Application whitelisting is the practice of specifying an index of approved software applications that are permitted to be present and active on a computer system. Continued…
Quote of the Day
“With application whitelisting, admins can create a list of approved apps users can work with. This way, users cannot accidentally open an app containing ransomware.” – Brien Posey
Mobile application management tools balance service and cost
Stand-alone mobile application management tools often provide more flexibility and specialized functionality at lower costs. Find out when stand-alone MAM tools could be a better fit for your organization than EMM suites.
How can you whitelist apps and fight ransomware with Windows 10 AppLocker?
Admins should whitelist apps with Windows 10 AppLocker to combat ransomware. Whitelisting creates a curated list of apps users can work with.
How a hybrid whitelisting-blacklisting approach can help enterprises
Application whitelisting isn’t enough. Here’s why a hybrid whitelisting-blacklisting approach is best for enterprise security.
Security for applications: What tools and principles work?
Ensuring security for applications means both designing security in and adding protections from without. Learn what app security tools and strategy work best.
The endpoint security controls you should consider now
Threats to endpoints are changing, and endpoint security controls must adjust to new realities. Learn what steps to take to up endpoint security now.
A botnet is a group of computers organized to distribute spam or malware — _________ the owners are typically unaware of the fact.
c. even though
Industrial control system (ICS) is a general term used to describe the integration of hardware and software with network connectivity in order to support critical infrastructure. Continued…
Quote of the Day
“DHS said Russian hackers first targeted key industrial control vendors in order to steal credentials and access air-gapped and isolated utility networks.” – Michael Heller
DHS details electrical grid attacks by Russian agents
DHS claims Russian agents have performed hundreds of electrical grid attacks, including on utilities that were air-gapped and isolated, with the potential for serious damage.
An introduction to ICS threats and the current landscape
ICS threats have been coming into the spotlight more as attacks happen more frequently. Here’s a review of what ICS security threats can really do if successful.
Creators of Trisis malware have expanded their ICS attacks
The group behind the Trisis malware attacks on industrial control systems has been identified as Xenotime, and it is still active, expanding its efforts to companies across the globe, according to Dragos research.
Triton, Industrial control systems, infrastructure attacks, nation-state
The Trisis malware used in an ICS cyberattack in Saudi Arabia in December is thought to have been made by a nation-state actor and has been freely available.
Dragos’ Robert Lee discusses latest ICS threats, hacking back
In a Q&A at RSA Conference 2018, Dragos CEO Robert Lee talked about how industrial control systems differ from IT systems and the newest looming ICS threats.
_______ are common in factory automation, building automation and material handling systems.
XMPP is a communications protocol based on Extensible Markup Language (XML). Continued…
Quote of the Day
“When setting up a two-way communication channel, where there is structured data and devices are not memory constrained, use XMPP.” – Sushant Taneja
Better team messaging app security could boost enterprise adoption
Cisco recently unveiled security updates to its Spark service. Team messaging apps, in general, could see greater adoption with these enterprise controls.
GoToMeeting client adds business messaging to chase rivals
The GoToMeeting client is getting business messaging and automated transcription as LogMeIn chases web conferencing rivals Zoom and Cisco Webex.
Cisco eyes blockchain messaging for better security
Vendors, including Cisco, are hoping blockchain messaging can offer more security than the traditional encryption used for group communications.
Standardizing on unified communications standards
Enterprise adoption of unified communications (UC) standards—like SIP, XMPP, SIPconnect 1.1 and TIP—is fast becoming an imperative driven by increased user demand for extranet connectivity and access to UC apps beyond the firewall.
XMPP: IoT protocol winner, or second place to MQTT?
The open, community-based XMPP-IoT standard is entering the wild world of the internet of things, but it may not be the best choice for every IoT deployment.
No matter how important your message is, if you don’t choose the right delivery channel, the point is ____.
Unified communications as a service (UCaaS) is a cloud delivery model that offers a variety of communication and collaboration applications and services, including enterprise messaging, presence technology, online meetings, team collaboration, telephony and video conferencing. Continued…
Quote of the Day
“UCaaS offers faster turn-up times, easier access to emerging collaboration capabilities and the ability for customers to shift internal IT staff into more strategic roles.” – Irwin Lazar
Evaluating UCaaS providers: How to choose the right one
In this complex market, careful evaluation of UCaaS providers is essential. Learn how to understand market offerings and choose the best for your business.
