Thursday 16 January 2014

Five Recommendations for Protection Against Advanced Hacking Attacks




Invest in a complete defensive strategy, including intrusion detection and protection.
By investing in and deploying a thorough defensive strategy, organizations can get the leg up. Complete with intrusion detection and protection, this strategy gives organizations the ability to detect the digital fingerprints of the most stealthy and persistent threats. By integrating visibility and control with advanced detection and forensics, organizations will benefit from preventative, early detections and mitigation capabilities against advanced malware.


Have a response strategy ready to mitigate each type of attack properly.
Catching cyber criminals today requires investigators to perform difficult and time-consuming memory forensics while simultaneously locating, or ruling out, advanced malware infections — not an easy task. A response strategy is more than just tools and techniques. It’s also process and management. By establishing a pre-planned response strategy, the organization can be ready to respond to any kind of attack to save money, reputation and end-user pain.


Institute solid and sound hiring policies to protect against insider threats.
Organizations can’t ignore societal factors when it comes to cybersecurity. Economic issues coupled with the transient nature of today’s work force leaves organizations at risk from rogue employees. These employees have the capability of inflicting financial, IP, brand and reputational damage. Employee network access should not be a one-size-fits-all solution. Ensure that user permissions are limited to the needs of a person’s job. And as always, regularly review audit and access logs, and stiffen penalties for employees found in violation of policy to include termination.

Deploy a solid incident response platform.
It is paramount for organizations to deploy a platform that integrates people, process and tools in order to provide a comprehensive incident response process. An ideal platform gathers and displays data from SIEM, IPS and other sources in one common view to enable much faster response while providing easy-to-understand evidence for the C-suite. Combining incident response with malware detection capabilities transforms how organizations conduct and manage digital investigations.


Document and share attack reports across the IT department.
At every moment of every day, document the details of every attack, including where it is hitting the system, where it is coming from, what kind of attack it is, when and so on. Compile and share this information across the IT team so every member is aware of what types of attacks the system is facing. Consistencies within the report may shed light on a specific hacker group trying to use one type of malware to attack different parts of the business. This information sharing will help the IT team better understand what the system is up against and how best to protect it.

Top 10 Strategic Technology Trends for 2014


Through 2018, the growing variety of devices, computing styles, user contexts and interaction paradigms will make "everything everywhere" strategies unachievable. The unexpected consequence of bring your own device (BYOD) programs is a doubling or even tripling of the size of the mobile workforce. This is placing tremendous strain on IT and finance organizations. Enterprise policies on employee-owned hardware usage need to be thoroughly reviewed and, where necessary, updated and extended. Most companies only have policies for employees accessing their networks through devices that the enterprise owns and manages. Set policies to define clear expectations around what they can and can't do. Balance flexibility with confidentiality and privacy requirements


Gartner predicts that through 2014, improved JavaScript performance will begin to push HTML5 and the browser as a mainstream enterprise application development environment. Gartner recommends that developers focus on creating expanded user interface models including richer voice and video that can connect people in new and different ways. Apps will continue to grow while applications will begin to shrink. Apps are smaller, and more targeted, while a larger application is more comprehensive. Developers should look for ways to snap together apps to create larger applications.
Building application user interfaces that span a variety of devices require an understanding of fragmented building blocks and an adaptable programming structure that assembles them into optimized content for each device. The market for tools to create consumer and enterprise facing apps is complex with well over 100 potential tools vendors. For the next few years no single tool will be optimal for all types of mobile application so expect to employ several. The next evolution in user experience will be to leverage intent, inferred from emotion and actions, to motivate changes in end-user behavior.

The Internet is expanding beyond PCs and mobile devices into enterprise assets such as field equipment, and consumer items such as cars and televisions. The problem is that most enterprises and technology vendors have yet to explore the possibilities of an expanded Internet and are not operationally or organizationally ready.
Imagine digitizing the most important products, services and assets. The combination of data streams and services created by digitizing everything creates four basic usage models – manage; monetize; operate; extend. These four basic models can be applied to any of the four "Internets” (people, things, information and places).  Enterprises should not limit themselves to thinking that only the Internet of Things (i.e., assets and machines) has the potential to leverage these four models. Enterprises from all industries (heavy, mixed, and weightless) can leverage these four models.

