|DLP, once seen as a quick-fix solution for reducing data breaches, is rapidly being recast as a core strategy for discovering sensitive information in the enterprise and controlling access to it. As that evolution occurs, DLP is increasingly becoming the spark that restarts previously stagnant data encryption projects.
Tim Wilson, Encryption: DLP’s Newest Ingredient
DLP stand for data leak or data loss protection. It’s a more popular product name with vendors than the old name they tried in 2007, extrusion protection. (What an awful name!) As DLP products have evolved and been integrated with other security tools like desktop and mobile device management, DLP vendors have tried out other names including the very silly name, anti-employee theft prevention (who would want to steal an employee?).
But seriously, the goal of any DLP product is to plug leaks by monitoring and documenting data as it leaves an organization.
In the past, you’d only find a DLP product at a network gateway in a large corporation. Services industries, healthcare and insurance quickly jumped on the DLP bandwagon, motivated by compliance regulations — but increasingly vendors are targeting the mid-market. Forrester predicts that 20% of all small and mid-sized businesses (SMBs) will be shopping for a DLP solution in the next 12 months and 25% have already adopted email encryption, network storage encryption and data leak prevention.
In ten minutes, you’ll learn what IPv6 is, how and when it will replace IPv4, why we skipped IPv5 and why IPv6 adoption has been slower in the United States than in Asia or Europe.
|Most industry watchers agree that organizations must support connections to and from IPv6 networks by 2011, at least at the gateway. This also is the year that IPv4 addresses are expected to run out. But adoption is likely to be slow going until then.
Adam Ely, IPv6 Makes Slow Progress
Obstacles include the continued widespread use of IPv4, because upgrading to IPv6 means replacing operating systems and software that isn’t IPv6-aware.
|The promise of TV delivered via IP is gaining momentum globally the more the Internet merges with consumer electronics, especially televisions. But plenty of challenges remain, not the least of which is the pending depletion of the IPv4 address space.
Sean Michael Kerner, IPv6: The Future of IPTV?
The move to IPv6 has been slow around the globe, with a few exceptions. One of them is in Japan, where deployment of IPv6 by telco NTT could provide a blueprint for carriers preparing for the rise of IPTV.
[kml_flashembed movie="http://www.youtube.com/v/6FBvAsJjRu0" width="425" height="350" wmode="transparent" /]
|Lenovo unveiled a virtual world called eLounge, which is powered by Nortel’s recently announced virtual world platform, web.alive. Lenovo appears to be using this venue as a social and interactive platform for providing information on their products and services — notably, their laptops.
Dennis Shiao, Review: Lenovo’s eLounge Virtual World
When I woke up this morning, I felt like I’d been out late to a party at the Consumer Electronics Show in Las Vegas. (Unfortunately, I was still in upstate New York surrounded by snow.)
You see, last night I went to virtual trade show hosted by Lenovo. They are using a platform called web.alive. It’s Web-based and like nothing else I’ve experienced in browser-based virtual world software. I actually felt as if I had been at the conference, meeting people, looking at laptops and Lenovo’s new netbook. The only thing that was missing from the conference experience were the free pens and the chance to enter a raffle.
I’ve spent a fair amount of time in Second Life. I’ve probably installed it and uninstalled it at least five times over the past year. I’ve been to virtual events at Cisco and IBM. Second Life for business is interesting, but nowhere as exciting as what I experienced last night at Lenovo’s virtual store.
There’s something different about web.alive’ platform. For one thing the navigation is intuitive and it only takes a first-time visitor a few minutes to figure out how to get around. You don’t see avatars standing around with their heads down and arms out — wiggling their fingers as they type on some invisible keyboard. That’s what happens when you visit a business site in Second Life — everyone looks like zombies.
At Lenovo’s eLounge, however, you see energetic people walking around with their heads up. You can talk to the software developers, you can talk to the Lenovo sales representatives or you can talk to other people who’ve wandered in and are marveling at the experience of being in this rather wonderful virtual world. And if you’re not all that social? You can just wander around and eavesdrop. The experience feels real.
I’ve been to other virtual trade shows on line. They’re interesting, but they’re flat. Literally flat, clickable images. And the experience is flat. Here’s a tour of AMD’s virtual trade show last year, for example. It’s nice, but it’s so…last year.
The architects at web.alive are on to something big. And they’re marketing it to the right audience — business people whose budgets are tight — who need to collaborate — who want to stay on the cutting edge.
If you have a few minutes today I strongly suggest you stop by Lenovo’s virtual store. You’ll view the virtual environment as a Web page after you download and install a small browser plug-in.
I think you’ll be surprised, not only by the high quality graphics and the amazing audio, but by the real feeling of community you’ll experience.
|Just as General Motors must wean itself off lumbering SUVs, so may Intel, Hewlett-Packard, Sony, Toshiba, et al., be forced, to some extent, to wean themselves off high-profit notebook computers.
Brooke Crothers, Intel warning casts cloud over CES
Netbook is the big buzzword this year at CES. I remember having what vendors are now calling a netbook about ten years ago. I couldn’t load any software on it, but I could access email and the Internet. At this very moment, I can’t remember what it was called — but I remember getting it at Circuit City and using it in the classroom with WinGate as my proxy server. (For several years, WinGate was the bane of my existence.)
On a totally unrelated note, Jeopardy is celebrating its 25th anniversary with host Alex Trebeck by filming 11 episodes at CES. You have to love a show that gives quizzes and penalizes contestants for not using the words “what is….”
AMD VP Pat Moorehead talks about some of the limitations netbooks have.
[kml_flashembed movie="http://www.youtube.com/v/Ax6GYgXhCl8" width="425" height="350" wmode="transparent" /]
|“Downloads from iTunes are still in the AAC file format regardless of whether they are DRM-free. The AAC file format is only compatible with iPods/iPhones and a limited number of other devices. So consumers who buy downloads from iTunes are still restricted to where they can play that music regardless of whether it’s DRM free or not.”
Ben Drury as quoted in Apple iTunes tracks go DRM-free
I’m the only one in my family who doesn’t have an iPhone or iPod. I like having a radio on my MP3 player so I use a tiny player by Insignia. If I want to download something from the iTunes store, I use a third-party tool to convert the file from AAC to MP3.
So when I heard yesterday that Apple was ditching DRM altogether, it caught my attention. Would that make it easier for me to buy content from the iTunes store? Could I synch up my little Insignia player and not have to stop and covert file formats?
I think the answer right now is “no.” Besides getting rid of the number of times an iPod or iPhone owner can copy something he’s purchased, I’m not seeing a whole lot of difference for those of us who use Insignia or some other brand of player. We’ll still be shopping for MP3s at Amazon.
Update: I did find this on the Apple Web site…but it’s talking about CDs.
When you import unprotected WMA files or music from CDs, iTunes saves them as AAC files. Easily convert them to MP3 in a few clicks: Select the song you want converted, then choose “Create MP3 Version” from the Advanced menu.
|I have a feeling we’ll start seeing phishers adding Twitter to their stable of targets in 2009. That’s unfortunate, because it almost certainly means we’ll be hearing the term “twishing” being bandied about this year.
Brian Krebs, Phishers Now Twittering Their Scams
Is it a right of passage — a sign that Twitter is now deemed valuable enough that bad guys want to expolit it?
More likely it’s just a sign that Twitter needs to pay more attention to security. Businesses have been embracing Twitter lately. I wonder if this week’s breaches will cool the love affair? I’m guessing yes. Look for “enterprise ready” versions of the service coming to a firewall near you.