Wednesday, June 25, 2014

10 Common Problems APM Helps You Solve

One mistake in understanding the nature of the threats to your enterprise can have dire consequences, says Accuvant's Jason Clark

There is a scene in HBO's adaption of Game of Thrones where a character counsels the king to dismiss the rising power of one of his rivals because "curiosities on the far side of the world" are no threat. A season later, that rival has three dragons and an army under her control.

Practical advice for you to take full advantage of the benefits of APM and keep your IT environment
In my travels and meeting with 400 CISOs a year, I find there is much confusion around threat intelligence. Many that need it do not have the foundational elements and maturity to consume the information to make it actionable. It’s critical to know what intelligence is, what kind you need, and how to build the organization to consume it.

Understanding the nature of the threats to your enterprise may not involve swords and dragons, but one mistake can have dire consequences. It is for this reason the words "threat intelligence" have become associated with a growing number of security products and services.

The overuse of this term by vendors has caused its share of confusion in the marketplace. What is certain, however, is that identifying threat intelligence that is relevant to your business and applying it correctly can help you strengthen the security of your IT network.

So, let's start at the beginning and try to define some basics.

For starters, threat intelligence can be divided into three buckets: informational, reactive and predictive.

Informational threat intelligence includes data such as software vulnerabilities and threat indicators black lists of IP addresses associated with criminal activity. It also includes information regarding the 'who' and the 'how' of threat groups – what vulnerabilities they are targeting and who they are.

Reactive threat intelligence includes targeted intel such as what adversaries are after and reports that your passwords or intellectual property has made its way online.

The final bucket of threat intelligence is reserved for information that can be used to forecast malicious activity such as online posts discussing upcoming attacks and what types of intellectual property may be targeted.

The data filling these buckets can come from a variety of sources. For example, industry groups such as the National Health Information Sharing and Analysis Center (NH-ISAC) can be good sources of information about cybersecurity issues affecting in the healthcare field. Information about attacks or groups targeting specific types of organizations also can be purchased from commercial vendors or gleaned from publicly accessible data feeds.

Some of the most critical information, however, comes from within your enterprise.
Without knowing what constitutes normal user activity, spotting anomalous behavior becomes impossible. Local sources for threat intelligence can come from data gleaned during the investigation into an incident. Useful information can be found in your organization's data monitoring tools in the aftermath of a breach that could be used to better understand how attackers targeting your company operate. Likewise, any malware caught on the network that can be analyzed to prevent future attacks as well.

Tying internal and external threat intelligence together eliminates the noise when it comes time to analyze information and determine risk levels and your strategy for dealing with them. At its best, threat intelligence allows organizations to get an understanding of their own security posture and build a profile of attackers and their activity.

That last part –threat activity – involves having a clear view of the various stages of an attack, known as the kill chain. An example of a kill chain would be reconnaissance followed by the delivery of an exploit, pivoting around a network and extracting information.

Disrupting any one of these phases can be the difference between a breach and a typical workday. In the event of an attack, the ability to correlate attack data about the kill chain with information from intelligence feeds can help enhance understanding of the business impacts of the breach and provide a framework for improving defenses.

As one can imagine, getting the data and operationalizing it are two different animals. Just recently for example, cyber attackers were observed targeting a series of Internet Explorer and Adobe Flash Player vulnerabilities in attacks on the aerospace industry. With that type of intelligence, companies can assess how best to handle the situation and, if they are lucky, thwart the threat before it hits their network.

Are there computers in your environment running IE? Are there exploits being delivered via malicious sites that can be filtered? Is there any mitigation that can be put in place while Microsoft works on a permanent solution? What kind of data are the hackers after? Is it critical? Where is that data on my network?

Answering these types of questions moves your business along a security journey that begins in the hell of ad hoc approaches and ends at the nirvana of a business-aligned security program. It is not a simple path, and many CISOs get stuck along the way by developing security approaches based on meeting regulatory compliance demands without the benefit of threat intelligence coming into play. But, it is only with those data feeds that organizations can move on to developing a security approach based on actual risk that can then be put into a business context.

