Industry News Articles
10 Security Trends To Watch In 2012
If last year was any indication, 2012 year will be anything but quiet on the information security front.2011 featured what seemed to be nonstop waves of hacking, malware, and spear-phishing attacks that succeeded in exploiting well-known businesses. Overall, businesses' data breaches exposed millions of records. Expect 2012 to offer even more of the same. Ten likely information security trends are outlined in this article.
Still Don't Think Open Source Hurts Commercial Software? Guess Again
New research from Web application performance company New Relic supports the premise that open source is eliminating the need for commercial software,
especially in the realm of Java application servers in the cloud computing space. To get data on how Java is being used the company studied more than 1,000
of its cloud-oriented enterprise customers. The study found that IBM's commercial WebSphere application server was used just 1.66 percent of the time and
Oracle's commercial application server, WebLogic, was used in 0.51 percent of cases. Alternatively, open source tools were more widespread,
with 54 percent of the sample using Apache Tomcat servers, 16 percent using Jetty, nearly 10 percent using JBoss and 3 percent using GlassFish.
Linux Adoption Grows on Big Data, Cloud, Virtualization: Survey
The Linux Foundation and Yeoman Technology Group January 2012 report entitled "Linux Adoption Trends 2012: A Survey of Enterprise End Users" indicates that use of Linux among all Linux users continues to increase at the expense of Windows and Unix. According to the report, 84 percent of organizations currently using Linux have expanded its usage. They continue to rely on Linux as their preferred platform for "Greenfield" deployments and for mission-critical applications.
4 Cloud Myths That Won't Go Away
At this point it is easy to assume that IT staffers and leaders would understand the advantages and disadvantages of cloud computing. However, misconceptions continue to show up, some of which are disconcerting. Four of the most common fears about cloud computing include: sacrificing security, putting jobs at risk, that it is an all-or-nothing proposition and that cloud computing requires replacing the enterprise network. This article helps allay these concerns and fears.
What MegaUpload's Demise Teaches about Cloud Storage
MegaUpload users are loudly complaining after their personal files, stored on the file-sharing service were seized on Thursday along with a trove of illegally distributed copyrighted works. The MegaUpload seizure shows how personal files hosted on remote servers operated by a third party can be caught up in a government raid targeted at digital pirates. More importantly, the demise of MegaUpload shows just how careful users must be about where they trust their data when picking a cloud service.
A Strategy for Post-Virtualization Security
Virtualization has been rapidly and widely adopted. Security professionals know, setting up a secure virtual environment can be challenging. Significant planning and effort are required for tasks like evaluating off-premise service providers, ensuring regulatory compliance, and establishing technical monitoring and encryption controls. However, by concentrating on the implantation phase of the project, organizations sometimes don't address long-term security requirements. Sometimes security is in high gear while the environment spins up, but the groundwork to insure a secure environment for the long-term is lacking.
9 Ways to Minimize Data Breach Fallout
Is there a best way to mitigate the fallout from a data breach? Unfortunately, data breaches are a fact of business life. However, beyond keeping a data breach response plan at the ready, how can the IT department best prevent and mitigate data breaches? Consider the essential policies covered in this article.
Tough New EU Data Privacy Laws Revealed - Expert Reaction
The European Union has announced a proposed changes its data protection laws, in addition to severe punishments for offenders. The proposed changes will include 'the right to be forgotten' which will force companies to delete the user data of those who request it. Another new requirement will be an obligation for companies to report data breaches as soon as possible, and within 24 hours if feasible. Penalties for breaches can be up to �1 million, or up to 2% of the global annual sales of a company.
Google stirs up privacy hornet's nest
In a nonscientific Washington Post survey of 13,541 Post readers, 66 % of respondents said they would cancel their Google accounts as a result of the changes, 15% said they would keep Google and 19% were undecided. Dan Olds, an analyst with The Gabriel Consulting Group, said that
�People are upset for two reasons, the first is that Google is just now making this new use of data explicit, and the second is that there is no way to opt out and still use any Google service."
