Endpoint security management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources.
Quote of the Day
“Certain behaviors, such as ignoring patches, create security issues on the endpoints users work with. IT should enforce policies that prevent users from taking these damaging actions.” – Kevin Beaver
NSS Labs CTO discusses advanced endpoint protection testing, challenges
NSS Labs released its 2019 Advanced Endpoint Protection Group Test results this month at RSA Conference. The vendor’s CTO, Jason Brvenik, discusses the results, the challenges in testing the products and how the endpoint protection market is changing.
How EDR tools can improve endpoint security
EDR tools, a relatively new category of proactive endpoint security tools, can help in IT’s fight against malware. Find out if EDR is a good option for your deployment.
Dell unveils endpoint security portfolio with CrowdStrike, Secureworks
Dell announced its partnership with CrowdStrike and Secureworks to launch SafeGuard and Response, an endpoint security portfolio designed to prevent, detect and respond to threats facing enterprises — especially midmarket companies.
How to address endpoint security issues caused by users
There are several common endpoint security issues that users cause, including weak passwords and unsecured network connections. IT should handle these with security policies that address the behaviors directly.
Worries rise about security breaches in healthcare as endpoints expand
In the face of increased security breaches in healthcare, hospitals will grapple with widening endpoint access and related cybersecurity risks.
People who think mobile security is ______________ could be in for a rude awakening.
a. not that big a deal
b. not that big of a deal
Computational storage is an information technology (IT) architecture in which data is processed at the storage device level to reduce the amount of data that has to move between the storage plane and the compute plane.
Quote of the Day
“The ability to provide compute services at the device level was not truly available until the adoption rate of SSDs was in place.” – Scott Shadley
Computational storage takes spotlight in new NGD Systems SSD
Computational storage moved into the spotlight with NGD Systems’ new 16 TB NVMe-based SSD that embeds a quad-core ARM processor into its custom-built 14 nm ASIC to execute applications.
NVMe flash storage is coming to an enterprise near you
In the enterprise, NVMe flash storage tends to exist as clustered server nodes dedicated to an individual application. An industry consortium previews forthcoming standards to advance NVMe over fabrics.
2019 IT focus: Storage architecture for big data analytics
Experts predict 2019 IT focus will turn to storage architecture for big data analytics, artificial intelligence, machine learning and IoT, as organizations try to make better use of the morass of data they’ve collected.
How NVMe technology will rock the enterprise storage boat
NVMe technology changes how storage connects to servers and moves storage closer to the CPU, reducing latency and improving performance. It has great promise, but what challenges will businesses face to adopt the new storage protocol?
Vexata storage gets a boost from Fujitsu deal
Fujitsu will sell Vexata storage arrays. The partnership provides market exposure for Vexata, while the Fujitsu portfolio adds its first NVMe-oF storage.
Bringing in all-flash for primary storage adds a faster system that can provide greater __________ value for the company.
Intent-based networking (IBN) is a network administration model that uses artificial intelligence (AI), network orchestration and machine learning (ML) to automate administrative tasks across a network.
Quote of the Day
“IBN is about the network having a clear understanding of the purpose, use and importance of all the applications it runs.” – Andrew Froehlich
What is intent-based networking and how does it work?
Intent-based networking has a lot of potential. It also has a lot of hype. Cut through the confusion surrounding intent-based networking with this infographic that illustrates the steps involved.
What is the relationship between intent-based networking and SDN?
What do SDN and intent-based networking have in common? You might have been wondering, so we went ahead and asked for you.
Forward Networks’ software enables intent-based networking
Forward Networks has won TechTarget’s Network Innovation Award in recognition of its assurance and verification platform. Learn more about the company’s intent-based networking software.
Intent-based networking reality check for 2019
In 2019, intent-based networking is more of a futuristic possibility than a tangible reality. But don’t disregard the IBN concept altogether. Instead, take the time to explore the IBN options currently available and learn why enterprises should care.
Intent-based networking vs. SDN: How do they differ?
When comparing intent-based networking vs. SDN, one major difference is how the two technologies use abstraction in their commands. SDN commands remain device-centric, for example, while intent-based networking focuses on business policy.
The survey results taught us that one in three network administrators ____ interested in learning more about software-defined networking.
Video game design is the process of conceiving, planning and directing the creation of an electronic game in which players control images on an electronic display.
Quote of the Day
“Game designers now realize that AI systems that combine the power of machine learning and natural language processing and generation can create content and experiences that are every bit as realistic as those created by their human counterparts.” – Kathleen Walch
The future of IoT in the video game industry
What does IoT have to do with the video game industry? Playgroundz’s Michael Yum outlines IoT’s impact on the gaming industry now and in the future.
