Welcome!

Microsoft Cloud Authors: Pat Romanski, Jnan Dash, Andreas Grabner, Lori MacVittie, Jim Kaskade

Blog Feed Post

Odierno: budget is greatest threat to national security, Data.gov gets new Alpha site and more

By

DoDHere are the top cyber news and stories of the day.

  • DOD, VA improve eBenefits portal – The eBenefits self-service portal has been updated. This portal allows service members and vets unparalleled access to information and services. It allows users to get into compensation services, even populated the information from their VA records. Via FedScoop, more here.
  • Government Appetite Growing for Twitter User Data – “Twitter said Monday that just 19 percent of federal and state government requests for user data were accompanied by probable-cause search warrants during the six months ending in December 2012.” There were 815 total requests for Twitter user data. Twitter also demands a probable-cause warrant. Via Wired, more here.
  • 86,800 network printers open to the whole internet – is one of them yours? – “UK blogger @skattyadz, alias Adam Howard [*], did a Google search for a URL matching the pattern you might use to connect to a nearby printer on your office network.” He built his search terms to look specifically for HP printers, so there are likely to be thousands of other open network printers. Via Naked Security, more here.
  • Odierno: budget is greatest threat to national security - Army Chief of Staff, Ray Odierno, believes that “Fiscal uncertainty and potential budget shortfalls are the greatest threat to national security.” Apparently, the Joint Chief of Staffs wrote a letter to the House and Senate concerned about how future budgets could affect national security. ““In the past we’ve taken reductions during relative peace and stability, but in my mind as I look at the world today, there’s instability on every continent around the world and there’s incredible uncertainty on what the future may hold,”” said Odierno. Via FedScoop, more here.
  • DDoS attacks, mobile traffic visibility top security concerns: Arbor – According to Arbor Networks’ most recent report, over 90% of data centers are experiencing DDoS attacks. They also found 60% of mobile providers have no oversight over their 4G LTE networks. Via ComputerWorld Australia, more here.
  • The dangers of third-party code for cloud security – “Imperva announced a new report which examines the dangers of third-party code in cloud computing.In December 2012, a hacker breached Yahoo! with an SQL injection attack that took advantage of a vulnerability in a third-party application that was provided on the Yahoo! Web site.” This has emphasized the dangers that using 3rd party code in cloud services can open a service up to. Via Net Security.org, more here.
  • Google Announces Pwnium 3, Ups Ante and Offers $3M+ in Rewards – In this year’s competition, Google is opening up the Chrome OS to the competitors. Google is offering $3.14159M (you nerds should get it) in reward money. According to the Chromium blog, “the company will offer $110,000 for a “browser or system level compromise in guest mode or as a logged-in user, delivered via a web page” and $150,000 for a “compromise with device persistence — guest to guest with interim reboot, delivered via a web page.”" Via Threat Post, more here.
  • New bug makes moot Java’s latest anti-exploit defenses, claims researcher – “Java’s new security settings, designed to block “drive-by” browser attacks, can be bypassed by hackers, a researcher announced Sunday.” Adam Gowdiak, CEO of Security Explorations, found that the new settings for Java do not shut down attackers at all. Via ComputerWorld, more here.\
  • Pentagon to boost cybersecurity force – The Pentagon will be plussing up their cybersecurity force by almost five-fold, in the next few years. The USCYBERCOM unit will grow from 900 personnel to over 4,900 total servicemembers and civilians. “The plan calls for the creation of three types of forces under the Cyber Command: “national mission forces” to protect computer systems that undergird electrical grids, power plants and other infrastructure deemed critical to national and economic security; “combat mission forces” to help commanders abroad plan and execute attacks or other offensive operations; and “cyber protection forces” to fortify the Defense Department’s networks.” Via Stars and Stripes, more here.
  • Data.gov gets agile with new alpha site - ”Data.gov is on track to getting a .gov makeover right before our very eyes thanks in part to an agile, open approach to development being adopted by the General Services Administration.” They are attempting to “create an online showcase” designed to highlight what data.gov can do. Via FedScoop, more here.
  • When reforming FISMA, don’t throw out what works – William Jackson of GCN, explores the value that FISMA has already had in government. While FISMA has required enormous amounts of paperwork, and “focused on compliance rather than risk”. “Before Congress fiddles too much with the act, lawmakers should have a good idea of how that implementation has improved and what the impact has been, and what practices have actually improved security in agencies.” Via GCN, more here.
  • Motorola Solutions unveils MC45 mobile computer – Motorola has released details on a new rugged mobile tablet. The problem with these capabilities is that they do not outstrip devices such as the Apple iPad or Google Nexus 7 or any smartphone in any terms of value. The device starts at $1,345 and has an enhanced model that is $2,295. These have small screens and small keyboards, but Motorola must believe their “ruggedization” to be worth the cost. We shall see, but I hope that most organizations start thinking more agilely and purchase commercial devices with rugged cases as opposed to COTS devices with built in protections. Via IDG/ComputerWorld, more here.