Unified communications as a service: The next generation
Unified communications as a service offerings are becoming more customizable and are incorporating emerging technologies such as artificial intelligence. These next-generation products offer new opportunities for channel partners.
CPaaS vs. UCaaS platform: Which should you choose?
When deciding between CPaaS vs. UCaaS platforms, look at how the two technologies can be used together, rather than as separate communications products.
Should your unified communications strategy include UCaaS?
UC as a service should be considered in any unified communications strategy. Though, as UCaaS offerings expand, sorting out the market can get complex.
Midmarket enterprises push UCaaS platform adoption
Midmarket enterprises looking to improve collaboration are turning to UCaaS platform deployments, according to a recent Gartner report.
If the client ________ a meeting, we would have reserved a telepresence room.
b. had requested
Session Initiation Protocol (SIP) is a signaling protocol used for initiating, maintaining, modifying and terminating real-time sessions that involve video, voice, messaging and other communications applications and services between two or more endpoints on IP networks. Continued…
Quote of the Day
“Deciding between a centralized or distributed SIP service deployment depends largely on an organization’s UC architecture and infrastructure, as well as the layout of the business as a whole.” – Michael Brandenburg
H.323 vs. SIP: What’s the difference?
Look at the differences of H.323 vs. SIP in this comparison of two primary VoIP and multimedia IP standards.
Update session border controllers routinely for secure SIP trunking
Session border controllers play an important role to secure SIP trunking deployments, but they need constant updates to remain effective.
Avoid these four SIP deployment pitfalls
Learn the four pitfalls organizations must avoid for a successful SIP deployment, from hidden fees to improper firewall configuration.
Is the virtual SBC market poised for rapid growth?
Session border controllers offered as a service could cut costs for enterprises and provide additional deployment options. But is a virtual SBC right for you?
How do you choose your SIP service deployment model?
Choosing the right SIP service deployment model can be tough. Expert Michael Brandenburg explains how to choose between centralized and decentralized SIP.
There are a number of methods you can use to capture VoIP calls ___ a LAN.
b. off of
Unified communications (UC) is a framework for integrating various asynchronous and real-time communication tools, with the goal of enhancing business communication, collaboration and productivity. Continued…
Quote of the Day
“While UC’s value proposition may not be intuitive, the islands of communications that worked well in simpler times are not effective today.” – Jon Arnold
Team collaboration secondary in Workplace by Facebook app
Despite efforts to market the Workplace by Facebook app as a team collaboration tool similar to Slack, several organizations that have deployed Facebook’s business platform say they are using it primarily as an intranet.
Ribbon Communications boosts UCaaS portfolio with Edgewater buy
Ribbon Communications plans to acquire Edgewater Networks for $110 million and will fuse Edgewater’s SD-WAN and network orchestration capabilities with Ribbon’s UCaaS portfolio.
The evolution of unified communications technologies
Unified communications technologies have evolved from desk phones to messaging apps. Businesses need to be open-minded about other emerging tools.
Open UC platforms improve communication workflow, but carry risks
Open UC platforms are growing in popularity, as organizations look to embed communications within their workflows. While integrating communications with APIs and CPaaS has its advantages, security risks do lurk.
Unified communications vendors continue consolidation carousel
The consolidation trend among unified communications vendors continues, as Polycom, Star2Star and West announce mergers and acquisitions.
Management chose Slack to encourage communication ________ the company’s marketing team and its sales team.
A data scientist is a professional responsible for collecting, analyzing and interpreting large amounts of data to identify ways to help a business improve operations and gain a competitive edge over rivals. Continued…
Quote of the Day
“Beyond math skills, data scientists must be able to think creatively and develop context around the data in order to tell a story.” – Jason Cline
Building a data science team in today’s data-centric climate
It isn’t easy building a data science team in today’s data-centric world, in which machine learning and AI are hot. In a recent webinar, a Gartner analyst offered tips and recommendations on how to do it.
How a healthcare data scientist can aid in value-based care
The government wants providers to move from fee-for-service to value-based care. A healthcare data scientist can analyze patient data to improve outcomes.
Big data throws bias in machine learning data sets
Data bias in machine learning data sets is a big problem for AI, and correcting it is no small feat.
