Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Networking

Submission + - If you think you can ignore IPv6, think again. (securityweek.com)

wiredmikey writes: It’s official. The IANA(Internet Assigned Numbers Authority) this week allocated the last IP address blocks from the global IPv4 central address pool.

While the last IPv4 addresses have been allocated, it’s expected to take several months for regional registries to consume all their remaining regional IPv4 address pool.

The IPv6 Forum, a group with the mission to educate and promote the new protocol, says that enabling IPv6 in all ICT environment is not the end game, but is now a critical requirement for continuity in all Internet business and services going forward.

Experts believe that the move to IPv6 should be a board-level risk management concern, equivalent to the Y2K problem or Sarbanes-Oxley compliance. During the late 1990s, technology companies worldwide scoured their source code for places where critical algorithms assumed a two-digit date. This seemingly trivial software development issue was of global concern, so many companies made Y2K compliance a strategic initiative. The transition to IPv6 is of similar importance.

If you think you can ignore IPv6, think again.

Security

Submission + - Spyware Gangs Merging, Planning 'Supertrojans' (foxnews.com)

Velcroman1 writes: Security experts warn that a new "supertrojan" is lurking in the cyber shadows, which may make ordinary viruses seem as harmless as the common cold. The two most forbidding pieces of spyware on the Net have James Bond-worthy names: SpyEye and ZeuSTwo. Once competing tools for cybercrooks, now they’re teaming up to form a hybrid being hailed as SpyZeuS — and security analysts warn companies and users to be on their guard. "Conventional security solutions will find it hard to detect and handle this type of new threat," wrote fraud expert Aviv Raff on his blog.

Comment more secure? (Score 1) 231

FTA: "Beijing and Moscow see American information technology as a threat. They want systems of their own" and "especially programs sold by foreign vendors, has immense implications for the country's national security. "
How does open source help fight security in the short term? wouldn't open source make it easier?

Sounds to me more like a cost savings move than a security move....

Comment Wheres the Stats to back it up? (Score 1) 157

What would have been interesting to see is the stats to back this up.

Break it down to size of business and the number of resources dedicated to the Cloud Sourcing across time. (Theres that damn "Cloud" word yet again)

I would just about bet that less than 5% of small and mid size businesses dont even know what the hell Could Sourcing is, let alone are using it.

Now look at the comparison of employees in small and mid size business compared to Lage corps and I bet it would make this article disappear!

Businesses

Submission + - Is your department "I.S." or "I.T.&

bdrees writes: Whats the difference between I.S. and I.T.? What does your company use and why?

Comment R&D (Score 1) 829

I look at it like I do Technology, there will *Always be something better tomorrow*.
The research and development used to culminate the F-22 will surely be used in the next F-XX.

Comment FTA.... (Score 1) 665

FTA... "Yet he then begins browsing through our hard drive. A folder marked 'Private' is opened and he flicks through our researcher's holiday photographs, including intimate snaps of her wearing a bikini. He stares at picture after picture, stopping only to show them to colleagues. He then picks up the phone and calls our researcher. He tells her our motherboard is faulty and will need to be replaced. Usually it costs £130 but he'll do it for £100. We tell him we'll think about it and call him tomorrow." Wonder what the press left out of this one?!?!?!

Comment Bad Control (Score 3, Insightful) 158

Thats fine that Adobe's creating this software, but the bottom line is poor control with reuters. When reuters can prove their internal controls will stop altered images from making it to press, thats when their integrity may start to come back.

Slashdot Top Deals

"If it ain't broke, don't fix it." - Bert Lantz

Working...