Actions on Google starten in Deutschland

Actions on Google starten in Deutschland

Google Assistant

Actions on Google starten in Deutschland

Zusammen mit acht Partnern launcht Google die neuen "Actions on Google" für seinen digitalen Assistenten. Ein weiterer Schritt, der zeigt: Sprachsteuerung wird den E-Commerce verändern.

Security News

via com! professional

October 24, 2017 at 09:43AM

IDG Contributor Network: Measuring cyber resilience – a rising tide raises all ships

IDG Contributor Network: Measuring cyber resilience – a rising tide raises all ships

I admit it … I am one of the 143,000,000 people afflicted by the Equifax breach. For those of us who reside in the U.S., that number approaches 60% of all adults, based on recent numbers from the U.S. Census Bureau. Perhaps most unsettling is that failing to perform something as routine as a timely patch produced an event so catastrophic that it cost the CISO, CIO and CEO their jobs. Make no mistake about it, accountability for cyber resilience is in the boardroom and rests heavy on the shoulders of those in the C-suite. This is accentuated by the data from a recently completed study by ISACA and MIT which overwhelmingly confirmed that CEOs and boards are leading enterprise digital technology initiatives.

Strong oversight of cybersecurity is now a critical component of organizations’ overall governance of their information and technology, and on that front, there remains some steep hills to climb. ISACA’s new Better Tech Governance is Better for Businessresearch shows that only a little more than half of senior business leaders think their organization’s leadership team and board are doing all that they can to safeguard the organization’s digital assets, and less than half of boards intend to fund a significant expansion of their cyber defenses in the coming year, despite expanding attack surfaces and daily changes to the threat landscape.

There is much in the media and literature today calling for increasing technology competency in directors and senior executive leaders to achieve better oversight of what’s happening in the enterprise operations. There are also repeated calls for boards and the C-suite to further invest in cybersecurity and risk management, not only as a path to averting disaster, but as an enabler of the innovation required to thrive within a rapidly changing and increasingly complex technology landscape and regulatory and compliance environment.

[ Read reviews of today’s top security tools and bookmark CSO’s daily dashboard for the latest advisories and headlines. | Sign up for CSO newsletters. ]

The answer seems simple enough: recruit some new subject matter experts who can ask the right questions to serve on the board. While this is a good start, there’s still something missing— the fundamental ability to qualitatively and quantitatively measure the capabilities of an enterprise, allowing the enterprise to build its cyber resilience.

How to raise all ships

A CISO for a leading global payment company recently shared with me his story of being asked by a director on the company’s Board, “Are we safe?” His response was, “I think so,” to which, the director retorted, “What do you mean you think so?” The story was instructional for me, confirming the need for ISACA and our CMMI Institute subsidiary to work with industry leaders on the development of a risk-based, enterprise-wide self-assessment that presents a holistic view of an organization’s established capabilities to protect and defend itself from cybersecurity attacks. Upon completion of the assessment, a report indicating the current state of the enterprise, including views on how the organization compares to other organizations of similar size, geographic location or industry, will be provided.  Assessment outcomes can be used by boards and senior executives to understand the current state, along with a roadmap to improved cyber resilience that can serve as the basis for further risk management-based and business-focused investments. CISOs and board members won’t need to think their organization is safe; they will know it is.

With industry and government support, along with stakeholders in our professional community, this assessment can evolve into a community accepted “universal consensus model” to measure progress in our respective industry sectors. Without such a tool, organizations, many of which are struggling to find tech-savvy board members, will continue to operate with incomplete or misleading information to decide how to invest in the equipment, training and personnel required to build and maintain effective security programs.

The pressure on today’s executives when it comes to reliable cybersecurity and risk management is significant. The job of leading and managing these critical enterprise concerns is anything but easy. The days of cybersecurity being treated as a technology concern have passed us by. Cybersecurity is now and will remain a strategic business risk that, if properly managed, can fortify an enterprise to effectively and securely innovate. Perhaps the timing is now right for this new ability to measure cyber resilience, thereby creating the rising tide that will raise all ships.

