Jump to content


 Photo

Mingis on Tech: What Cisco announced at Cisco Live

Yesterday, 09:31 PM

Posted by Computerworld in Computerworld News

Cisco is a company in transition as it looks to move beyond its networking roots into areas as diverse as security, mobile, the Internet of Things and the now "intent-based networking."

(That last one isn't quite as futuristic as it sounds.)

Network World's Brandon Butler has been at Cisco Live this week, keeping tabs on what the company is up to -- something that's not easy when there are 28,000 people in attendance and 1 million square feet of exhibition space. He filled in Computerworld Executive Editor Ken Mingis on the details.

To read this article in full or to leave a comment, please click here



View the full article

8 Views · 0 Replies

 Photo

Purism aims to push privacy-centric laptops, tablets and phones to mar

Yesterday, 05:54 PM

Posted by Computerworld in Computerworld News

A San Francisco-based start-up is creating a line of Linux-based laptops and mobile devices designed with hardware and software to safeguard user privacy.

Purism this week announced general availability of its 13-in. and 15-in. Librem laptops, which it says can protect users against the types of cyberattacks that led to the recent Intel AMT exploits and WannaCry ransomware attacks.

The laptop and other hardware in development has been "meticulously designed chip by chip to work with free and open source software."

"It's really a completely overlooked area," said Purism CEO Todd Weaver. "We also wanted to start with laptops because that was something we knew we'd be able to do easily and then later get into phones, routers, servers, and desktops as we expand."

To read this article in full or to leave a comment, please click here



View the full article

19 Views · 0 Replies

 Photo

A Chromebook can increase the protection of air gapped computers

Yesterday, 05:03 PM

Posted by Computerworld in Computerworld News

I used to think that the best way to protect a computer hosting sensitive data was by not connecting it to any network, a process known as air gapping. Ah, the good old days.

WikiLeaks recently revealed that when the computer with the sensitive data is running Windows, even air gapped protection is insufficient. The CIA, using a software system codenamed Brutal Kangaroo, first infects a Windows computer connected to the Internet, then infects any USB flash drive (a.k.a. thumb drive) plugged into that computer, in the hope that the flash drive will eventually be plugged into the air-gap protected machines.

To read this article in full or to leave a comment, please click here



View the full article

7 Views · 0 Replies


Latest Discussions

Site Navigation

Online Users

1 members, 38 visitors and 0 anonymous users

Yahoo, Bing, Google, glenn4uk


Portal v1.1.0 by DevFuse | Based on IP.Board Portal by IPS