Bringing together personal clouds and external private cloud services is an imperative. Enterprises should design private cloud services with a hybrid future in mind and make sure future integration/interoperability is possible. Hybrid cloud services can be composed in many ways, varying from relatively static to very dynamic. Managing this composition will often be the responsibility of something filling the role of cloud service broker (CSB), which handles aggregation, integration and customization of services. Enterprises that are expanding into hybrid cloud computing from private cloud services are taking on the CSB role.
Terms like "overdrafting" and "cloudbursting" are often used to describe what hybrid cloud computing will make possible. However, the vast majority of hybrid cloud services will initially be much less dynamic than that. Early hybrid cloud services will likely be more static, engineered compositions (such as integration between an internal private cloud and a public cloud service for certain functionality or data). More deployment compositions will emerge as CSBs evolve (for example, private infrastructure as a service [IaaS] offerings that can leverage external service providers based on policy and utilization).

Cloud/client computing models are shifting. In the cloud/client architecture, the client is a rich application running on an Internet-connected device, and the server is a set of application services hosted in an increasingly elastically scalable cloud computing platform. The cloud is the control point and system or record and applications can span multiple client devices. The client environment may be a native application or browser-based; the increasing power of the browser is available to many client devices, mobile and desktop alike.
Robust capabilities in many mobile devices, the increased demand on networks, the cost of networks and the need to manage bandwidth use creates incentives, in some cases, to minimize the cloud application computing and storage footprint, and to exploit the intelligence and storage of the client device. However, the increasingly complex demands of mobile users will drive apps to demand increasing amounts of server-side computing and storage capacity.

The personal cloud era will mark a power shift away from devices toward services. In this new world, the specifics of devices will become less important for the organization to worry about, although the devices will still be necessary. Users will use a collection of devices, with the PC remaining one of many options, but no one device will be the primary hub. Rather, the personal cloud will take on that role. Access to the cloud and the content stored or shared from the cloud will be managed and secured, rather than solely focusing on the device itself.


Software-defined anything (SDx) is a collective term that encapsulates the growing market momentum for improved standards for infrastructure programmability and data center interoperability driven by automation inherent to cloud computing, DevOps and fast infrastructure provisioning. As a collective, SDx also incorporates various initiatives like OpenStack, OpenFlow, the Open Compute Project and Open Rack, which share similar visions. As individual SDx technology silos evolve and consortiums arise, look for emerging standards and bridging capabilities to benefit portfolios, but challenge individual technology suppliers to demonstrate their commitment to true interoperability standards within their specific domains.
While openness will always be a claimed vendor objective, different interpretations of SDx definitions may be anything but open. Vendors of SDN (network), SDDC (data center), SDS (storage), and SDI (infrastructure) technologies are all trying to maintain leadership in their respective domains, while deploying SDx initiatives to aid market adjacency plays. So vendors who dominate a sector of the infrastructure may only reluctantly want to abide by standards that have the potential to lower margins and open broader competitive opportunities, even when the consumer will benefit by simplicity, cost reduction and consolidation efficiency.

Web-scale IT is a pattern of global-class computing that delivers the capabilities of large cloud service providers within an enterprise IT setting by rethinking positions across several dimensions. Large cloud services providers such as Amazon, Google, Facebook, etc., are re-inventing the way in which IT services can be delivered. Their capabilities go beyond scale in terms of sheer size to also include scale as it pertains to speed and agility. If enterprises want to keep pace, then they need to emulate the architectures, processes and practices of these exemplary cloud providers. Gartner calls the combination of all of these elements Web-scale IT.
Web-scale IT looks to change the IT value chain in a systemic fashion.  Data centers are designed with an industrial engineering perspective that looks for every opportunity to reduce cost and waste. This goes beyond re-designing facilities to be more energy efficient to also include in-house design of key hardware components such as servers, storage and networks. Web-oriented architectures allow developers to build very flexible and resilient systems that recover from failure more quickly.

