERTIVIEW

Dell's OptiPlex 7040 'Micro' Features Intel Unite Conferencing Technology

The OptiPlex 7040 Micro with Intel Unite is the latest 7000 series "micro" PC, and features Intel Unite technology.

from Tom's IT Pro
via CERTIVIEW

50 percent of repetitive IT outsourcing jobs can be assigned to robots in the next 3 years, finds study

A  research report from Mindfields Consulting has found that a new wave of robotic software is revolutionizing the way businesses..

from
via CERTIVIEW

South Korean researchers use Big Data to create virtual dance teacher

Daijin Kim and his team at POSTECH (Pohang University of Science and Technology), South Korea, have developed a virtual dance..

from
via CERTIVIEW

Identity Defined Security Alliance, Letting Risk Dictate User Privileges

As users bring more portable devices to work, and millennials insist on working from anywhere, putting organizational data in the cloud, what happens to the organization’s boundaries?

from Tom's IT Pro
via CERTIVIEW

Lenovo launches 4G smartphone, VIBE P1m at Rs 7999 on Flipkart

Lenovo has launched the VIBE P1m smartphone at Rs 7999 on Flipkart. The device sports a 3900 mAh battery, and..

from
via CERTIVIEW

In Awe of IBM Insight 2015’s Wow Factor

IBM-Insight-2016It seems like every time I’m preparing to attend one of IBM’s large user conferences, event organizers just keep upping the wow factor. Whether it’s Serena Williams sharing how using data improved her tennis game or Kevin Spacey preaching about how technology empowers the rule breakers, I am amazed at how these celebrity keynote speakers always bring the message down to its essence with an IBM spin. Having No Doubt or Aerosmith waiting backstage doesn’t hurt that wow factor either.

So now it’s time for IBM Insight 2015, and who’s on the bill to speak but Hollywood legend Ron Howard – or as Eddie Murphy and I like to call him, “Opie Cunningham.”

A TV icon twice over and one of Hollywood’s most talented director/producers, Howard helped make some of our generation’s greatest films, like Apollo 13 and A Beautiful Mind, as well as some that, while not so great are some of my favorites: Willow, Cocoon and How the Grinch Stole Christmas.

You can believe that as a former reporter, current tech blogger and reluctant fiction writer, I will be on the edge of my seat as Howard sheds some light on his storytelling philosophy during IBM Insight’s Wednesday general session, “Make Your Mark – Disrupt Your Marketplace.” Howard will share the stage with his long-time producing partner Brian Grazer, along with Fredi Lajvardi, a nationally recognized STEM educator and the subject of the documentary, “Underwater Dreams,” and major motion picture, “Spare Parts.”

As if this isn’t enough to keep IBM Insight 2015 attendees enthralled, Adam Levine and a little Grammy-winning band called Maroon 5 will be performing during IBM Insight’s customer appreciation event.

I’m a Twitter geek, so one of the highlights of IBM Insight 2015 for me will be hearing Twitter VP of Data Strategy Chris Moody kick off IBM Insight’s Monday morning general session “Leave No Problem Unsolved – Transform Your Industry.” Moody will provide insight into how Twitter handles its vast data ecosystem.

Laurent Borne, Whirlpool’s general manager of Connected Appliances, will also speak during Monday morning’s general session on how his company is innovating its products for the ensuing Internet of Things wave. David Kenny, CEO of The Weather Company, and Jack McMaster, President of the Preparedness and Health and Safety Services at the American Red Cross, will share innovations applied at their organizations through insightful data.

In addition to the general sessions, IBM Insight 2015’s expected 14,000 attendees will get a chance to take advantage of seven keynotes, nine super sessions and more than 1,600 sessions and hands-on labs.

Jason Silva of National Geographic Channel’s Brain Games will lead IBM Insight’s Social Business super session entitled “Technology Transcendence: Giving Your Collaboration Tools a Brain.” Silva will discuss the ability to extend collaboration with technologies like cognitive computing to increase our potential as individuals and change the way we work together. Also during this super session, IBM’s Rob Koplowitz will discuss how the power of Watson and other emerging technologies are making teams and people more productive at work.