This article is published as part of the IDG Contributor Network. Want to Join?

Security News

via CSO Online

October 24, 2017 at 09:36AM

Industrial internet of things set to revolutionize the manufacturing industry –

Industrial internet of things set to revolutionize the manufacturing industry –

Industrial internet of things set to revolutionize the manufacturing industry By Kalyan Sridhar, Country Manager, PTC India

The word

Internet of Things (IoT)

has sparked many conversations in the recent past and the world has been gradually gearing up to embrace it. The IoT is bound to have a significant impact on our daily life, where everything from household chores to business decisions are made at the touch of a button. Industrial Internet of Things (IIoT) is a subset of the IoT concept – focused towards manufacturing sector.

IIoT has the potential to increase output and amplify productivity and therefore is set to herald in the next industrial revolution. The


has managed to make an impact due to the changing dynamics of the connected customer. This behavioral shift has been noted across industries and hence the implementation of IIoT has not restricted itself to core technology companies but has touched all industries from Agriculture to Retail.

Of all this, the Manufacturing Industry has experienced the biggest impact of IIoT. In fact, Manufacturing has made the largest IoT investments in 2016, according to a recent


report, spending $178 billion total. IIoT is able to permeate into the manufacturing industry so rapidly because the products, markets, and processes have a high inclination to adopt it easily and show maximum results. Also, the number of devices and applications to be connected is also high.

The investments in the space, largely fall under two categories: Inward facing and outward facing. Investment in IIoT utilized to optimize processes, monitor equipment, and do preventative and predictive maintenance on that equipment, is considered inward facing. According to IDC, Manufacturing operations was the IoT use case that saw the largest investment in 2016 across all industries, at $102.5 billion. With outward-facing investments, though the customer is not directly involved, the company uses IoT devices to collect sample data on product usage. Through analytics, the business can understand trends and insights on the product, improvements that can be incorporated and even detect manufacturing defects at an early stage.

While the possibilities of IIoT are apparent to the industry, the execution seems to deter some companies. Organizations understand that without the implementation of IIoT they will lose a competitive edge, however, they are still grappling at the ropes. It is perceived to be a challenge as it doesn’t just mean deploying new technology but also developing a new operational blueprint for the business.

The two biggest concerns related to IIoT are interoperability and security. Legacy systems use different protocols and have a different architecture which doesn’t allow for easy interoperability. Machines that have been in place are expected to last till they die of fatigue, as opposed to being replaced with the next update. Companies need to relook at the capital purchases and ensure that they are future ready.

There have been several Manufacturing companies who have overcome these challenges and have implemented IIoT in big ways to be prepared for tomorrow’s industrial landscape. Hirotec America Inc, a tier-one automotive supplier lacked condition-based monitoring capabilities on their factory equipment. They had a reactive maintenance strategy and with little-advanced warning, there was tremendous pressure on correcting problems quickly causing delays to production. Given the scalability and flexibility required for the IoT solution, PTC Inc.’s ThingWorx IoT platform and Kepware industrial data collection solution fit the bill, delivering enterprise-wide device-to-cloud connectivity along with data management, visualization, and analysis functionality through a single toolset.

ThingWorx provided the platform and the Kepware gateway brought a way for shop floor devices to see the cloud connection as a RESTful web server. Since implementation, the ThingWorx IoT platform and the Kepware IoT Gateway, HIROTEC has gained increased visibility into its CNC shop and deeper insights into its operations, allowing for greater accuracy in the scheduling process and a better handle on asset and resource allocation. With remote monitoring and a centralized dashboard, they were able to decrease decision-making time and increase output.

Industrial Internet of Things has gone beyond just being a buzzword to become the business strategy of the manufacturing industry. Firstly, companies should view IIoT with a holistic approach and not in silos of their processes. During implementation, change management should be handled delicately, but it shouldn’t affect the pace at which IIoT is being enabled in the organization.