Threatened By Anonymous, Symantec Tells Users to Pull Pcanywhere's Plug
Recently Symantec told users of its pcAnywhere remote access software to disable or uninstall the software. pcAnywhere lets users remotely access and control other computers, such as an office PC from a notebook while on the road. Security experts said the action was unprecedented for a company of Symantec's size. Symantec recommends disabling the product until it releases a final set of software updates that resolve currently known security risks. The decision to tell users to remove pcAnywhere from service was prompted by a 2006 leak of the source code and the recent actions by Anonymous, whose latest exploit was to cripple several government websites.
Mobile, Cloud, and Big Data Pros In High Demand For 2012
Two separate reports seem to indicate that U.S. companies are signaling they're ready to commit some cash into growth and emerging markets. Those companies will be looking to hire and retain to people who are skilled in areas such as mobility, cloud computing, software development, and big data. That creates and opportunity for certain IT professionals. One of the reports, entitled "2012 IT Key Issues: Coming to Terms with the 'New Normal" comes from the Hackett Group, and identifies Global 1000 companies' key priorities for the year. The other report, entitled "2012 IT Salary Guide," is from IT staffing company Bluewolf and provides an in-depth look at IT salaries and hiring trends
There's No App For That, And That's Good
IT leaders are moving from just accepting mobile devices to creating custom apps for both internal and external users. However, as the saying goes, �just because you can do something doesn't mean you should.� The standard for developing custom apps for mobile devices must be as high as it was for creating them on PCs. A good rule for companies wanting to roll their own is: Web when you can; custom apps when you must.
Cybersecurity Report: All Countries Lag Behind the Bad Guys
According to a new cyber-security study from McAfee and Security & Defense Agenda (SDA), the U.S. and U.K. are relatively well prepared for cyber-attack, but everyone has more work to do. The report, ranks 23 countries on cyber-security readiness, gives no countries a perfect score of five stars. Israel, Sweden and Finland each get four and a half stars, while eight countries, including the U.S., U.K., France and Germany, receive four stars. India, Brazil and Mexico ranked near the bottom. Phyllis Schneck, CTO of the public sector for McAfee said that �No country is ahead of cyber-attackers. The bad guys are �faster and swifter� than the good guys.�
Meeting the Productivity Challenge in a Consumerized IT World
Much is being written about about "the consumerization of IT", but what does it actually mean, and how will it impact the workplace? Employees are comfortable working from their own devices including tablet computers and smart phones. They are take self-service delivery of applications for granted with almost instant access to apps and new services. Rather than fight a losing battle regulating these devices IT managers need to learn how to get a handle on their use. That will enable greater user productivity that will possible within a more diverse technology environment. The first step is to understand the roles that these devices play within the business environment, and then to establish flexible business rules establishing which employees could use which applications on which devices.
Buckle up with Cybersecurity ... It's the Law
State laws regarding security breach notification have been around for years. However newly enacted laws tighten compliance requirements for data security. In addition, recent guidance from the SEC regarding the disclosure of cybersecurity risks and data-breach incidents is forcing companies to improve their security or face penalties and lawsuits.
Ukraine Shuts Down File-Sharing Website
The Ukraine government has closed the file-sharing site ex.ua for illegally distributing copyright-protected content, which included music and videos. Police stormed on ex.ua's premises following a six month investigation. In a prepared statement the Ukrainian Interior Ministry said that the operation resulted in the confiscation of about 200 servers that contained six thousand terabytes. According to Ukrainian law, if found guilty the website's owner could face up to five years in prison.
Security in 2012: Let's start at the endpoint
What security trends should IT pros look out for in 2012? How should organizations protect against new breeds of cyber- threats? This article concentrates on the threats at the endpoint -- where the technology meets the end- user. There are two key trends that IT departments should seriously consider this year. The first is social engineering and targeted attacks. The second is smartphone security for both Android and iPhones.
Moving to the cloud in 2012? Look out for these pitfalls
Businesses that want to adopt cloud-computing can learn from some common mistakes others have made when moving to infrastructure- and platform-as-a-service offerings. One of the most common errors companies make when moving to cloud services is failing to set up redundancies for disaster scenarios.
One thing people assume is that cloud servers are redundant or backed up somewhere else. However, according to the CTO at Rackspace, an individual cloud server on its own is not redundant or backed up.
Researchers at Forrester call this "the uneven handshake" and say it goes beyond disaster recovery. According to Forrester, developers assume that the cloud service is responsible for security, application availability, backup and recovery, and availability, however in cases this isn't the case.
