DiarioTi.com - el diario del profesional TI

Miércoles 28 Jun 2017 | Año 14 | Edición 4611
Menu
letter
    Alan Zeichick

    Cybercriminals want your credentials and your employees’ credentials. When those hackers succeed in stealing that information, it can be bad for individuals – and even worse for corporations and other organizations. This is a scourge that’s bad, and it will remain bad.

    Alan Zeichick OPINION

    Opinion: Not that long ago, hackers emerged as modern-day Robin Hoods, digital heroes who relentlessly uncovered weaknesses in applications and networks to reveal the dangers of using technology carelessly. They are curious, provocative; love to know how things work and how they can be improved. Today, however, there is blight on their good name.

    Hamilton-Mcclure-Fitzgerald OPINION

    Opinion: Signature databases, distributed by antivirus/malware researchers and companies, are an imperfect method for several reasons. As the number of malware variants increase, so do the number of signatures – and this takes more time to process. Also, signatures are of limited use against zero-day attacks that nobody has seen before.

    NetEvents video

    Remember proprietary networks – where you were expected to buy everything from a single provider (and its certified partners)? Those were the good old days for those proprietary vendors’ shareholders and investors, but they were a nightmare for customers who wanted to be free to choose the best solutions, embrace cutting-edge innovation, mix-and-match different capabilities and price points, and avoid the dreaded vendor lock-in. The good news is that proprietary networks are dead, dead, dead.