Finally, customer centricity should not be lost in the scramble to not miss out on the IIoT race. The choice to implement IIoT is not a tough one to make, however, understanding that this will cause a major disruption in the business, and adapt to it, is the first step to harnessing the potential of IIoT.

DISCLAIMER: The views expressed are solely of the author and does not necessarily subscribe to it. shall not be responsible for any damage caused to any person/organisation directly or indirectly.

Security News,IoT News

via IoT – Google News

October 24, 2017 at 09:32AM

How to prevent data loss with Windows Information Protection

How to prevent data loss with Windows Information Protection

Information that belongs to someone and has the potential to be very impactful to that person or organization needs to be protected in this day and age. Finding that information in the wrong hands can have severe negative implications and consequences. You need look no further than recent headlines to see the devastating consequences that information leakage can have, from Edward Snowden and the NSA to John Podesta and the Democratic National Committee.

Shops that primarily use Windows on the client side have a ready-made answer: Windows Information Protection (WIP) is a data loss prevention technology that looks for information classified as impactful to a business as well as for keywords that indicate sensitive information is potentially being passed outside the corporate security boundary. It then creates a plan to stop or mitigate that leakage.

[ Learn how to harden Windows 10 for maximum security. | Get the latest from CSO by signing up for our newsletters. ]

Consider WIP for the following scenarios:

  • You need to protect work-related information on both company- and employee-owned devices, such as their smartphone or tablet allowed to connect to your resources through a “bring your own device” (BYOD) program.
  • You use business applications that do not have data loss protection capabilities built-in and need an extra layer or two of leak protection.
  • You need a protection scheme that integrates with System Center or Microsoft’s Intune cloud-based device management platform. 

I’ll walk you through what WIP is and how to get started. One huge caveat: This is a Windows 10 technology. To bake WIP into your organization fully, you’ll need to complete your inevitable migration off Windows 7 and Windows 9.1.

How Windows Information Protection works

WIP starts working when new documents, spreadsheets, or other files are created on a protected device. Employees can be presented with a choice to save that file as a “work document,” enabling all the protections that come with WIP. That work document is considered enterprise data, even if it is stored local to the protected device or added to removable media like an SD card or a USB stick. All work files stored on the device or on removable media are encrypted at rest.

That protection is not limited to new content. When an employee visits a network share on a protected device or downloads content from a SharePoint document library or a corporate intranet set, WIP locks that data down via encryption and enforces policies on it. WIP also puts up fences around data accessed via applications on a protected device. Administrators can bless certain apps and allow them to work with “work data” and have that data copied and pasted between blessed applications. On the flip side, applications can also be blocked, so that protected work data cannot be moved into blocked applications (think Gmail, Secret, or anything else) on a device with WIP enforced.

By default, these app restrictions are enforced like a whitelist, with everything blocked and individual apps needing to be manually—read intentionally—added to the whitelist to be granted access to work data. Some applications, particularly Microsoft Office, are aware of WIP and can protect data even when employees copy data from a protected file, paste it into a new document, and attempt to save it as a new document. WIP will notice this and automatically encrypt the new file. Apps that understand WIP are known as “enlightened apps,” and in Windows 10 app developers can choose to create WIP-aware apps that inherit this functionality automatically without additional code.

WIP also supports different levels of protection. Sometimes you want to give employees discretion over whether to override WIP’s protections, or perhaps you want to be in audit-only mode so you can simply take the temperature of the organization’s actions to understand how data moves about. When the fecal matter hits the rotating air movement device, you can remotely wipe the protected enterprise data off any enrolled computer, even employee-owned devices, without blowing away the non-enterprise data.

All of this happens by virtue of the WIP policy, the cornerstone of WIP’s protection engine. The WIP policy is applied to devices and contains instructions to encrypt data from an enterprise source or marked as work related using the Encrypted File System (EFS) feature that comes with all recent Windows client operating systems. The policy also contains the whitelist of apps that are allowed to use and work with protected data, based on the AppLocker feature.