Use of AI in video games boosts playing experience
The use of AI in video games continues to grow. Read this article to see how this growing trend contributes to more realistic and engaging playing experiences.
IoT gives the mobile gaming industry a facelift
The mobile gaming industry is getting a makeover thanks to the internet of things. Tatvasoft’s Ritesh Mehta explains how IoT and gaming go hand in hand.
Music composed by AI breathes new life into video games
While video games rely on more and more advanced procedural generation for world building, their soundtracks are generally static. The use of music composed by AI could make soundtracks more dynamic.
Can computer games double as personality assessment tools?
It can be hard for recruiters to determine the reliability of personality assessment tools. Guy Halfteck, CEO of game producer Knack, thinks he has the answer.
Augmented reality seems futuristic but ____ potential has already begun to be realized.
A digital customer experience delivery platform (DCED platform) is software that is used to create and manage structured content.
Quote of the Day
“The core philosophy of CX isn’t limited to customers; it requires a technology investment that shows a customer’s activity across all channels and gives an organization the ability to meet them wherever they are — and optimize communications.” – Scott Robinson
CRM and CX management at crossroads in the customer journey
There will be a place for CRM, especially in organizations with veteran inside sales teams. But CX management gains traction as a model along with the technology supporting it as brands connect marketing to sales and e-commerce and focus on reducing friction in the process.
Guide to customer experience management best practices, technologies
Learn why customer experience management (CEM) is growing. Read about technologies, strategies and customer experience management best practices that businesses are applying to their CEM.
Electronics company chooses integrated CRM for all CX needs
Schenck Process uses an integrated CRM — Oracle — for everything CX. The company found there’s a greater benefit to partnering with one company vs. trying to integrate multiple platforms.
Tips to build a successful digital customer service strategy
Learn how to create a successful digital customer service and support strategy with insights from Wendy’s, Chamberlain Group and DoorDash on how they integrated Salesforce AI and added social media channels.
Digital experience management: What it is and how it will change WCM
Web content management is giving way to digital experience management. Expert Geoffrey Bock explains how to manage the shift from static WCM platforms.
Bad customer service news spreads like wildfire on Twitter. The wise company deals with customer complaints in an __________ manner.
COBIT is a framework for developing, implementing, monitoring and improving information technology (IT) governance and management practices.
Quote of the Day
“The COBIT management and governance methodology is one of several ITSM frameworks that organizes and establishes controls around IT processes and resources.” – Stephen J. Bigelow
How CMMI models compare and map to the COBIT framework
ISACA recently acquired CMMI Institute. Find out how this may affect CMMI models going forward and how those models compare to COBIT.
Words to go: ITSM frameworks for enterprises
These ITSM frameworks run the gamut from ITIL’s and COBIT’s detailed process controls to newly conceptualized Agile/DevOps and community-derived FitSM.
What are the benefits of a risk-based framework for security?
A risk-based framework can help enterprises effectively manage their cybersecurity program and provides many advantages.
IT security frameworks and standards: Choosing the right one
Joe Granneman offers an introduction to IT security frameworks and standards, as well as advice for information security professionals on how to choose an IT security framework.
IT security governance fosters a culture of shared responsibility
IT security governance provides a framework for how IT can partner with business leaders to identify risks, validate policies and protect assets.
The compliance deadline has been moved forward, so all reporting is due two months _____ than the original date.
A single pane of glass is a management console that presents data from multiple sources in a unified display.
Quote of the Day
“Single pane of glass application monitoring is an IT myth on par with Bigfoot: frequently mentioned, constantly sought after and equally as elusive.” – Brian Kirsch
Detroit Symphony tunes up performance on Scale Computing HC3
Scale Computing HC3 hyper-converged appliances and the vendor’s history with video surveillance storage proved a good match for Detroit Symphony Orchestra’s need for simple administration and video archiving.
Single pane of glass for multi-cloud management still elusive
Multi-cloud management is no easy task, and enterprises still search for that elusive single-pane-of-glass tool. Are providers and third-party vendors close to making it a reality?
Hybrid cloud trends offer lessons for potential adopters
Hybrid cloud trends are garnering more attention, and IT administrators who want to adopt the technology should use these tips to prepare for hybrid cloud deployment and migration. A need for workload flexibility drives most hybrid cloud use cases, but admins must carefully plan their approach.
IT operations dashboard efforts strive for single pane of glass
A unified and intuitive IT operations dashboard for app monitoring is a viable possibility, but for all the demand, it often still remains out of reach.