Through 2020, the smart machine era will blossom with a proliferation of contextually aware, intelligent personal assistants, smart advisors (such as IBM Watson), advanced global industrial systems and public availability of early examples of autonomous vehicles. The smart machine era will be the most disruptive in the history of IT. New systems that begin to fulfill some of the earliest visions for what information technologies might accomplish — doing what we thought only people could do and machines could not —are now finally emerging.
Gartner expects individuals will invest in, control and use their own smart machines to become more successful. Enterprises will similarly invest in smart machines. Consumerization versus central control tensions will not abate in the era of smart-machine-driven disruption. If anything, smart machines will strengthen the forces of consumerization after the first surge of enterprise buying commences.

Worldwide shipments of 3D printers are expected to grow 75 percent in 2014 followed by a near doubling of unit shipments in 2015. While very expensive “additive manufacturing” devices have been around for 20 years, the market for devices ranging from $50,000 to $500, and with commensurate material and build capabilities, is nascent yet growing rapidly. The consumer market hype has made organizations aware of the fact 3D printing is a real, viable and cost-effective means to reduce costs through improved designs, streamlined prototyping and short-run manufacturing.


Reference from,

Tuesday 7 January 2014

Steve Jobs: An Extraordinary Career

Steve Jobs

Co-founder of Apple Computer Inc.
Founded: 1976

"We started out to get a computer in the hands of everyday people, and we succeeded beyond our wildest dreams."-Steve Jobs

Steve Jobs' vision of a "computer for the rest of us" sparked the PC revolution and made Apple an icon of American business. But somewhere along the way, Jobs' vision got clouded -- some say by his ego -- and he was ousted from the company he helped found. Few will disagree that Jobs did indeed impede Apple's growth, yet without him, the company lost its sense of direction and pioneering spirit. After nearly 10 years of plummeting sales, Apple turned to its visionary founder for help, and a little older, little wiser Jobs engineered one of the most amazing turnarounds of the 20th century.
The adopted son of a Mountain View, Calif., machinist, Steve Jobs showed an early interest in electronics and gadgetry. While in high school, he boldly called Hewlett-Packard co-founder and president William Hewlett to ask for parts for a school project. Impressed by Jobs, Hewlett not only gave him the parts, but also offered him a summer internship at Hewlett-Packard. It was there that Jobs met and befriended Steve Wozniak, a young engineer five years his senior with a penchant for tinkering.
After graduating from high school, Jobs enrolled in Reed College but dropped out after one semester. He had become fascinated by Eastern spiritualism, and he took a part-time job designing video games for Atari in order to finance a trip to India to study Eastern culture and religion.
When Jobs returned to the U.S., he renewed his friendship with Wozniak, who had been trying to build a small computer. To Wozniak, it was just a hobby, but the visionary Jobs grasped the marketing potential of such a device and convinced Wozniak to go into business with him. In 1975, the 20-year-old Jobs and Wozniak set up shop in Jobs' parents' garage, dubbed the venture Apple, and began working on the prototype of the Apple I. To generate the $1,350 in capital they used to start Apple, Steve Jobs sold his Volkswagen microbus, and Steve Wozniak sold his Hewlett-Packard calculator.
Although the Apple I sold mainly to hobbyists, it generated enough cash to enable Jobs and Wozniak to improve and refine their design. In 1977, they introduced the Apple II -- the first personal computer with color graphics and a keyboard. Designed for beginners the user-friendly Apple II was a tremendous success, ushering in the era of the personal computer. First-year sales topped $3 million. Two years later, sales ballooned to $200 million.
But by 1980, Apple's shine was starting to wear off. Increased competition combined with less than stellar sales of the Apple III and its follow-up, the LISA, caused the company to lose nearly half its market to IBM. Faced with declining sales, Jobs introduced the Apple Macintosh in 1984. The first personal computer to feature a graphical-user interface controlled by a mouse, the Macintosh was a true breakthrough in terms of ease-of-use. But the marketing behind it was flawed. Jobs had envisioned the Mac as a home computer, but at $2,495, it was too expensive for the consumer market. When consumer sales failed to reach projections, Jobs tried pitching the Mac as a business computer. But with little memory, no hard drive and no networking capabilities, the Mac had almost none of the features corporate America wanted.
For Jobs, this turn of events spelled serious trouble. He clashed with Apple's board of directors and, in 1983, was ousted from the board by CEO John Sculley, whom Jobs had handpicked to help him run Apple. Stripped of all power and control, Jobs eventually sold his shares of Apple stock and resigned in 1985.
Later that year, using a portion of the money from the stock sale, Jobs launched NeXT Computer Co., with the goal of building a breakthrough computer that would revolutionize research and higher education. Introduced in 1988, the NeXT computer boasted a host of innovations, including notably fast processing speeds, exceptional graphics and an optical disk drive. But priced at $9,950, the NeXT was too expensive to attract enough sales to keep the company afloat. Undeterred, Jobs switched the company's focus from hardware to software. He also began paying more attention to his other business, Pixar Animation Studios, which he had purchased from George Lucas in 1986.
After cutting a three-picture deal with Disney, Jobs set out to create the first ever computer-animated feature film. Four years in the making, "Toy Story" was a certified smash hit when it was released in November 1995. Fueled by this success, Jobs took Pixar public in 1996, and by the end of the first day of trading, his 80 percent share of the company was worth $1 billion. After nearly 10 years of struggling, Jobs had finally hit it big. But the best was yet to come.
Within days of Pixar's arrival on the stock market, Apple bought NeXT for $400 million and re-appointed Jobs to Apple's board of directors as an advisor to Apple chairman and CEO Gilbert F. Amelio. It was an act of desperation on Apple's part. Because they had failed to develop a next-generation Macintosh operating system, the firm's share of the PC market had dropped to just 5.3 percent, and they hoped that Jobs could help turn the company around.