You then set up your WIP policy to one of four modes:

  • Block—WIP pays attention to what the user is doing with enterprise protected content. If it detects a potentially compromising action, it will simply block the user from completing the task. This largely consists of restricting cut-and-paste actions between protected and non-protected applications and sending protected data outside of the corporate network.
  • Override—You can choose to have WIP looking over the shoulder of your employee like it would in Block mode. Instead of simply cutting off the action, it can prompt the user so that he or she can make an informed decision about whether to continue with the action. If the user chooses to override the WIP warning, the action is logged so the administrator can audit and review later.
  • Silent—WIP will monitors the system, but simply logs everything it sees as potentially compromising without alerting the user or preventing any actions (except for obvious things like trying to access a protected file for which the user doesn’t have access rights). Most administrators would choose this mode to establish a baseline to understand how data moves in their network before using a more stringent mode.
  • Off—This disables WIP. If WIP was enabled before, Windows attempts once to decrypt protected files on devices. If you later decide to reenable WIP, you will need to reapply protection to files as this information is not retained between policy applications.

How to apply Windows Information Protection policies

You have two ways to apply and later manage WIP on your Windows 10 client devices: through Microsoft Intune, a subscription based management service that is basically System Center in the cloud, or through your existing deployment of System Center Configuration Manager (SCCM).

Using Microsoft Intune

To use Intune, open your browser and go to the Intune console. Expand the Policy node, and then from the Tasks area, click “Add Policy.” From the Windows section of the list on the “Select a template for the new policy” screen, select “Windows Information Protection (Windows 10 Desktop and Mobile and later).” Then click the “Create and Deploy a Custom Policy” radio button to the right, and next click the “Create Policy” button. On the next screen, type a name and a description for the policy.

Now it’s time to add app rules, which can include either Windows Store apps—these used to be called Modern apps or Windows 10 apps—or regular Win32-style desktop apps. I’ll focus on the desktop apps using the venerable Microsoft Excel. Click the “Add” button in the center of the screen, and in the “Add App Rule box,” enter a friendly name for the app. Choose the Windows Information Protection mode you wish to use (“Allow” in this case), choose “Desktop App” from the “Rule template” list, and then check the box net to “Binary name” and enter EXCEL.EXE.

Here is a handy tip: if you wish to filter on some of the other options including publisher, product name, and file version, you can use the following PowerShell command on a Windows 10 machine to get this information:

–Path “c:\path_to_binary\binary.exe”

That will return the information you seek, which you can then copy and paste into the Intune screen.

After you have added the apps that should be affected by your policy, you need to choose what Intune calls the “paste/drop/share restriction mode,” which is one of the four options: block, override, silent, or off.

You will then need to define your corporate identity, which is a list of domains your enterprise content lives on so WIP has some basis to identify work-related items. This list should include all domains for which your company receives e-mail. You can enter multiple domains in the “Corporate identity” field using the “|” character, as in|

Next, set up the list of allowed network locations from which apps handling protected data get work data. This is basically a list of network locations that protected data can be written to and retrieved from, so your enterprise’s IP range is a good place to start. You can fine-tune the list as you go further in your deployment. You can also upload a data recovery agent (DRA) certificate that you get when you enable the Windows EFS feature, which will help Intune recover encrypted data if the key is lost.

Leave the optional settings as they are with their defaults for now and click Save. Voila, your policy is in place. You then use Intune’s policy node to add this policy to a list of deployment groups, and the policy is subsequently distributed to them.

Using System Center Configuration Manager (SCCM)

To use SCCM to deploy WIP, you need to create your policies using version 1606 or later, and if you have any older WIP policies you created in older versions of SCCM, you will need to delete and recreate them.

From the SCCM console, under “Assets and Compliance,” navigate through “Overview”/”Compliance Settings”/”Configuration Items.” Click the “Create Configuration” Item button. When the wizard starts, enter a friendly name and description and then specify Windows 10 as the supported platform for this particular item. On the “Select the device setting groups to configure” screen, check “Windows Information Protection.” Then you can add app rules similarly to how you work with Intune app rules.