As the saying goes, information is power. The more you know about the threat landscape and what is happening on your network, the better able you will be to reduce risk by proactively limiting the attack surface for hackers.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Tuesday, June 17, 2014

Ten reasons why open source is eating the world

Ten reasons why open source is eating the world

Open source software, once just the domain of technology hobbyists, is taking over the software world. According to Gartner, open source software will be included in mission-critical software portfolios of virtually all Global 2000 enterprises by 2016. In fact, according to open source management vendor Black Duck Software, there are now a million different open source software projects. Here are 10 reasons for the surging popularity of open source software.

Faster innovation
Traditional software vendors create and develop their products in-house. Open source vendors, however, aren't starting from zero – they innovate on top of a common base. "Open source provides a software foundation that alleviates the need to start development projects from scratch," says analyst Jon Oltsik. "It can then be customized for specific purposes which can help accelerate the development process." With cloud services there's the Amazon or Microsoft approach. "In this arena, I see service providers providing Apache OpenStack-powered clouds offering comparable services to Amazon EC2, but differentiating on the variety of service offerings, professional services, and custom-tailored service levels," says Citrix’s Mark Hinkle (pictured, left).

Security
Security was once viewed as an open source liability, but that has changed. This year, 72 percent of BlackDuck's respondents said that they specifically chose open source because of security. Open source software allows users to review code for potential security flaws. “I really do like the transparency of open source,” says Daniel Polly, enterprise information security officer at First Financial Bank. “But more so, when a piece of software is interacting with data, I do like the fact that with open source you can see what's going on in that data stream.” Polly says the bank uses Snort. Commercial vendors are now being pressed to match what open source can offer, both in security and in other areas, he adds.

Cost
Price also continues to be factor. In this year’s Black Duck survey, 68 percent of respondents said that open source helped improve efficiency and reduce costs.

Of course, open source is not the same as free. Vendors can still charge for the software, for particular versions of the software, for support, or for custom development work. In addition, a company might need to spend internal resources on adapting or integrating open source software. But it’s no longer the leading factor. “It’s about more than just cost-cutting or any of the traditional reasons to simply use open source software,” says Lou Shipley (pictured, left), President and CEO, Black Duck. “Open source has proven its quality and security, and reached a point of widespread democratization and proliferation.”

Scalability
Traditional proprietary software is often focused on the needs of a particular market segment, for example, enterprise or SMB. Open source projects typically don't suffer from this problem since they're usually built around customer requirements.

“As a typical startup, we kicked off with an IT backbone built almost entirely on open source technology,” says Rafael Herrera (pictured left), head of BI International at Groupon. “The key factor for us – besides the cost gains – was scalability. We needed a framework that could support dynamic growth from the outset. As a typical startup, we kicked off with an IT backbone built almost entirely on open source technology,” adds Herrera. For example, Groupon uses an open source data integration platform from Talend.

Feature set
According to a 2013 report from the Linux Foundation, 80 percent of companies plan to increase their use of Linux over the next five years, while only 20 percent plan to increase their use of Windows. The number of companies using Linux for mission-critical workloads grew from 60 percent in 2010, to 73 percent in 2012. And, sure, price was a factor. Even when adding in support costs, open source software is generally significantly cheaper overall. But, according to the Linux Foundation report, it was only the second-most important factor. The first was the feature set. This is a dramatic reversal from the early years of open source technology, when the commercial products were generally more complete and robust.

Customization

Open source software allows savvy users to go right into the source code and modify it. "I've been able to extend the open source software we're using to fit our need without engaging a third party," says Paul Stadler (pictured left), technology manager at the Chester County Cat Hospital. The company uses open source veterinary practice management software for its core operations, running on a Linux server and delivered via a Web-based interface to employee desktops and mobile devices.

