UK ISP Zen Internet Freezes Line Rental Price Until 2020

Rochdale-based ISP Zen Internet has announced that they’re “freezing line rental costs for the next four years”, which for example means that both their new and existing small business broadband and / or phone customers will enjoy a price freeze at £17.00 plus VAT until 2020. According to Ofcom, average line rental costs in the […]

Read more here:: ISPreview

Okta’s API access product targets the trend toward services

Okta has changed key parts of its product portfolio to attract new users to its corporate identity management and access control platforms. The startup is launching a new API access management product and revamping its provisioning service to make it easier to change employees’ permissions within a company.

The changes, announced at the company’s Oktane conference in Las Vegas on Tuesday, were designed to give Okta more ammunition against a growing field of identity-management rivals, including Microsoft and OneLogin.

Okta API Access Management builds on Okta’s existing tools for developers who manage application logins. It lets administrators control how users of those apps access business systems that are surfaced through APIs.

To read this article in full or to leave a comment, please click here

Read more here:: IT news – Security

Say hello to old friend Dell Technologies on Sept. 7

Dell will complete its acquisition of EMC on Sept. 7, ending nearly a year of approvals and decades of history for the two companies that will combine to become Dell Technologies.

The mammoth deal was announced last October with an estimated value of US$67 billion. The companies recently crossed their last regulatory hurdle when China’s Ministry of Commerce signed off on the deal.

Buying EMC and its federation of related companies will make Dell a stronger player in key areas that include software-defined data center, converged infrastructure, hybrid cloud, and security, Dell Technologies Chairman and CEO Michael Dell said in a press release.

To read this article in full or to leave a comment, please click here

Read more here:: IT news – Hardware Systems

5 commonly misunderstood compliance terms

Although vendor-written, this contributed piece does not advocate a position that is particular to the author’s employer and has been edited and approved by Network World editors.

In the world of compliance and governance, terms such as certified, compliant and validated have distinct meanings that are often mistakenly used interchangeably. It is key to understand the terms themselves and how they are used in the industry, so here’s a handy guide.

Before we dive into the specific types of credentials, it is important to understand that there are two fundamental processes that take place during an initial audit – attestation and assurance — that determine the extent to which the audit criteria are fulfilled. Conducting these procedures helps businesses meet third-party risk and compliance requirements and provides information to customers and other stakeholders that validates the integrity of an organization’s control environment. To put it in simple terms, think of it like a letter of recommendation or evidence showing that something is true:

To read this article in full or to leave a comment, please click here

Read more here:: IT news – Security

DARPA sees IoT and AI as weapons to dominate wars

DARPA wants to exploit the power of the internet of things to help the U.S. dominate battlefields.

The Defense Advance Research Projects Agency will fund the development of sensors and artificial intelligence systems that could help break into, extract, and analyze information from enemy devices and communication systems.

The components and systems will arm the U.S. with more data to analyze enemy moves and strategy. Information is king in wars, and DARPA wants to develop technology that can break into enemy systems.

“They are talking about going into any situation and extracting information at any time, [with] artificial intelligence systems that can attack and hack any network,” said Jim McGregor, principal analyst at Tirias Research.

To read this article in full or to leave a comment, please click here

Read more here:: IT news – Hardware Systems

BitTorrent client is found distributing Mac-based malware

A popular BitTorrent client called Transmission has again been found distributing Mac-based malware, months after it was used to spread a strand of ransomware.

Researchers at security firm ESET have been following a malware called OSX/Keydnap, which can steal passwords, and noticed that it was spreading through Transmission’s official site.

Somehow, a version of the BitTorrent client containing the malware had been recently made available on the site, ESET said in a blog post on Tuesday.

Transmission has already removed the download, according to ESET. But users who downloaded the client between this past Sunday and Monday should check for signs that their Mac has been comprised.

To read this article in full or to leave a comment, please click here

Read more here:: IT news – Security

Okta partners with Google to secure cloud identities

Identity management vendor Okta and Google have announced a partnership aimed at getting enterprises to secure their users’ identities in the cloud.

As part of the deal, Google will use Okta as its preferred identity provider for Google Apps enterprise customers. Businesses that buy a ton of Apps for Work licenses will also be encouraged to use Okta’s services to manage how their users connect to business apps.

Okta’s identity management product makes it possible for companies to create one central directory of employees, who can then use a single set of credentials to get into business software that they need to use. That includes Google Apps and a variety of other services like Salesforce, Yammer, and ServiceNow.

To read this article in full or to leave a comment, please click here

Read more here:: IT news – Security

Named Data Networking is on the horizon, and SDN will help make it a reality

Although vendor-written, this contributed piece does not promote a product or service and has been edited and approved by Network World editors.

Named Data Networking (NDN) may be in the early stages of development, but the strides being made are compelling. Gartner predicts NDN won’t hit the “Plateau of Productivity” on their Hype Cycle for more than ten years, but when it does, a monumental shift in data organization and retrieval will come with it. We know a massive influx of data is on its way – NDN might be the key to managing the data, and Software Defined Networking (SDN) will be integral to helping NDN do just that.

The current Internet framework is built on the idea that communications is a conversation between a client and a server, an exchange of information between two points. NDN shifts the focus of networking from locations (origins and destinations) to the information itself. Networking will no longer be about connecting to a server to find information as much as requesting the information itself.

To read this article in full or to leave a comment, please click here

Read more here:: IT news – Networking

Google quietly discontinues the Chromebook Pixel 2 without replacing it

Swirling rumors about a Google Pixel refresh just received a possible shot in the arm.

Google recently listed the $1,300 Chromebook Pixel 2 as out of stock on the Google Store, and other retailers appear to be discontinuing the laptop as well. The end of the $1,300 Chromebook Pixel 2 comes four months after Google discontinued the $1,000 version in April.

Google told Venture Beat, which first noticed the end of the Chromebook Pixel 2, that the expensive Chrome OS laptop was discontinued. “We’re committed to the Pixel program but we don’t have plans to restock the Pixel 2,” a Google spokesperson told the site.

To read this article in full or to leave a comment, please click here

Read more here:: IT news – Hardware Systems