Next, choose the paste/drop/share restriction mode, define the identity domains, choose the enterprise network locations where protected data lives, choose optional settings and the optional DRA certificate upload, and then review the settings and click “Continue.” Depending on how your SCCM deployment policies are set up, use one of the compliance settings or configuration baselines to push this policy out to SCCM-managed devices.

The last word

Various information rights management programs and data loss protection schemes are available, but there has not been information protection built into an operating system like WIP is in Windows 10 client before now. With Windows 7 approaching its ninth birthday and Windows 10 rapidly maturing into a reasonably stable landing spot for many organizations, WIP is worth a look, and pairing it with Microsoft Intune is an inexpensive way to get started.

More on Windows security

Security News

via CSO Online

October 24, 2017 at 09:29AM

Das steckt hinter Programmatic Advertising

Das steckt hinter Programmatic Advertising

Werbung automatisiert auf allen Kanälen

Das steckt hinter Programmatic Advertising

Die datengetriebene Kampagnen-Automatisierung gewinnt deutlich an Akzeptanz. com! professional zeigt das Grundkonzept von Programmatic Advertising und beleuchtet die Vor- und Nachteile.

Security News

via com! professional

October 24, 2017 at 09:12AM

Data management woes? How AI and machine learning may solve one of IT’s biggest problems

Data management woes? How AI and machine learning may solve one of IT’s biggest problems

Statistics released by Cisco show that global Internet traffic is going to hit 3.3 zettabytes per year by 2021. (How big is a zettabyte? It’s this big.) This is no doubt a staggering number, but it makes sense considering how much data companies are currently storing. For that reason, effective data management is a must. However, most companies are unable to overcome key data management challenges, such as data retention, dark data, access, and data integration. To rectify this situation, companies require help, and this help is available in the form of machine learning and artificial intelligence.

But first, we need to look at the data management problems encountered by IT departments. For starters, companies are ill-equipped to handle the vast amounts of unstructured data that comes their way daily. In the end, they simply staff the data somewhere, which is not only reckless but unethical as well. Moreover, the individuals in charge of business decisions prefer not to discard data. The lack of attention on data retention policies is another problematic aspect.

Data Management

Every business wants rapid data access, but considering the cost of high speed storage in the cloud or on-premises, companies choose to archive a chunk of their data using cheaper, slower means of storage. As a result, when serious issues occur, the company has to assign staff members to handle the projects, which detracts from core business goals.

Role of machine learning and AI in data management

Unstructured data is a major reason why data management presents such difficulties for businesses. However, artificial intelligence, analytics, and machine learning can help overcome this problem.

Sort through data quickly

A company accumulates huge quantities of dark data, a lot of which people are entirely unaware of. However, AI and analytics can use machine learning to mine data more easily. Together, these systems can harness the power of algorithms to sort through various types of documents, emails, images, videos, etc. — all of which are stored on the servers. All that’s left to do then is for an expert to review the data classification recommendations of the automated process, tweak it if necessary, and implement it into the business. A significant portion of this process also deals with the problem of data retention. The analytics help produce a series of recommendations that allow data to be purged from files.

Identifying disposable data

Data Management

Analytics, AI, and machine learning are able to identify data that is rarely or never used in an objective manner. However, the technology is not as discerning as the employees of a company. For example, it is possible for these processes to identify which records or data have not been accessed in the past five years. This way, they enable you to root out data that might technically be obsolete. How does this help the company? Well, it saves employees the hassle of hunting down such potentially obsolete data; they can rely on the process to get the job done instead. But they still have to decide whether there is any reason to retain this data.