Cloud activity to explode in 2012
This year the number of cloud hosting service providers is expected to increase dramatically. This growth is due to the attractiveness of cloud-based disposable infrastructure, ready-built app development platforms that obviate long purchasing cycles and capital asset expenditures, commodity rentable infrastructure, and expansive platforms. However security and reliability/SLA worries must be addressed, and that will continue to spawn new, cloud-based services for both cloud and on-premise resources and assets.
IBM predicts 5 tech changes in 5 years
Every year, IBM picks five technologies that it predicts are going to change our lives over the ensuing five years. This year's picks include efficient capture of renewable energy, wide use of biometric identification to authenticate a user�s identity, mind-control to operate machines, elimination of the digital divide, and the end of spam.
Pros and Cons of Bringing Your Own Device to Work
The idea of �bring your own device� (BYOD) to work is a growing trend for business IT. There are benefits to allowing users to supply their own PCs and mobile devices into the office, but there are also some drawbacks. IT managers need to understand both before embracing BYOD with confidence. In the past IT departments drove technology, but that is no longer the case. The consumerization of IT revolution has chnaged the IT culture so that the users are the ones getting the latest, cutting edge technologies first, and they want to bring those devices to work.
Custom-Built Cloud Solutions, Apps Gain Traction
A survey from Intuit QuickBase reveals a growing number of employees are going it on their own when creating new applications or software to solve specific business problems. The survey found that nearly 20% of information workers have built or customized a Web application or software for work purposes without support from IT. The survey also found that half of information workers now use online databases and Web-based productivity applications, instant messaging platforms, video chat services and social networks to solve their own business problems.
2012 In Security: Rising Danger
Computer security involves more than installing an antivirus utility on PCs and laptops. Hackers are on a mission to steal money and wreak havoc with IT systems by any means possible. The growing popularity of mobile devices, such as phones and tablets, and the popularity of social networks provide hackers with new targets for their cybercrimes. This article looks at the new security issues various technologies facing end users and IT pros.
Mobility, Cloud, Analytics to Reshape IT in 2012
Mobility is introducing significant management and security challenges for IT, while simultaneously enabling businesses to improve both employee productivity and customer service. Social networking is creating an abundance of customer data, but creates a real challenge for companies trying to make any sense of all that information. As companies try to balance the technical challenges and opportunities, they're also faced with a shortage of skilled professionals. IT pros with application development, business analytics expertise, virtualization or cloud computing skills are in short supply..
Enterprises Need Encryption to Secure Private Data
According to security experts, concerns about data breaches and privacy violations should move enterprises to adopt encryption and use it effectively. Per Jeff Hudson, CEO of Venafi, organizations are beginning to assume that the firewall has already been compromised and are relying on encryption to protect data across the enterprise. In the past, security managers assumed that firewalls and other perimeter defenses were enough to keep hackers out. However, recent high-profile data breaches proved that cyber-criminals were able to get into the network, and had free rein because the data was not protected at all.
Mobile-Centric Computing: How Mobile Devices, Apps Are Creating a New Web
A new Internet is being created that is mobile-centric rather than Web-centric and it will become more developed and increasingly important in the next few years. Mobile computing is why a good part of the Web is being recreated. Users of mobile Web browsers on smartphones and tablets accessing and enter traditional Websites, have had a less than positive experience. That�s because normal Websites are not meant to be viewed on tiny screens. Consequently, if a site has not been modified to be �mobile-friendly,� the user typically gets a poor experience. Developers of the popular Websites have already created mobile-friendly versions of their Websites that provide a better experience when accessed by someone using a smartphone.
Mobile fragmentation drives HTML5 adoption: Kony
According to new research by Kony, HTML5 looks set for rapid growth, driven by the need for cross-platform development as a result of increasing mobile market fragmentation. In a survey of technology executives across more than 100 Fortune 500 companies, nearly 75% percent indicated that they were considering HTML5 implementation. Less than 10 percent said that it would replace their current native application offering, and suggested that HTML5 will co-exist with native applications in the future.
Over 80% percent of the respondents cited the ability to deploy on a wide range of phones and devices as the most attractive quality of HTML5.