At the end of March 1997, Apple announced a quarterly loss of $708 million. Three months later, Amelio resigned and Jobs took over as interim CEO. Once again in charge of Apple, Jobs struck a deal with Microsoft to help ensure Apple's survival. Under the arrangement, Microsoft invested $150 million for a nonvoting minority stake in Apple, and the companies agreed to "cooperate on several sales and technology fronts." Next, Jobs installed the G3 PowerPC microprocessor in all Apple computers, making them faster than competing Pentium PCs. He also spearheaded the development of the iMac, a new line of affordable home desktops, which debuted in August 1998 to rave reviews. Under Jobs' guidance, Apple quickly returned to profitability, and by the end of 1998, boasted sales of $5.9 billion.
Against all odds, Steve Jobs pulled the company he founded and loved back from the brink. Apple once again was healthy and churning out the kind of breakthrough products that made the Apple name synonymous with innovation.
But Apple's innovations were just getting started. Over the next decade, the company rolled out a series of revolutionary products, including the iPod portable digital audio player in 2001, an online marketplace called the Apple iTunes Store in 2003, the iPhone handset in 2007 and the iPad tablet computer in 2010. The design and functionality of these devices resonated with users worldwide. Apple says it has sold more than 300 million iPods, over 100 million iPhones and more than 15 million iPad devices. The company has sold billions of songs from its iTunes Store.
Despite his professional successes, Jobs struggled with health issues. In mid-2004, he announced in an email to Apple employees that he had undergone an operation to remove a cancerous tumor from his pancreas. In January 2011, following a liver transplant, Jobs said he was taking a medical leave of absence from Apple but said he'd continue as CEO and "be involved in major strategic decisions for the company."

Eight months later, on August 24, Apple’s board of directors announced that Jobs had resigned as CEO and that he would be replaced by COO Tim Cook. Jobs said he would remain with the company as chairman.
"I have always said if there ever came a day when I could no longer meet my duties and expectations as Apple’s CEO, I would be the first to let you know," Jobs said in a letter announcing his resignation. "Unfortunately, that day has come."
Jobs once described himself as a "hopeless romantic" who just wanted to make a difference. Quite appropriately like the archetypal romantic hero who reaches for greatness but fails, only to find wisdom and maturity in exile, an older, wiser Steve Jobs returned triumphant to save his kingdom.
Technology editor Jason Fell contributed to this report.
Related Posts Plugin for WordPress, Blogger...