Efficient grouping of data

Analytics developers are often tasked with the responsibility of determining what sort of data they need to collect for queries. However, more often than not during this process, they tend to create a repository for this kind of application. They then put the repository to good use by drawing in different sorts of data from diverse sources, thereby producing what is known as an analytics data pool. But before they can complete this step, they are required to come up with integration strategies so they can access the various sources from which they draw data. While it’s true that this is still a highly manual procedure, machine learning can increase its efficiency through the automatic development of “mappings” between the data repository of the application and the data sources. What this does is decrease the integration as well as aggregation times significantly.

Assistance with data storage organization for improved access

Data Management

In the course of the last five years, a lot of data storage service vendors have made considerable leeway into the process of automating storage management. All this has been made possible by the advancement and widespread usage of solid state storage technology at reduced prices. Owing to this, IT teams no longer have to think twice about employing some sort of “smart” storage engine. This sort of technology is quite effective because it makes use of machine learning to understand commonly used data. It also helps businesses figure out which data is rarely or never used. The process of automation comes in handy here, because it can be used for automatically storing data in slow or fast storage, depending upon the business rules established by the machine’s algorithms. This level of automation is helpful for storage managers because it helps them overcome the trouble of manual optimization of storage.

There is no getting around the fact that the process of data management — no matter how easy it seems — can pose a problem for IT departments if not handled correctly. The worst part is that the situation is only going downhill from here as more data continues to stream in on a daily basis. So, any options for resolution become bleaker with each passing day.

Communicate the problem — and the solutions

It is essential that data architects, CIOs, and those responsible for storage management understand and present the gravity of the situation to the C-level “chiefs,” typically the chief executive officer, chief operations officer, and chief financial officer. But due to the complications associated with data management projects, they are not really an easy idea to sell to the higher-ups. Still, by indicating the importance of quicker times for marketing analytics as well as the projected storage cost reductions, IT managers have a shot at getting their points across in C-level discussions regarding ways to improve strategic ability.

The post Data management woes? How AI and machine learning may solve one of IT’s biggest problems appeared first on TechGenix.

Security News

via Comments on:

October 24, 2017 at 09:12AM

Fortinet Named to Inaugural Fortune Future 50 List

Fortinet Named to Inaugural Fortune Future 50 List

Fortinet has been listed in the inaugural Fortune Future 50 list, a new ranking of elite companies best positioned for breakout growth. Produced in partnership with BCG, the rankings were determined based on the analysis of 15 years of financial results from 2,300 publicly traded U.S. companies as well as over 70,000 10-K reports. This analysis was conducted using an advanced AI algorithm designed to assess an organization’s long-term orientation, their emphasis on things such as adaptation and sustainability, their market potential combined…

Security News

via Fortinet Blog | Latest Posts

October 24, 2017 at 09:09AM

BrandPost: Migrating to the Cloud Without an All-at-Once or All-or-Nothing Approach

BrandPost: Migrating to the Cloud Without an All-at-Once or All-or-Nothing Approach

In May, the President signed an Executive Order aimed at enhancing cybersecurity at Federal government agencies.  Of its handful of mandates, migration of computing resources to the cloud is likely to have the most sweeping Federal impact. While Federal agencies are feeling the pressure to accelerate their plans to shift to the cloud, they understand that they need to do so with minimal disruption. In a recent study conducted by MeriTalk and Fortinet, 70 percent of Federal IT decision makers believe that the majority of Federal agencies will rely on hybrid cloud environments to power core applications over the next decade. 

Cloud Migration a Challenge to Many

The number one challenge identified by Federal agencies in migrating to the cloud is expanding security measures and policies to cover cloud environments. To date, confidence is hard to find. Only 35% of Federal IT leaders believe that the security of their existing private cloud environments is excellent, and this drops to 21% for public cloud. They have similar concerns for the security of data that has to move between physical and virtual environments. 

Visibility Needs to Improve

Part of the problem is that many Federal IT infrastructures already have significant security challenges. Traditionally highly complex Federal infrastructures will need to be reengineered before they can be successfully migrated to a cloud environment. As it stands now, only a third of Federal IT managers report having a high level of visibility into their existing network environments. Adding a cloud infrastructure without making significant changes is likely to reduce that visibility even further. 