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder and partner at Cognitio Corp and publsher of CTOvision.com

@ThingsExpo Stories
WebRTC sits at the intersection between VoIP and the Web. As such, it poses some interesting challenges for those developing services on top of it, but also for those who need to test and monitor these services. In his session at WebRTC Summit, Tsahi Levent-Levi, co-founder of testRTC, reviewed the various challenges posed by WebRTC when it comes to testing and monitoring and on ways to overcome them.
In his General Session at 16th Cloud Expo, David Shacochis, host of The Hybrid IT Files podcast and Vice President at CenturyLink, investigated three key trends of the “gigabit economy" though the story of a Fortune 500 communications company in transformation. Narrating how multi-modal hybrid IT, service automation, and agile delivery all intersect, he will cover the role of storytelling and empathy in achieving strategic alignment between the enterprise and its information technology.
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists peeled away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud enviro...
"A lot of times people will come to us and have a very diverse set of requirements or very customized need and we'll help them to implement it in a fashion that you can't just buy off of the shelf," explained Nick Rose, CTO of Enzu, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...
WebRTC services have already permeated corporate communications in the form of videoconferencing solutions. However, WebRTC has the potential of going beyond and catalyzing a new class of services providing more than calls with capabilities such as mass-scale real-time media broadcasting, enriched and augmented video, person-to-machine and machine-to-machine communications. In his session at @ThingsExpo, Luis Lopez, CEO of Kurento, introduced the technologies required for implementing these idea...
Every successful software product evolves from an idea to an enterprise system. Notably, the same way is passed by the product owner's company. In his session at 20th Cloud Expo, Oleg Lola, CEO of MobiDev, will provide a generalized overview of the evolution of a software product, the product owner, the needs that arise at various stages of this process, and the value brought by a software development partner to the product owner as a response to these needs.
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web co...
Internet of @ThingsExpo, taking place June 6-8, 2017 at the Javits Center in New York City, New York, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. @ThingsExpo New York Call for Papers is now open.
Who are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, discussed the impact of technology on identity. Sho...
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT depl...
Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics. In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at Dell EMC, introduced a methodology for capturing, enriching and sharing data (and analytics) across the organization...
With all the incredible momentum behind the Internet of Things (IoT) industry, it is easy to forget that not a single CEO wakes up and wonders if “my IoT is broken.” What they wonder is if they are making the right decisions to do all they can to increase revenue, decrease costs, and improve customer experience – effectively the same challenges they have always had in growing their business. The exciting thing about the IoT industry is now these decisions can be better, faster, and smarter. Now ...
WebRTC is about the data channel as much as about video and audio conferencing. However, basically all commercial WebRTC applications have been built with a focus on audio and video. The handling of “data” has been limited to text chat and file download – all other data sharing seems to end with screensharing. What is holding back a more intensive use of peer-to-peer data? In her session at @ThingsExpo, Dr Silvia Pfeiffer, WebRTC Applications Team Lead at National ICT Australia, looked at differ...
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
"ReadyTalk is an audio and web video conferencing provider. We've really come to embrace WebRTC as the platform for our future of technology," explained Dan Cunningham, CTO of ReadyTalk, in this SYS-CON.tv interview at WebRTC Summit at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
In 2014, Amazon announced a new form of compute called Lambda. We didn't know it at the time, but this represented a fundamental shift in what we expect from cloud computing. Now, all of the major cloud computing vendors want to take part in this disruptive technology. In his session at 20th Cloud Expo, John Jelinek IV, a web developer at Linux Academy, will discuss why major players like AWS, Microsoft Azure, IBM Bluemix, and Google Cloud Platform are all trying to sidestep VMs and containers...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Dave McCarthy, Director of Products at Bsquare Corporation; Alan Williamson, Principal ...
IoT is at the core or many Digital Transformation initiatives with the goal of re-inventing a company's business model. We all agree that collecting relevant IoT data will result in massive amounts of data needing to be stored. However, with the rapid development of IoT devices and ongoing business model transformation, we are not able to predict the volume and growth of IoT data. And with the lack of IoT history, traditional methods of IT and infrastructure planning based on the past do not app...
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.