Nemertes Research founder and CEO Johna Till Johnson said that IBM has "taken the plunge" into pervasive protection, something the company has been following for years. Pervasive protection is when cloud- and premise-based security is integrated "seamlessly" and includes a "full spectrum of protection, from applications to infrastructure, according to Johnson, who adds that the approach "should apply to all user devices and platforms, not just a subset." With its recent announcement of 11 new cloud-capable products, IBM is extending its security reach into access management, data security protection, visibility and analytics and security operations. Johnson points out that most of IBM's new offerings are most compatible with their own products, but certain services, such as Cloud Security Intelligence, integrate feeds from OpenStack, Salesforce.com and Amazon CloudTrail.
Read more about IBMs new pervasive protection product offerings.
Watch out for POODLE hijacking while using open Wi-Fi hotspots
Airwise Community blogger Lisa Phifer says that hijacking threats from Padding Oracle on Downgraded Legacy Encryption (POODLE) should be enough to get software vendors to stop using secure socket layer version 3.0. These attacks require third-party access to traffic between the server and the browser. The main way users can avoid POODLE attacks is to avoid using open Wi-Fi hotspots. Another alternative is to connect to the Internet over a virtual private network. This kind of "bring your own encryption" sends all of your traffic through another tunnel of security protection, which can decrease the event of an attack. For companies that host open Wi-Fi hotspots, Phifer recommends some kind of intrusion protection service to monitor activity that could indicate a POODLE attack.
Learn more from Phifer about how to spot a POODLE attack.
Hitachi focuses technology on cultural impact
Enterprise Strategy Group analyst Nik Rouda reflects on Hitachi's Innovation Forum in Tokyo, arguing that he doesn't think there is any other company, from start-up to enterprise level, that has the same focus that Hitachi has in measuring the impact that technology can have on cultural change. Rouda says that Hitachi is not focusing on putting out the best products first, but creating tools that can be used to enhance industries like construction, healthcare and transportation. Rouda points to the vertically integrated infrastructure of the Hitachi Advanced Data Binder (HABD) and Hitachi Advanced Data Integration (HADI) as examples of how the company is creating products to impact different industries. " With the emphasis on solutions for tackling worldwide problems of scarce resources, climate change, and population demographic shifts now more tightly combined with both industry and technology capabilities, Hitachi is uniquely poised to make an impact that is both cutting edge and designed to have an impact for generations to come," wrote Rouda.
Read more of why Rouda thinks Hitachi is revolutionizing the way we use technology.
Tips for how to make it as a new networking professional
PacketPushers blogger Keith Tokash gives five helpful tips to new networking professionals. He says it isn't anyone's fault, but there are some things they don't teach you in school. First of all, he says it is important to have a firm understanding of what a protocol is. "I believe it's important enough to club it into someone's head, as opposed to presenting it like one of 47 facts they need to get through before lunch," wrote Tokash. Moreover, he wrote that it's important to realize how an interface transmits information and how a protocol can be related to this process. While some of his advice comes from epiphanies he had early on in his career, he emphasizes that if new networkers can make it through the first few months of training at a new job, they will be fine.
Read the rest of Tokash's helpful tips to the new networking geek.