New data science platforms aim to be workflow, collaboration hubs
A group of rival workbench-style data science platforms offer users a centralized environment for managing advanced analytics projects involving teams of data scientists — and Oracle’s acquisition of startup DataScience.com brings another major IT vendor into the fold.
Two data scientists offer advice on breaking down siloed data
Two data scientists address the ever-present issue of siloed data and offer advice to IT leaders on how to deal with it.
The core components in the first iteration of this big data framework included MapReduce.
a. What is Hadoop?
b. What is Splunk?
A decision tree is a graph that uses a branching method to illustrate every possible outcome of a decision. Continued…
Quote of the Day
“As the business world continues to embrace analytics to sharpen decision-making, using intelligent business process management suites is becoming even more attractive.” – Christine Parizo
Ten steps to start using predictive analytics algorithms effectively
Here are 10 steps to help put a solid foundation in place for using predictive analytics algorithms that improve business processes and performance.
What sports can teach about data-driven decision-making process
Businesses have a lot to learn from sports teams when it comes to the data-driven decision-making process, says one MIT lecturer.
Choosing the right data discovery platform for the enterprise
Visualizations, IT management, data sources and compliance features are just some considerations for businesses in the market for data discovery tools. Ultimately, business goals determine the best data discovery platform, so it’s vital that the features deliver.
Becoming a data-driven enterprise requires art, science
A data-driven enterprise doesn’t have to turn all of its decisions over to algorithms. One business makes room for art, as well as science in its process.
Clearing the roadblocks to predictive business analytics adoption
Despite the benefits of predictive business analytics, adoption is still low due to people, processes and technology.
What do data scientists call data that cannot be understood and interpreted correctly by machines?
a. dense data
b. noisy data
Self-service business intelligence (SSBI) is an approach to data analytics that enables business users to access and work with corporate data even though they do not have a background in statistical analysis, business intelligence (BI) or data mining. Continued…
Quote of the Day
“The trend of self-service BI has opened up new opportunities for companies to gain value from data more quickly, because it takes IT out of the picture, which reduces delays.” – Bob Violino
Tableau acquisition of MIT AI startup aims at smarter BI software
The Tableau acquisition of Empirical Systems, an AI startup, is intended to provide Tableau users with more automated modeling of their data and enable broader use of the self-service BI and analytics software.
Understanding data discovery tools in the enterprise
Learn all about data discovery tools and the data discovery process, which pull insights from data and ultimately serve informed business decisions.
Self-service BI best practices: 5 dos and don’ts
In this SearchCIO video, Wayfair’s Nathan Kollett enumerates the dos and don’t’s that make up self-service BI best practices.
Evolving data integration strategies target new analytics needs
As companies expand their use of BI and analytics applications, well-planned data integration strategies become a more crucial component. Get advice on how to manage data integration efforts to support the analytics process more effectively.
Self-service BI software comparison: Tableau vs. Power BI, Qlik Sense
The self-service BI software market is crowded, but it’s sorting itself out. This chart can help you understand the differences between the leading players.
This describes a data source that’s not used on a regular basis.
1. What is desultory data?
2. What is alternative data?
Alternative data is information gathered from non-traditional information sources. Analysis of alternative data can provide insights beyond that which an industry’s regular data sources are capable of providing. Continued…
Quote of the Day
“Businesses looking to get real value out of big data, and avoid overwhelming their systems, need to be selective about what they analyze.” – Ed Burns
A look at the leading data discovery software and vendors
Data discovery software helps enterprises turn data into business insights. Through data visualizations, these tools reveal patterns and relevant items from both internal and external sources. In addition, these tools often function without explicit IT involvement through self-service BI features.
Exploring Hadoop distributions for managing big data
Hadoop distributions have created a new software market that’s transforming the big data information intelligence and analytics industry.
Big data challenges include what info to use — and what not to
For organizations faced with big data challenges, it helps to be selective about the info you analyze.
Capital One’s use cases for implementing microservices
At API World 2017, Capital One discusses its use case scenarios for implementing microservices and microservices architecture.
New cloud service uses big data sources to improve emergency response
A new cloud service from Swan Island Networks allows cities to tie information together from multiple big data sources to improve emergency response.
What type of statistical analysis uses a representative subset of data points to identify patterns and trends in a larger data set?
a. data sampling
b. data sipping