Top Stories

No thumbnail available

Adobe Source Code Hack Presents Serious Risk To Enterprise Customers

Last week's highly publicized theft of source code from a number of Adobe products, including its popular Acrobat and Cold Fusion tools, poses a serious threat to the thousands of enterprises around the world that have the company's products installed on their computers. Adobe's Chief Security Officer Brad Arkin wrote a detailed blog post admitting the security breach last week, describing the attacks against Adobe's network as "sophisticated," adding that they involved "the illegal access of customer information, as well as source code for numerous Adobe products". As well as the source code, the credit card records of some 2.9 million customers... more »
NSA Has Had Little Success Cracking Tor

NSA Has Had Little Success Cracking Tor

The NSA works with elaborate methods to determine the identity of users of the Tor network that allows anonymous and unobserved web surfing communications. As per article published by The Guardian, a secret presentation shows NSA was able to achieve some success, but the security architecture of Tor (The Onion Router) itself does not overturn. The secret document in turn comes from PRISM whistleblower Edward Snowden and was recognized by the cryptographer and security expert Bruce Schneier. Tor is a well-designed and robust tool for anonymity, and it is very difficult to attack it successfully. NSA used different goals to crack... more »
No thumbnail available

Dell's Mojo is Back? Venue 11 Tablet vs. iPad, Surface + More

Many thought that Dell was done with the whole mobile sector after several failed attempts on both the Android and Windows Phone platforms.  But the market continues to trend towards mobile, and despite Dell's efforts in rebuilding its expertise in logistics around enterprise services, the famed PC maker remains interested in manufacturing mobile devices. Most recently, Dell launched four new tablets the Dell Venue 7, Venue 8, Venue 8 Pro, and the Venue 11 Pro.  The Dell Venue 7 and 8 are Android-based tablets while the 8 Pro and 11 Pro are Windows Pro-based. The tablets are looking fine and might help... more »
Splunk Conference DevOps Round Up: Transitioning Beyond Machine Log Data | #splunkconf

Splunk Conference DevOps Round Up: Transitioning Beyond Machine Log Data | #splunkconf

At its annual Worldwide Users’ Conference in Las Vegas last week, the machine data analytics company Splunk continues to enhance its flagship machine data search engine so it can be used by business analysts and managers. The company advanced its portfolio of products including a new version 6.0 of its enterprise edition cloud service and adding more business intelligence capabilities to its namesake engine Splunk Cloud service is now powered by Amazon Web services and includes access to Splunk Enterprise apps, APIs, alerting, and role-based access controls. With an enhanced user experience, simple management of enterprise deployments, and a rich developer... more »
The Saga of Silk Road’s Dead Pirate Roberts, Ross William Ulbricht

The Saga of Silk Road’s Dead Pirate Roberts, Ross William Ulbricht

The downfall of Silk Road and the capture of the alleged Dread Pirate Roberts has made digital newsreels and much digital ink has been spilled over the issue, and the saga is far from over. The presence and persistence of the Silk Road as a part of the dark web, hidden from prying eyes within the confines of the Tor network (a technology the NSA has complained about because they couldn’t easily break it) shows how successful the confluence of anonymity, security, and Bitcoin can be when put to use together. Recently, we even learned that the FBI has failed to... more »
Ninjas and Robots Invade Your Smart Home

Ninjas and Robots Invade Your Smart Home

This week’s SmartHome roundup features a ninja that controls your smart home, a robot that keeps it clean, and a cube that entertains your furry pals while you’re out. Ninja Blocks   Ninjas are famous for their stealth, so it’s fitting to have technology that monitors your home inconspicuously, even when you are away.  For $199 Ninja Blocks offers the Ninja Kit, which comes with one wireless motion sensor, one wireless door/window contact sensor, one wireless button that serves as a doorbell, one Wireless temperature and humidity sensor, the Ninja Block equipped with BeagleBone Linux computer with an Arduino, one Ethernet Cable, one Micro... more »
New Poll Reveals Browser Games Leads Console Games in Popularity

New Poll Reveals Browser Games Leads Console Games in Popularity

A new survey staged by Goo Technologies and conducted online within the United States by Harris Interactive suggests that browser games have aced out the console gaming market in the US. The findings of its 2013 State of Browser Gaming Index fielded among more than 2,000 Americans, aged 18 and older found that 52 percent gamer preferred browser games above any other type of game. Today, an increasing number of users are using mobile phones and tablets to play games. The survey found that 85 percent of Americans prefer mobile as there is no compromise on quality, speed or graphics and... more »
Google Plans To "Mug Off" Mugshot Websites