Mobile Worker Population to Reach 1.3 Billion by 2015: IDC
According to an recent forecast from IDC, over the next 3 years the world's mobile worker population will reach 1.3 billion, or more than 35 percent of the total workforce. The report projects the most significant gains will again be in the emerging economies of the Asia-Pacific region. However, IDC analysts also concluded that the Americas will experience a slower growth rate due to a protracted economic recovery and high rates of unemployment.
Symantec Investigates Possible Leak Of Norton Antivirus Source Code
Symantec is investigating claims by a group of hackers that claim to be in possession of source code for its Norton AntiVirus product. The group claims to have stolen Symantec source code and documentation from the servers of Indian intelligence agencies. According to Symantec, the stolen information dates back to April 1999 and is no longer relevant for its current systems. Symantec's senior manager of corporate communications said that, "This document explains how the software is designed to work and contains function names, but there is no actual source code present. The information in the 1999 document has no bearing or impact on our current products, i.e., the information in the document cannot be used to impair or corrupt our current solutions."
Generic Top Level Domains Will Bring New Era For Users, Claims ICANN CEO
The CEO if the Internet Corporation for Assigned Names and Numbers (ICANN) said the group will soon open up applications for new generic top-level domains. ICANN will begin accepting applications for new gTLDs this week in a "new era" for the domain name system. The company�s CEO dismissed continued criticisms of the plan, saying opponents have raised no new objections in recent months. The company believes that the TgTLD plan will bring significant benefits to Internet users, including the ability to create new TLDs in non-Latin, non-English scripts.
SIIA Fourth Quarter Anti-Piracy Rewards to Corporate Whistleblowers Among Highest Ever
The Software & Information Industry Association (SIIA) announced that, in the final quarter of 2011, it paid $35,500 in rewards to five individuals who reported cases of significant corporate end-user software or content piracy. The total quarterly amount represents one of the highest amounts paid in any quarter since the program's inception. SIIA�s General Counsel and Senior Vice President for Intellectual Property Policy & Enforcement said "The workplace is a major battlefield in the fight against piracy, and SIIA's mission is to identify and stop businesses that profit from software and content they are not authorized to use. We rewarded five individuals who saw significant illegal piracy in the workplace and took action to stop it. The information these sources provided has allowed SIIA to launch several new investigations and continue the industry's most aggressive campaign against software and content piracy."
What to Do When Your Organization Says 'No' to Cloud Computing
Typical objections to cloud computing can be put into three categories: 1) Priorities - the move to cloud, as with any major technology migration, can potentially be disruptive; 2) Trust -Stakeholders may question the reliability of cloud technology; 3) Dependence -Stakeholders may have concerns about depending on a third party, particularly with public clouds. His article outlines best practices that can be taken to counter these objections.
Ten Little Things To Secure Your Online Presence
This article provides some basic advice on the tools and tricks you can implement immediately to secure your identity and online presence. The basic advice, including using a fully updated anti-malware product, applying all patches for operating system and desktop software, avoiding surfing to questionable parts of the Web all still apply. However there are a few additional things users can do to secure their online presence and keep hackers at bay. The authors list 10 little things that can increase online security.
New Legal Challenge - Who Owns Followers on Twitter?
Twitter assumes no obligation to keep any information secret. In examining Twitter's Terms of Service, the word "secret" is nowhere to be found. In fact, everyone who creates a Twitter account agrees to grant a broad license to Twitter for the content posted on Twitter. As Twitter has a license to all content posted for all Twitter accounts, a claim to ownership of followers by anyone -- employer, employee or any account holder -- may be difficult to uphold. Having Twitter followers doesn't mean the user owns them. In a lawsuit filed by PhoneDog, a novel legal question is raised: Who really owns followers on Twitter? Does this suit represent the beginning of legal challenges regarding the ownership of social-media-related rights to content, connections and messages?
Do Security Software Companies Go Too Far in Scaring Potential Customers?