In fact, the adaptability and flexibility of open source software was the fourth most important reason why companies chose it over proprietary software, according to this year’s Black Duck survey. This benefit of open source was ranked eighth last year.

Collaboration
In the past, when several companies needed the same functionality, they built it from scratch, used a product from an outside vendor or formed a consortium to create and maintain the product. Open source software streamlines this process by enabling competing companies to work together. This frees up time and money for companies to spend working on projects that differentiate themselves. According to Black Duck’s survey, 50 percent of corporations contribute to open source, and 56 percent say that they will increase their contributions this year. By participating in development, enterprises can help influence the way the software evolves and build relationships with other developers.

Standards
It's nice to think that standards are set by groups of intelligent though-leaders, choosing the best possible path forward for an industry. In practice, however, what often happens is the emergence of de-facto standards based on popular products, like, say, Microsoft Word's .doc format. A successful open source project can provide the same function, without the associated risk of vendor lock-in. "Many times it’s easier to implement a standard as a result of adoption of real products," says Citrix' Hinkle. "Apache Web Server is a good example of massive adoption and an accessible platform that drove the adoption of many web standards in the earlier days of the Internet."

Cutting-edge
In many areas, open source software is no longer trailing behind proprietary platforms but is instead leading the way. Cloud, mobile, Big Data and the Internet of Things all feature many high-profile open source projects that are driving the evolution of these platforms. Not to mention the Web itself, much of it built on the open stack of Linux, Apache, MySQL and PHP. Even in the latest hot tech news topic -- virtual reality -- there are several competing open source virtual environment platforms, including OpenSim, Open Wonderland, and Open Qwaq.

Quality
According to this year’s Black Duck Future of Open Source survey, quality was the top reason why respondents chose open source. That’s a big change. In 2011, quality was in fifth place. As open source projects gain adherents, more people contribute to improving stability, spotting or fixing bugs and streamlining interfaces. A related factor, ease of deployment, rose from sixth place in 2013 to third place today, another sign of the rapid maturation of open source projects. In fact, many open source tools are now as simple to install as their proprietary equivalents -- simpler, if you take into account the fact that in many cases no purchase or procurement process is involved.




Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Friday, June 6, 2014

10 Father's Day Gifts to Help Dad Feel Young and Cool

Dad isn't getting any younger. Why not get him a Father's Day gift that makes him feel young and cool again? Here are 10 ideas.

Another Father's Day is around the corner, reminding dear old dad that he's another year older. Why not help your dad feel just a touch more youthful? These 10 gadgets mix fun and practicality — and sure beat the tie, book or gift card you've given him in the past.

Motrr Galileo
The Motrr Galileo ($203 for Bluetooth model) is unique robotic holder designed for the iPhone that can be placed flat on a table or mounted on a standard camera tripod. The device offers 360 degrees of spherical motion for an attached iPhone, along with a wealth of fun and practical applications such as time-lapse photos, 360-degrees panoramas and even remote surveillance. All told, more than a dozen Galileo-enabled apps are available now. The Galileo pairs to the smartphone using Bluetooth and can be controlled from another iOS device or a Web browser.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com



Logitech Case [+] The Story
The Logitech case [+] The story ($199) iPhone accessory set includes a basic case and various "[+]" components, including a leather kickstand, a vehicle mount, wallet for credit cards and external battery pack. The slim case serves to protect the iPhone against drops while adding minimal bulk, and it incorporates a strategic stripe of metal by which the other accessories can be magnetically attached. The vehicle mount is our favorite, attaching securely with no flimsy plastic hooks to breakage.

iFrogz Tadpole Bluetooth Speaker
The iFrogz Tadpole Bluetooth Speaker ($19.99) punches way above its weight to deliver big sound. Because it weighs just 0.7 ounces (20 grams), the Tadpole can be clipped easily onto keys, purses, belts or anything else with a hoop. The wireless speaker works with smartphones and tablets that support Bluetooth 3.0, and the onboard 200mAh lithium-ion battery can power more than two hours of continuous play. When drained, the device is easily juiced from its micro-USB charging port.