Google Plans To "Mug Off" Mugshot Websites

Few ex-offenders enjoy being reminded of the fact that they were once arrested and charged with a criminal offence, particularly when those people have since moved on to become hard working, honest members of society. The only problem is, even after their case has been resolved, it can be quite difficult to forget that uncomfortable memory – particularly when there are dozens of websites out there that make a habit of reposting people's mug shots in order to make a quick buck off of them. Some argue that such websites provide a good service to the public, allowing them to identify... more »
Bottlenose Launches Nerve Center to Help Enterprises Reveal Unknown Unknowns

Bottlenose Launches Nerve Center to Help Enterprises Reveal Unknown Unknowns

Analytics startup Bottlenose is taking trend intelligence to the next level with a new application for finding patterns in real time data. Dubbed Nerve Center, the tool is built atop Trendfluence, a social discovery platform that the company has been working to bring to the enterprise since closing its $3.6 million Series A funding round in August. Trendfluence utilizes multiple patent-pending technologies to process and visualize large volumes of streaming data, including social interactions and operational workloads. Nerve Center leverages this functionality to rank trends by business impact and help decision makers gain a better understanding of the various factors that... more »
Silk Road Seizure Recap + 2 Alternatives

Silk Road Seizure Recap + 2 Alternatives

When the FBI busted Silk Road founder and operator Ross William Ulbricht (aka Dread Pirate Roberts, aka DPR), they seized the site's assets. This “Amazon” of the underworld was a place where drugs, guns and other illegal items could be purchased, and where bitcoins gained wide-spread adoption.  As some would say, what better way to buy or sell something illegal, than a crypto-currency that the government cannot regulate, let alone understand yet? So upon the seizure, bitcoin currency was the largest item seized. Lets unwrap the criminal complaint filed against Ulbricht a bit. The FBI said that the Silk Road had total... more »

Premium Research

- David Vellante

Leading CIOs are changing the way they communicate to their boards about cyber security by emphasizing response, not infiltration. Rather than solely focusing on how to thwart penetration, CIOs are treating cyber security as an integral part of business/service continuity and risk management agendas, with a priority on rapidly responding to critical breaches. This research note is based on data gathered through proprietary social analytics, extensive collaboration with CIOs, CTOs, CISOs and business executives; and is designed to assist CIOs in advancing security agendas with boards of directors.

- David Vellante

In the spring of 2016 we began an initiative to organize a group of CxOs to discuss the issue of cyber security. One thing we’ve learned about the topic of security is it’s hard to fake. We’re not security technology experts. As such we decided to focus on business issues. We observed heightened activity around […]

- Peter Burris

Leading digital companies are using simple top-level frameworks for setting digitization priorities. At the center of the approaches we've seen are three questions: What do we want to do better; who are we going to engage; and how are we going to institute the digital capabilities.

- George Gilbert

Enterprises must navigate the universe of big data applications by recognizing that application platforms will alternately empower and constrain enterprises along a path of ever more sophisticated applications. Data lakes, intelligent systems of engagement, and self-tuning systems of intelligence all build on each other in terms of capabilities. But the underlying platforms will evolve in a cycle of simplicity, complexity from adaptive stretch, and simplicity again via a platform refresh.

- George Gilbert

Big data products and workloads remain too immature for standard benchmarks capable of providing truly comparable results. Users that need benchmarks for contracting or comparison purposes should run their own stylized workloads based on their intended usage scenarios.

- Ralph Finos

Users considering public cloud for business and IT workloads should evaluate the types of use cases and workloads that have wide successful deployment in the public cloud today. In order to help users to better understand the customers and workloads being served in the public cloud today, Wikibon examined the brief descriptions of approximately 650 customer solution stories on the Amazon Web Services (AWS) website and classified each according on a number of characteristics. This research reveals some interesting insights about the public cloud leader’s business, and therefore about public cloud utilization generally.

- David Floyer

The Wikibon premise in this research is that this converged environment is a win-win environment for both vendors, ISVs and enterprise IT. Testing of the converged system solution is more robust, and the reduction in the number of solution types significantly lowers testing and installation costs for the vendor. ISVs can lower the cost of deployment, deliver application value faster, and drive additional upgrade value much faster. Converged enterprise IT systems (private clouds) are more agile, more reliable, more secure and have the similar costs to public clouds.

- Brian Gracely

Wikibon looks at the emerging Cloud-native application architectures. This research focused on the scope of microservices, the domains of interaction between services, and how data services and sources are changing with these new applications.

- Brian Gracely

Faced with the choices of modernizing existing applications or starting new projects, IT organizations have many options. Wikibon looks at the vast number of options today, with a methodology to evaluate choice vs. risk.

- David Floyer

There are no enterprise organizations that have married the business, digital creativity and IT as seamlessly as Weta Digital.