Malware is a very real threat to Internet users, however the question is, do some software security companies scare potential customers into buying their product? James Gross thinks so and on Jan. 10 he filed a class action lawsuit against Symantec for �fraudulent inducement.� In his suit Gross accuses Symantec of tricking people into thinking their computers are infected with viruses for the purpose of financial gain. At the end of the scan, the PC Tools software told him he had �High Priority� errors and that his system health was low. That prompted Gross to pay $29.99 for PC Tools Registry Mechanic. Following the report Gross engaged computer forensics experts to examine Symantec�s Scareware� and they found that Symantec�s Scareware always reports that the user�s computer�s �System Health� is �LOW,� that �High Priority� errors exist on the system, and that the user�s �Privacy Health� and �Disk Health� are �LOW.� Symantec denies it uses deceitful tactics to trick people into buying its products when they don�t need them.
SIIA: More Trademark Protections Needed In ICANN Gtld Program
As the Internet Corporation for Assigned Names and Numbers (ICANN) moves forward, despite some opposition, with its decision to sell new generic top-level domains, a U.S. software trade group warns that the organization should take new steps to protect trademarks and other intellectual property. The Software and Information Industry Association (SIIA), a trade group that has questioned the need for a new gTLD program, said that ICANN should react to problems it sees developing as applications come in for new gTLDs,
xAssets Announces Industry Information Resource Service
xAssets announced today that it has launched an industry resources service on its website at www.xassets.com. Ed Cartier, the company's US Marketing Director, noted that, "It is our intent to provide individuals involved in the use, selection, and support of IT asset, fixed asset management tools and cloud-computing services with a place to go for news, information and discussions on topics that impact their professions..."
Read the press release here.
xAssets Hardware Discovery Service is Released - February 2010
xAssets Hardware Discovery Service is a hosted solution to enable customers to quickly
establish their Hardware Inventory.
The service runs for 60 days and is fast, affordable, agentless, low bandwidth, hosted and requires no expertise.
Click here for more information,
read the PDF press release here or get the
fact sheet here.
xAssets Network Discovery Receives SIIA Certification - January 2010
Wiltshire, United Kingdom January 5, 2010 - xAssets (www.xassets.com), a privately held developer of IT and software management,
fixed asset management software and helpdesk software tools, with offices in the United Kingdom, United States of America and Australia,
announced today that its IT asset and software discovery and reconciliation software has been certified by the Software & Information Industry
Association's (SIIA) as meeting its standards for accuracy, reliability, and ease of
use for performing software audits.
Read the full press release
xAssets Software Discovery Service is Released - October 2009
xAssets Software Discovery Service is a hosted solution to enable customers to quickly
establish their Software License Compliance position.
The service runs for 60 days and is fast, affordable, agentless, low bandwidth, hosted and requires no expertise.
Click here for more information or get the
fact sheet here.
The following Press Release was made public on the 29th October 2009:
Wiltshire, United Kingdom October 29, 2009 - xAssets (www.xassets.com), a privately held corporation with offices in the United Kingdom, United States of America and Australia, provides IT and software management, fixed asset management software and helpdesk software tools to medium and large scale enterprises, announced today that it is introducing a fully integrated automated hosted software compliance service.
xAssets hosted software discovery service provides organizations with the fastest and least complicated route to achieving software compliance. It requires no server acquisition, no software or agent deployment and minimal setup. A very small collection server tool is placed on the user's network and the system is typically up and running in minutes. The hosted service allows discovery for 30 consecutive days and reporting for an additional 30 days. Users can then choose to continue with the hosted service as needed.
Read the full press release
xAssets Software has been nominated for a Codie award - October 2009
Wiltshire, United Kingdom October 19, 2009 - xAssets (www.xassets.com), a privately held corporation with offices in the United Kingdom, United States of America and Australia, provides IT and software management, fixed asset management software and helpdesk software tools to medium and large scale enterprises, announced today that it's flagship product suite has been nominated for the prestigious SIIA CODIE Award.
The CODiE Awards hold the distinction of being the industry's only peer-reviewed awards program, which provides member companies with a unique opportunity to earn praise from their competitors. Now in its twenty-fourth year, the CODiE Awards program has raised the standard for excellence and serves as prestigious representation of outstanding achievement and vision in the software and information industry.
Continued... Click Here
to read the full press release.
Ed Cartier, our US Marketing Director, spoke live on the "My Technology Lawyer" radio show on the 11th March 2010.
Follow This Link to access the archive.
xAssets is sponsoring the IAITAM training program this year. This program allows companies to leverage their IT Asset Management
capabilities through ITAM training from industry experts. See this document for more information.