Posts

Showing posts from January, 2019

Need An HR Solution That Works? Get HR-in-a-Box!

Image
HRToolkit helps you with an easy-to-implement HR solution for your business at an affordable price. This product is easy to use for any start-up or small business and consists of a set of ready-to-use HR policies, templates and documents. The solution is cost-effective and assists you in setting up employment relations correctly.  Procedurally incorrect or substantively unfair dismissals are costly if they are referred to the CCMA or Labour Court. Minimise that risk with HRToolKit, which contains everything you need to handle employee changes effectively and in a legally compliant way.
As a business owner, you will reap the rewards by knowing your HR system is in place.  Download the toolkit here.


Tickets Make Operations Unnecessarily Miserable

Image
In search of improvement, we have repeatedly bet on new tools to improve our work. We’ve cycled through new platforms (e.g., Virtualization, Cloud, Docker, Kubernetes) and new automation (e.g., Puppet, Chef, Ansible). While each comes with its own merits, has the stress and overload on operations fundamentally changed? Enterprises have also spent the past two decades liberally applying Management frameworks like ITIL and COBIT. Would an average operations engineer say things have gotten better or worse? In the midst of all of this, there is conventional wisdom that rarely gets questioned.
Read the blog post over at RUNDECK here.

Containers are Key to Multi-Cloud

Image
You may recall a post from early 2017 in which I mentioned that containers were tired of being typecast. It was January, to be exact. Which means containers are no longer tired of being typecast, they are downright exhausted with it.  The proof of their weariness can be seen in a recent Portworx survey on container adoption. Significant gains in both container adoption - up to 82% - and use of containers in production - now at 83% - were reported.  But that's no surprise. Container adoption has been a steady course to consume budget for a couple years now. What may be a surprise is the reasons behind that adoption. Spoiler alert: it isn't really about microservices. 
Readthe blog post at f5 over here.


Phishing is the #1 Attack Method

Image
Phishing is the primary method of entry in 90% of cyber-attacks world-wide and many high-profile breaches emanate from a single, successful phish.  Since it typically takes more than 200 days to detect a breach, global organizations need to focus their efforts on prevention and response to neutralize these highly successful attack methods.

Carbon Black Enterprise Response

Image
Carbon Black Enterprise Response is the most complete endpoint detection and response solution available to security teams who want a single platform for hunting threats, disrupting adversary behavior and changing the economics of security operations. Only Cb Enterprise Response is the #1 EDR solution among global enterprises and 70+ of the world‰Ûªs leading IR and MSSP firms.

Eish! Angelo by the Brotherhood of scoundrels

Image
A rip of Brotherhood of man, that ripped ABBA

Long ago,
High on a mountain in Gauteng
Lived a young crooked boy, Angelo
Who met a young Watson and he loved him so
Rich was he,
Came from a very high family,
Angelo knew it could never be,
They ran away to their destiny
Running away together
Running away forever
Angelo
Running away from danger
Hiding from every prosecution
Angelo
They knew it was wrong
They found a greed so strong
They took their bribes at night
And in the morning light
They found them in the vault
They saw them lying there, hand-in-hand
Long ago,
High on a mountain in Gauteng
Lived a young crooked boy, Angelo
Who met a young Watson and he loved him so
Running away together,
Running away forever,
Angelo
Running away from danger,
Hiding from every prosecution,
Angelo
They knew it was wrong
They found…



Attivo Networks + Demisto = Faster Incident Response

Image
As attackers continue to become more sophisticated, security defenses need to improve to keep pace.  Deception technology has become an important part of the security stack, as an unconventional approach that entices attackers into revealing themselves and provides unique advantages that conventional defenses can’t match.
Read the blog post over at Attivo over here.


SD-WAN Beyond The Hype

Image
There’s no doubt that Software-Defined Wide Area Networking is one of the most hyped technologies we’ve seen recent history. From cost savings to unprecedented simplicity, no claim seemed to be off limits when it came to controller driven networks. Now that’s it’s 2019 and some of the dust is settling we wanted to have a chat with a couple of engineers who have been in the thick of it and know what it’s really like to design, implement, and operate Software-Defined WANs.
Listen to podcast over at Network Collective here.


Tiny Chips Can Hack Big – How Mellanox NICs and SmartNICs Can Help Secure Your Data Center

Image
Cyberattacks are gaining in complexity and sophistication. Recent attacks such as Throwhammer, Nethammer, NetSpectre, Faxploit, and Malware Guard Extension attest to the increasingly complex methods devised by hackers to take control over remote networks and to spread malware.  Today’s cyber reality surpasses by far the fertile imagination of Hollywood cyber fiction films.  Another hacking invention was recently exposed in Bloomberg Businessweek’s “Big Hack” news story (published on October 2018), which described how a maliciously planted tiny chip on a server board can pose serious security risks to organizations. The information revealed in that story has managed to disturb the waters in the tech and security industries and communities, as it described alleged infiltrations of data centers of some major corporate and governmental organizations.
Read the article over at Mellanox here.


Cost of downtime is a personal question

Image
Everyone has one, but it’s still not an easy subject for most people. We’re talking about the cost of downtime in their network. It’s not an easy calculation if you want to be accurate, but one would be hard pressed to find anyone that says network downtime today is LESS expensive than in the past.
Read the blog post over at Uplogix over here.


O2 Outage: How to Prevent This in the Future

Image
Back in December, O2, the Telefonica operating company in the United Kingdom, had a massive outage. According to O2, about 25 million subscribers were affected by a small software issue. The company will need to reimburse customers for the outage, which lasted an entire day. An article in The Independent states, O2 announced “Pay monthly customers will be given two free days on their contract. And pay as you go customers will get 10 percent of their credit for free.”
Read the blog post over at SevOne here.