Agile Segmentation a Foundational Need

As a result, architectural planning, with strong and agile network segmentation, needs to be prioritized. Rushing into such a migration and trying to solve overnight all of the architectural and security issues that have evolved over decades will just lead to more problems. Federal agencies need to start by establishing a planning and action horizon, and then steadily march toward it. 

Consequence-Based Engineering is a Dimension of Risk Management

This process needs to start with identifying the specific bad consequences that they want to avoid, and engineering as many of them as possible out of Federal hybrid networks.  What are the large data sets that cannot be compromised?  What services need to be available with high confidence even in stressed conditions?  What co-dependencies exist that cannot be broken?  Intentional design and consequence-based engineering will always address far more security challenges than the traditional approach of simply trying to bolt additional security devices onto the back of the existing network. Commercial and Federal organizations need to start by assuming that persistent actors will penetrate their networks, and formulate architectures and objectives to achieve risk mitigations via consequence-based engineering. 

Automation & Integration to Address the Problems of Speed & Scale

We also need to thoughtfully apply advanced concepts from the commercial sector that implement automated cyber defense solutions tailored for hybrid cloud architectures.  Developing and implementing integrated and automated cyber defenses will allow agencies to address the growing challenges they face due to increasing numbers of connected devices and related data volume.  Real-time, contextual-based threat intelligence combined with an information-sharing architecture allows agencies to address the challenges and concerns of protecting critical data and systems, along with intellectual property. 

Hybrid Public-Private Clouds: A Secure Interim or Permanent Solution

The good news is that some modern commercial security solutions are designed to enable a strategic migration to a cloud-centric environment. Careful planning and the implementation of security tools that can enforce security posture seamlessly across hybrid environments avoid forcing organizations to take an all-at-once or all-or-nothing approach to migrations. 

In fact, there are options that not only enable agencies to keep government and citizen data safe, but can actually increase visibility and control, enable agile segmentation, and otherwise protect their systems at speed and scale, even in distributed and multi-cloud environments. 

An Opportunity

We can no longer afford to relegate security to an afterthought, or implement it as a series of isolated security platforms. Agencies that are able to establish effective security integration between their physical and virtual environments over an integrated security fabric can more effectively integrate security, SIEMs and other analytic tools to centralize management and enable automation. 

It’s well within each Federal department and agency’s reach to achieve hybrid cloud environments with the sort of broad visibility and granular controls that weren’t realized with traditionally isolated security resources.  It will enable the dynamic sharing and correlating of threat intelligence gathered from across the distributed network, and implement automation in order to make critical decisions at machine speeds. The Executive Order represents an opportunity to achieve both greater efficiencies and security postures, and is a critical step forward in securing the Federal governments critical cyber resources. 

Learn more about Fortinet Federal and its solutions for Federal agencies.

Security News

via CSO Online

October 24, 2017 at 09:08AM

IoT is still in early stages of development, say investors backing Wireless Innovation and Sabio

IoT is still in early stages of development, say investors backing Wireless Innovation and Sabio

Lyceum Capital has been in the news lately. On 16 August, reported that the company was an investor in customer contact specialist Sabio, which has amassed a €35 million warchest. CEO, Andy Roberts told the website exclusively what the company would spend it on. One week later, Lyceum was back in the headlines announcing another investment, this time in Wireless Innovation.

Here, Jeremy Cowan talks to Simon Hitchcock, partner at Lyceum, about what has sparked this strong new financial interest in the Internet of Things (IoT).

IoT Global Network: What was your first investment in the Internet of Things?

Simon Hitchcock: A number of our portfolio companies are in the wider IoT ecosystem including TotalMobile and Isotrak, but Wireless Innovation is our first investment purely dedicated to connectivity in the IoT market.

IoT Global Network: What persuaded you to invest now?

SH: We have been following the development of the IoT connectivity market for a number of years, looking for the right investment opportunity. Wireless Innovation represented an attractive opportunity to back an existing team to continue to grow organically at double digits and to accelerate that through acquisitions, in what remains a fragmented market.

