Virtual reality has received a lot of attention lately, but there is much to be said for Augmented Reality (AR) and Mixed Reality (MR) technologies that enhance our capabilities in the real world or allow us to interact with technology more intuitively. Both technologies have clear applications for the enterprise and the future workplace. Examples from Vuzix and ODG could be seen at the recent CES 2017 and there is, of course, the much-discussed Microsoft Hololens. Augmented Reality Augmented Reality overlays virtual or synthetic elements onto the real world, whereas virtual reality is immersion in…

Continue reading

Apple Inc. has a reputation for building secure devices, but don’t become too complacent because ransomware threats to Mac users are on the rise. While ransomware attacks against Microsoft Windows-based computers and servers remain far more prevalent, security researchers have detected new Mac threats in recent years and expect to see new threats in the future. Here’s a quick look at three forms of ransomware that are known to target Mac users: KeRanger disguises itself as a popular application Imagine this: You go to download a copy of Transmission, the…

Continue reading

Pavan Belagatti and Eric Vanderburg Early DevOps adopters have proven DevOps to be more than just a cultural shift or a set of tools – they have proven it to be a critical success factor and a competency well worth developing in today’s environment of rapid change, technological development, and high customer or employee expectations.  The demand for DevOps in organizations is high, but it is not something that can be bolted on to the average team.  When this happens, the existing organizational undercurrents will undermine the effectiveness of such…

Continue reading

For decades, the printer has been the intermediary between the digital and physical worlds.  Through it, our creations become tangible and yet; this intermediary has become so pervasive and such a mainstay of our technological world that it was assumed somewhat unchallengeable.  However, while the basic functions of printing, scanning, copying and faxing have stayed the same, the modern printer is a far different creature from the monoliths of the past or even the printers of last year. Today’s printers exchange data with users not only on the local network…

Continue reading

I recently did an interview with JAX Magazine on DevOps and here is the transcript of the interview. Some people call DevOps a cultural movement, others consider it a magic bullet. In your view, what is the essence of DevOps? DevOps is used to increase the efficiency of a business. It is a catalyst for collaboration between the roles of technology developers and IT operations to improve the agility of both IT and development. It is no magic bullet. The same problems such as poor communication, mismatched expectations, lack of cohesiveness and…

Continue reading

Machine learning is a science that uses existing data on a subject to train a computer how to identify related data.  Just like with humans, the more training a machine learning algorithm gets, the more likely it is to succeed at its task.  We have an extensive amount of information on attacks that can be used to train machines.  After all, new attacks come out every day and over a hundred million malware samples have been collected each year since 2014.  This information, as well as the historical information, can…

Continue reading

In the world of technology, paradigms shift quickly.  Not long ago, we focused organizational security efforts on the perimeter of the network.  We assumed that systems would be secure if we could just keep the bad guys outside of the trusted network.  Phishing and malware, however, among other things, proved this to be a false assumption - perimeter defense alone would not be enough.  Responses to this often included efforts to seize control of information assets.  Control implied security.   When the cloud stepped onto the stage, lack of organizational control…

Continue reading

Criminals are raising the bar in the fight for your money.  It’s natural to expect that competition would follow success—and ransomware is succeeding.  Your data is the target and your pocketbook is the end goal.  As the landscape becomes more saturated, criminals are seeking ways to get a better return on their infections by making it easier to pay up. One way extortionists are making it easier to pay is by using alternate currencies.  The process for purchasing bitcoins, the mainstream ransom currency, can be difficult for those who have…

Continue reading

It might surprise you to know that ransomware uses geolocation technology to customize payloads and target individuals. You probably already know that geolocation is the approximate place where an Internet-connected device resides. Geolocation obtains an approximate location of a connection by referencing a machine’s IP address against various databases. As a reminder, here’s a good definition of IP address, which is the protocol by which data is sent from one computer to the other on the Internet. Those databases are maintained by Internet Service Providers (ISP) and Traffic Detection Services…

Continue reading

Storage solutions make or break the systems they support and yet these same systems are routinely seen as a cost to be decreased, rather than a competency to be developed. A racer doesn’t remove his engine if he expects to compete. However, rational, well-intentioned businesses sacrifice storage capabilities in an attempt to improve the bottom line. Those who wish to be future ready must think differently. The fact is that storage supports the business and it will be even more important as we move forward into this data-driven economy. Traditional…

Continue reading