Embrace automation in a hybrid cloud deployment: Free chapter
A hybrid cloud deployment introduces a lot of IT complexity — but automation, when properly implemented, helps simplify management. Use this free chapter from The Evolution of Cloud Computing by Clive Longbottom to keep your hybrid environment running smoothly.
An executive can _______ a business intelligence dashboard to get an up-to-the moment snapshot of how some element of the business is performing.
Conversational commerce is the process of interacting with a brand or buying a product or service through non-traditional channels, such as voice assistants, SMS text and online and social media chat.
Quote of the Day
“Improved AI and natural language processing also will help bring voice commerce into B2B and B2C spaces, simply by improving the capabilities and easing the process.” – Jesse Scardina
CX strategy a vital part of modernizing a business
Organizations need to pay attention to CX strategy and improving the employee experience to provide convenient shopping experiences that today’s customers expect.
Voice commerce rides on the backs of little smart speakers
As consumers get comfortable with the many aspects of emerging voice commerce, businesses are beginning to find ways to integrate voice assistants not only into the buying process, but also to assist employees with their job.
CRM vs. CX: How companies are pivoting in philosophies
In the shift between CRM vs. CX, businesses begin to change practices, focusing on personalized customer experiences rather than straightforward business transactions.
How AI in e-commerce makes vendors more responsive to customers
Retailers are embracing AI in e-commerce as a way to make their outreach and offerings more personalized and relevant to their customers, but there’s still lots of room for growth.
Clicks-and-bricks one-up online companies with behavioral data
Clicks-and-bricks banks and retailers face deep cost disadvantages battling digital-only competitors. Their secret weapon: customer behavioral data gleaned from their physical stores to build more realistic online customer experiences.
In the future, marketers won’t ask for consumers’ __________ just read their minds.
a. opinions: They’ll
b. opinions, they’ll
A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at the same time, but because of the nature of the device or system, the operations must be done in the proper sequence to be done correctly.
Quote of the Day
“Race conditions are notoriously difficult to find, reproduce and debug. They are usually only found by accident when a system becomes overloaded in a manner unforeseen by the programmer.” – Michael Cobb
How were Android Pixel vulnerabilities exploited?
Android Pixel vulnerabilities enabled the smartphone to be hacked last year. Here’s a look at how someone was able to bypass the phone’s security and what can be done about it.
What went wrong with the Dirty COW vulnerability patch?
The Dirty COW vulnerability was patched, but researchers discovered issues with the patch. Here’s a look at what went wrong and what users should do.
Static code analyzer tests for dangerous race conditions
The Coverty Prevent SQS static code analyzer helps developers identify race conditions and other concurrency defects in multi-threaded applications earlier in the development cycle.
How can the Dirty COW vulnerability be used to attack Android devices?
The Dirty COW vulnerability, which remained hidden for nine years, allows attackers to gain root access to Android devices. Find out how this attack works.
How can a directory traversal attack be mitigated?
New research showed AirDrop-enabled devices are vulnerable to a directory traversal attack. Here’s what the threat means for enterprise security teams.
Exploit kits allow non-technical threat actors to do ____ of damage.
A. a lot
Have I Been Pwned (HIBP) is a website that allows users to search and find out if an email address’s password has been compromised by data breaches.
Quote of the Day
“Using Have I Been Pwned? as a tool to increase your situational awareness on the status of current major breaches is an added way to keep yourself and your organization safe.” – Matt Pascucci
Collection #1 breach data includes 773 million unique emails
A new trove of 773 million unique emails — known as the Collection #1 breach data — gathered from various data breaches were added to Have I Been Pwned, but there are questions about the freshness of the data.
Have I Been Pwned integration comes to Firefox and 1Password
Both Firefox and 1Password announced new Have I Been Pwned integration to help users discover if email addresses have been compromised in known data breaches without disclosing personal information.
Firefox Monitor offers breach alerts on visited websites
Mozilla has begun rolling out a new feature of Firefox Monitor, which will provide breach alerts when a user visits a recently compromised website, based on data provided by Have I Been Pwned.
Risk & Repeat: Who’s to blame for bad passwords?
This Risk & Repeat podcast examines a recent Twitter debate between Duo Security’s Wendy Nather and Troy Hunt, owner of Have I Been Pwned, over bad passwords. Are users who create and reuse weak passwords mostly to blame or are the technical systems that allow the behavior the primary cause?
How should security teams handle the Onliner spambot leak?
Expert Matt Pascucci explains what actions enterprises should take after a list of 711 million user credentials was stolen by the Onliner spambot.
The credit union website uses two-factor authentication to protect _____ members.