IBM Insight’s remaining eight super sessions will cover:

  • Mobile – Context is King: How Mobility is Changing the Game in the Insight Economy
  • Strategic Data Partnerships – Reimagine Analytics for the Insight Economy with Twitter and the Weather Company
  • Systems and Architecture – From Challenges to Shared Vision: The Path Toward a Comprehensive Big Data Analytics Solution
  • z Systems – Distinguish Your Business: Compete by Driving Real-Time High-Quality Insights
  • Cloud Data Services – Building Today’s Business in the Cloud
  • Information, Integration and Governance – Achieving Comprehensive Information Integration and Governance
  • Internet of Things – IoT: Insight for Business Transformation
  • Security – Stop Unknown Threats Before You’re Breached: Apply Analytics to the Challenge of Security

Global Knowledge is sponsoring IBM Insight’s Hands-On Labs station, as well as the Certification and Testing Center. The Hands-On Labs are located in Mandalay Bay at Bayside F on Level 1, and the Certification and Testing Center is in Surf D-F at Level 2.

If you’re attending IBM Insight, stop by to see us at Booth 750 in the Solution Center at Mandalay Bay. If you can’t make it, be sure to follow us at @GKonIBM for updates from IBM Insight 2015.



from
CERTIVIEW

10K HDDs Alive And Well, As Toshiba Launches 12 Gbps AL14SE

Toshiba announced the release of the AL14SE, its latest 10,500-RPM spinner.

from Tom's IT Pro
via CERTIVIEW

We are going to build the world’s IT infrastructure – Micheal Dell

" I have always had a interest in EMC and I did thought of an acquisition long back said Michael..

from
via CERTIVIEW

Bangalore startup deploys beacons to create IoT enabled shopping district

Interaction One , a Bangalore-based startup is set to transform the retail and lifestyle industry with the launch of Mobmerry,..

from
via CERTIVIEW

Wednesday 21 October 2015

Egnyte To Expand Advanced Monitoring And Reporting Capabilities

Egnyte unveiled a smart reporting and auditing service to monitor users, storage, applications, devices and collaboration activity.

from Tom's IT Pro
via CERTIVIEW

Dell Announces Refreshed OptiPlex AIO Lineup

Dell World is in full swing and kicked off with several product partnership announcements and product updates. Along with a complete OptiPlex lineup upgrade (to Intel Skylake processors), Dell announced several new key features for its OptiPlex AIOs.

from Tom's IT Pro
via CERTIVIEW

Advanced Persistent Threats (APT) 101

What is an Advanced Persistent Threat and how do you identify and fight an APT? In this 101 we cover the history and examples of APTs along with information on the importance of preventing these type of attacks.

from Tom's IT Pro
via CERTIVIEW

Dell Cloud Platform System Standard Announced, Breaking Entry Barriers To Hybrid Cloud Solutions

Breaking the barriers preventing companies from realizing their goals to move to hybrid cloud, Dell CPS Standard contains all of the hardware and software required to implement a 100 Virtual Machine (VM) hybrid cloud solution in about three hours.

from Tom's IT Pro
via CERTIVIEW

Western Digital Announces Acquisition Of SanDisk For $19 Billion

WD solidifies its position in the NAND arms race with its $19 billion acquisition of SanDisk.

from Tom's IT Pro
via CERTIVIEW

Progress Launches 2nd Edition of Incubator Program in Hyderabad

Progress, a global software company that simplifies the development, deployment, and management of business applications, launched the application process for ..

from
via CERTIVIEW

Greyhound Knowledge Group picks stake in Internet of Style; strengthens consumer technology research focus

Greyhound Knowledge Group, has been steadily growing its focus and intent every year. Last year, it closed the year with..

from
via CERTIVIEW

CISSP Question of the Week: Terrorist Attacks

CISSPQOWRedCISSP Question of the Week courtesy of Transcender Labs.

Your organization has asked the security team to add terrorist attacks to the organization’s business continuity plan. Which type of threat does this represent?

A. Natural environmental threat
B. Supply system threat
C. Manmade threat
D. Politically motivated threat

Related Course
CISSP Certification Prep Course

CISSP Question of the Week Series



from
CERTIVIEW