Penguin: Open Source Networking, Telecommunications Waking Up…

Advanced Cyber/IO, Autonomous Internet, Innovation, Knowledge, Money, Security, SmartPlanet, Software

Open Source Networking and a Vision of Fully Automated Networks

Transforming telecom

As an example of transformative change that is now underway, Joshipura pointed to the telecom industry. “For the past 137 years, we saw proprietary solutions,” he said. “But in the past several years, disaggregation has arrived, where hardware is separated from software. If you are a hardware engineer you build things like software developers do, with APIs and reusable modules.  In the telecom industry, all of this is helping to scale networking deployments in brand new, automated ways.”

Continue reading “Penguin: Open Source Networking, Telecommunications Waking Up…”

Penguin: Open Source to Power Security Operations

Security
Who, Me?

Open source to power Telstra security operations centres

Telstra will offer enterprise-grade managed security services from SOCs in Melbourne and Sydney

The telco’s director of security solutions, Neil Campbell, said the new SOCs and Telstra’s new platform are part of “reimagining” how managed security services are delivered, particularly in the context of the vast quantities of data enterprises find themselves grappling with thanks to developments such as the Internet of Things.

Using open source offers “the ability to be master of your own destiny when it comes to features and timelines,” he added, allowing the telco to be flexible in order to meet its clients’ requirements as well as adapt to an evolving market.

Another reason for using open source is that “by contributing to the open source community we put the tools in the hands of users who might otherwise not be able to afford an enterprise-grade SIEM platform or for their own reasons would never outsource and are looking for some flexibility in-house,” Campbell said.

Continue reading “Penguin: Open Source to Power Security Operations”

Antechinus: Diaspora/Loomio Decentralized Social Network with Data Security

Crowd-Sourcing, Security, Software
Antechinus
Antechinus

diaspora* – a privacy-aware, community-run, open source, decentralized social network puts users in control of their data security

Since 2012 the community has:

Continue reading “Antechinus: Diaspora/Loomio Decentralized Social Network with Data Security”

Berto Jongman: Say NO to Mandated Cyber – Insecurity (“Keys Under Doormats”)

Access, Security
Berto Jongman
Berto Jongman

Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications

We have found that the damage that could be caused by law enforcement exceptional access requirements would be even greater today than it would have been 20 years ago. In the wake of the growing economic and social cost of the fundamental insecurity of today’s Internet environment, any proposals that alter the security dynamics online should be approached with caution. Exceptional access would force Internet system developers to reverse “forward secrecy” design practices that seek to minimize the impact on user privacy when systems are breached. The complexity of today’s Internet environment, with millions of apps and globally connected services, means that new law enforcement requirements are likely to introduce unanticipated, hard to detect security flaws. Beyond these and other technical vulnerabilities, the prospect of globally deployed exceptional access systems raises difficult problems about how such an environment would be governed and how to ensure that such systems would respect human rights and the rule of law.

PDF (34 Pages)

Jean Lievens: European Open Science Cloud

Access, Architecture, Cloud, Data, Design, Economics/True Cost, Innovation, Knowledge, P2P / Panarchy, Politics, Resilience, Science, Security, Software, Sources (Info/Intel), Spectrum
Jean Lievens
Jean Lievens

Towards the European Open Science Cloud

CERN has recently published a paper which outlines the establishment of the European Open Science Cloud that will enable digital science by introducing IT as a Service to the public research sector in Europe.

Continue reading “Jean Lievens: European Open Science Cloud”

Jean Lievens: Can Analytics Save The Earth?

Access, Architecture, Data, Design, Economics/True Cost, Governance, Innovation, Knowledge, P2P / Panarchy, Politics, Resilience, Science, Security, Software
Jean Lievens
Jean Lievens

This Earth Day, Let’s Start Using Analytics To Conserve Energy

The success of new energy projects relies on one crucial skill: the ability to derive insights from massive amounts of rapidly changing data. That’s why utilities and energy companies are adopting analytics to meet the rising demand for renewable energy from more sophisticated customers.

Continue reading “Jean Lievens: Can Analytics Save The Earth?”

Mongoose: UNASUR Opens Defense School Focused on Peace and Stability

Economics/True Cost, Governance, Innovation, Politics, Resilience, Security
Mongoose
Mongoose

Unasur opens Defense School to elaborate a shared doctrine of peace and stability

The Union of South American Nations, Unasur will celebrate this Friday its eighth anniversary with the official opening of the South American Defense School (Esude) created to instruct on defense and security issues, both at civil and military level, following ‘the principles of a regional strategic vision’.

Continue reading “Mongoose: UNASUR Opens Defense School Focused on Peace and Stability”

Mongoose: Security flaw gave researcher the power to erase every video on YouTube

Commerce, Corruption, Government, IO Impotency, Security
Mongoose
Mongoose

Security flaw gave researcher the power to erase every video on YouTube

Today’s tale of apocalyptic internet near-misses comes from software developer Kamil Hismatullin, who discovered a security flaw in YouTube that allowed him to delete any video he wanted—or all of them, if he so desired. Fortunately, he did not so desire (although he apparently had some thoughts about doing a number on Justin Bieber’s channel), and instead he reported the bug to Google and collected a $5000 reward.

Continue reading “Mongoose: Security flaw gave researcher the power to erase every video on YouTube”

Hal Berghel: Noirware – RFID/GPS

Design, Security
Hal Berghel
Hal Berghel

Noirware

Are we just going to sit here while the unintended consequences of bad design wreak havoc on our lives? A retrospective about RFID creep and GPS abuse is called for.

EXTRACT

…absent a robust security model, commercial GPS is currently untrustworthy with no antidote on the horizon.

PDF (6 Pages)

Jean Lievens: Tim O’Reilly on Open Data and Best (Open) Security

Data, Security
Jean Lievens
Jean Lievens

Opening up open data: An interview with Tim O’Reilly | McKinsey & Company

The tech entrepreneur, author, and investor looks at how open data is becoming a critical tool for business and government, as well as what needs to be done for it to be more effective. A McKinsey & Company article.January 2014

Interview transcript

Continue reading “Jean Lievens: Tim O’Reilly on Open Data and Best (Open) Security”