IoT Global Network: What was it about Wireless Innovation that singled the company out for you?

SH: The CEO and founder, Phil Rouse, has achieved very impressive organic growth, which the business is well positioned to continue. Other factors included its high quality and well invested connectivity management platform, and comprehensive managed service offering, as well as the wide range of clients and end markets it serves.

IoT Global Network: How much have you invested and what’s it for? Acquisitions? If so, what kind?

SH: Lyceum Capital has committed £20 million (€21.7 million) of funding to the buy and build. We plan to acquire complimentary businesses to expand the geographic and sector reach of the investment.

IoT Global Network: Is this a fixed-term or open-ended investment? If fixed, for how long? If open, what are your objectives?

SH: Lyceum Capital is a long-term investor, typically holding our portfolio companies for a minimum of five years. Our plan is to develop Wireless into a leading player in the market.

IoT Global Network: What do you look for in IoT investments? Are there any golden rules?

SH: We focus on businesses with high recurring revenues, mission-critical use cases, strong organic growth and strong gross margins. We like businesses that have developed a level of their own intellectual property and real value-add in their service wrap.

IoT Global Network: Do you plan further IoT/M2M (machine-to-machine) investments in the near term?

SH: We plan to make a number of acquisitions for Wireless Innovation, both in the UK and internationally in the coming years.

IoT Global Network: Do you see other investors looking at the Internet of Things? If so, are they larger or smaller investors?

SH: The growth in the IoT market makes it attractive for investors, we would expect a range of different investors to be attracted to it for this reason.

IoT Global Network: How are IoT/M2M services and technologies viewed by investors?

SH: We view the market as still being in the early stages of its development, although it has come a long way. We see significant short-, medium- and long-term growth potential in it as costs reduce and use cases increase.

Security News,IoT News

via IoT Now

October 24, 2017 at 09:07AM

How to Invert the Colors on Your Android Phone’s Screen

How to Invert the Colors on Your Android Phone’s Screen

If you (or someone you love) has vision issues, however, the tiny fonts and complex colors on modern phones can makes them nearly impossible to use. Fortunately, there’s a feature built in to Android that allows users to easily invert the colors, making things much easier for those with poorer eyesight.

How to Invert Colors on Stock Android

If you’re using a stock Android device, like a Google Pixel, inverting colors is actually a breeze.

First, pull down the notification shade, then give it a second tug. Look for an option that reads “Invert Colors.” If it doesn’t show up on the first panel of the quick settings shade, you may have to swipe over—it’ll be on the second.


If, for some reason, it still doesn’t show up here, you can easily add this tile. Tap the little pencil icon at the bottom (this allows you to edit the quick settings panel), find the Invert Colors tile, then drag it to the top area. Similarly, if this tile shows up on the second page and you’d like to have it on the first page for quick access, you can move it into the top nine spots to make sure it always shows up where you need it. If you put it in the top six spots, it will even show up in the persistent quick settings bar, so you won’t have to pull the shade down a second time. It’s all about convenience.

How to Invert Colors on Samsung Galaxy Devices

If you’re using a Galaxy device, then you’ll have to dig a little deeper to get to the invert colors setting, as it’s not tethered to a quick setting tile like it is on stock Android. Per the norm, Samsung likes to change stuff for literally no reason.

Go ahead and pull the notification shade down and tap the gear icon.

Scroll down until you find the “Accessibility” entry, then tap into that menu. From there, choose “Vision.”


There are a lot of options in this menu, but you need to scroll down almost to the very bottom—the next to last option should read “Negative colors.” Tap the toggle next to it to enable the feature.

Boom, that’s it. If this is something you plan on leaving enabled all the time, that’s fine. The only issue with it being three menus deep is the inconvenience it causes if it’s something you only use part of the time. That’s why I wish there was a toggle in the quick settings panel, like on stock devices.

Security News

via How-To Geek

October 24, 2017 at 09:04AM