How an Office 365 Email Hack Cost Millions (and How You Can Avoid the Same Fate)

Image
Imagine you’ve just made a million-dollar investment in your business. You’ve done your research and are convinced this is the right investment to take your business to the next level. Yet something is bothering you about your last few emails. Why did the investment company change the banking details at the last minute? And why have some of the key people in the deal not weighed in on those changes?  It’s a lot of money, and you lose a night’s sleep over this.
Read the post over at IMP Solutions over here.


How SD-WAN can improve your security strategy

Image
SD-WAN introduces new security options, not previously available with legacy networking technologies, that make it easier to manage and secure network traffic.
Read the article over at Network World here

Hidden Inbox Rules in Microsoft Exchange

Image
In recent investigations, Compass recognized a raise in popularity for attackers to compromise Microsoft Exchange credentials. As one of the first steps after having obtained the credentials (most commonly through phishing), attackers created malicious inbox rules to copy in- and outgoing emails of their victim. The attacker’s goal hereby was to guarantee access to emails even after the compromised credentials were changed.
Read the article over at Compass security here.


How Hackers Are Capitalizing on Direct Deposit Accounts

Image
Direct deposit is a common practice in today’s world, and it’s how the majority of Americans prefer to be paid for their work. The National Federation of Independent Business (NFIB) estimates that nearly 60% of all employees use direct deposit to receive their pay check. On top of that, more than 90 percent of social security checks are paid via direct deposit. Unfortunately, hackers have begun figuring out how to use direct deposit to their advantage, by breaking into people’s accounts and steal money. 
Read the article over at psafe here.


Hepic Voice Monitoring Change the way you Analyze RTC and Debug VoIP Services

Image
PacketSky is the African region agent and support centre of Hepic. Hepic is a Real-Time, modular, end-to-end Capture, Monitoring and Troubleshooting framework for IP based Voice, Video and RTC Services and UC Networks, strategically supported with native agent integration in leading Open-Source telephony platforms and vendor-agnostic software probes designed to grow, scale and evolve alongside constantly evolving Services and Networks.

Find out more about the product here.



Do frog croaks hold the key to creating the perfect IoT network?

Image
Studying how tree frogs regulate their communications, so each amphibian in the colony can hear everything, could provide ideal data traffic routings, scientists say.
Read the article over at Network World here.


Networking Ack

Image

Song For The Lonely - Cher

Image
This is a song for the lonely, can you hear me tonight?
For the broken hearted, battle scarred 
I'll be by your side 
And this is a song for the lonely 
When your dreams won't come true 
Can you hear this prayer 
Because someone's there for you


5 services used by restaurants that require 100% uptime

Image
The restaurant sector is quickly becoming reliant on Internet connectivity for many of its day-to-day functions. Having an always-on Internet is now critical for many restaurants. Read the article over at Multapplied here

Software-Defined WAN For Dummies

Image
This easy-to-read book gives you jargon-free best practices for Software-Defined Wide Area Networking. Includes a special foreword by Lee Doyle, Doyle Research. Co-authored by Dan Pitt, Open Networking Foundation.
Download the eBook and learn:
The need for SD-WAN adoption for branch networkingBenefits of migrating to a SD-WAN solutionTop 10 considerations for SD-WAN deployment

How to Protect Your Home Router from Attacks

Image
A comprehensive guide for choosing and setting up secure Wi-Fi.
Read the article over at Motherboard here

DNA 1120

Image
Desktop Intel® Atom™ D525 Dual Core/ D425 Single Core 1.8 GHz Processor with 4 PCIe GbE LAN Feature Desktop Network PlatformIntel® Atom™ D525 Dual Core/D425 Single Core 1.8GHz ProcessorSupport DDR3 800 Memory up to 2GB4 x GbE LAN PortsSupport LAN BypassOne PCI ExpansionOn-board CF SocketInternal one 2.5" HDD Bay Find out more about the product here.


Network appliances from Armortec

Image
The NC-4010, powered by the Celeron J1900 (Codenamed Bay Trail)processor, is a desktop form factor network appliance designed for entry-level network security, gateway or vCPE.
View these and other network appliances over at Armortec here.


The internet's 'father' says it was born with two big flaws

Image
Vint Cerf, one of the "fathers" of the internet, says the network had two big flaws when it launched
Vint Cerf, one of the creators of the internet, said the network had two big flaws when he launched it. The internet didn't have room for all the devices that would eventually be connected to it, said Cerf, now Google's chief internet evangelist. It also didn't have any built-in security protocols. Even though both shortcomings proved problematic, Cerf's not certain he would have fixed them if he had to do it all over again.  Read the article over at Business Insider here.


6-Port Gigabit VPN Router

Image
The ER-6 business router provides enterprise-level, highly secure and reliable connectivity to the Internet for small and medium branches. Supports one-click flow control and manual flow control. Professional gateway device based on DPI seven-layer flow control. Built-in high-performance processor suitable for deployment of large-scale commercial scenarios.
Find out more about the product over at FS here.


20 physical traits you may have inherited from a Neanderthal

Image
This legacy was picked up from 60 – 80,000 years ago, when successive waves of modern humans began migrating from Africa into Asia and Europe, encountering and interbreeding with their Neanderthal cousins who had evolved there from around 250,000 years ago.  Their hybrid children bore genes from both lineages, but eventually modern human genes diluted Neanderthal genes to the extent that the species seemed to disappear from the archaeological record around 30,000 years ago. Those Neanderthal genetic mutations which were not beneficial to modern humans were  partially swept out by natural selection over time.  The remnants are alive in the genomes of Europeans and Asians today.  If you exhibit any of the following traits, they may just be an echo of your inner Neanderthal:
Read the article over at Aboard in the Yard over here.