Jawbone Era Headset
The Jawbone Era ($129.99 with charging case) is easily one of the most minimalist and lightweight headset out there. The Era incorporates a new design that uses the natural contour of the ear to create a fit that's comfortable enough to wear all day. In our tests, we found it entirely possible to forget that the Era headset is even there. Credit the headset's micro-electro-mechanical system, which Jawbone says delivers superior performance in a small size. Finally, the Jawbone Era comes with a tiny charging case that bumps the four-hour talk time of the lightweight Bluetooth earpiece to 10 hours.

CalypsoTag
The stylish CalypsoTag ($134) luggage tag not only makes luggage easier to identify out of the carousel; it also allows luggage to be tracked electronically within 200 feet (60 meters). The latter is possible due to the use of a low-power Bluetooth 4.0 chip built inside the CalypsoTag, which communicates with a (free) Apple or Android smartphone app. The app will send you an alert should a fellow passenger try to pull a fast one with the luggage. Available in four bold styles, the CalypsoTag is made of premium Italian leather that's striking in appearance even without its electronic tracking capability.

STM Aero Small Laptop Backpack
The STM Aero small laptop backpack ($99.95) is designed for toting around a laptop, tablet and other gadgets. The backpack is designed to fit most 13-inch laptops; we were able to fit in both a 13-inch MacBook Pro Retina as well as an iPad tablet just fine. High-density foam padding lines strategic parts of the backpack, while soft material coats other areas to protect your expensive gadget. A highly organized interior offers multiple pockets and nooks for storing all manner of digital paraphernalia, such as headphones or an AC adapter. The STM aero small laptop backpack weighs just 1.5 pounds (660 grams), and its svelte silhouette will make your dad feel young (or at least stylish) again.

Plantronics BackBeat GO 2
The Plantronics BackBeat GO 2($99.99 with charging case) wireless stereo headset is designed for listening to music and taking calls. Both a rechargeable battery and Bluetooth transceiver are built directly into the earpiece unit; there are no bulky components to stow away. A military-grade nano-coating also protects the device from sweat, moisture and spills, making it perfect for a run or a workout at the gym. Fully charged, the BackBeat GO 2 offers up to four-and-a-half hours of listening and five hours of talk time; this is boosted to 14.5 hours of listening time with the included case.

Sphero 2.0
Awake the inner child in your dad with Sphero 2.0 ($99.99), a remote-controlled robot the likes of which your dad never saw while raising you. (Not that he'd have had time for a robot anyway.) The robotic sphere pairs with your iOS or Android device via Bluetooth and careens around at speeds of up to 7 feet per second, with a 100-foot range. The Sphero 2.0 is waterproof, and is recharged by an included induction charger. Since its release, the catalog of Sphero-compatible games and apps have grown to some 30 titles and counting, allowing for many more hours of fun.

Twelve South Hoverbar for iPad
If your dad owns an iPad tablet, consider the Hoverbar for iPad ($99.99). As its name suggests, the Hoverbar is a stand with a versatile arm that can be attached to any ledge up to one inch thick. It can be used as a floating display beside your monitor in the study, or on the kitchen counter where it's kept away from any spills or splatters. Three included "Fit Clips" allows the Hoverbar to work with any current iPad tablets, and the metallic arm is strong yet surprisingly flexible. Finally, the Hoverbar for iPad includes a handy kickstand that snaps onto the iPad clip for use as a standalone tabletop display.

Anker 36W USB Quad-Port Wall Charger
With the number of USB-powered devices increasing by the day, the Anker 36W USB Quad-Port Wall Charger ($42.99) helps ensure that your dad has ample ports to keep his gadgets properly juiced. The Anker 36W Wall Charger is designed for simultaneous, full-speed charging, with two ports hardwired for Apple (2.1A output) devices and two for Android (1.5A output) smartphones and tablets. The portable charger is lightweight and tips the scale at just 3.5 ounces (100 grams).