Visit our other websites:    Consumer IT    On CE    Mobile Channels    ECI news    rAVe Europe    Digital Signage News    

 

eSP - IT Solution Providers in Europe

  • Full Screen
  • Wide Screen
  • Narrow Screen
  • Increase font size
  • Default font size
  • Decrease font size

Intel Processors Hit With Load Value Injection

E-mail Print PDF

The same team of researchers behind the discovery of microarchitectural attacks such as Meltdown, Spectre and Zombieload uncover yet another exploit lurking inside Intel CPUs-- Load Value Injection (LVI), a flaw allowing "reverse Meltdown" attacks.

load value injectionDiscovered on 4 April 2019 and reported to Intel before public disclosure on 10 March 2020, LVI turns previous data extraction attacks and defeats all existing mitigations at both software and hardware levels. According to the researchers, this makes LVI "much harder to mitigate" compared to previous attacks, and can affect just about any access to memory. Intel was involved with the disclosure, and says it affects Atom, Core and Xeon processors, as well as the newest Ice Lake (10th Gen) chips and even the upcoming Tremont Atom core.

IBM and Infosys Team Up to Accelerate Public Cloud

E-mail Print PDF

Digital services and consulting provider Infosys forms a global alliance with IBM to help enterprises accelerate digital transformation efforts using the IBM public cloud.

IBM Infosys cloud

The collaboration will also help enterprises in highly regulated industries, such as financial services, insurance and healthcare, to transition, modernise and transform enterprise workloads and applications by tapping into the security and enterprise capabilities of the IBM public cloud. In addition, Infosys will offer access to the Red Hat portfolio of open source offerings on the IBM public cloud, providing enterprises a greater level of scale, resources and capabilities in cloud-driven digital transformation.

The Ikoula Raspberry Pi-Powered Micro Server

E-mail Print PDF

Often considered a simple device ideal for something like a home server, the Raspberry Pi 4 holds professional potential when used in "Remote" mode. Enter French server specialist Ikoula, who uses the micro-PC in an IPv6 & IPv4 micro server.

Raspberry Pi 4The micro server combines the Raspberry Pi 4 with professional infrastructure and 24/7 support, making a versatile and low-cost micro server. The Raspberry Pi runs remotely, and users get the benefit of the security system of a datacentre, a support team available at all times, and a network with asynchronous 1Gbps bandwidth.

How to Avoid IoTageddon

E-mail Print PDF

At ISE 2020 in Amsterdam, the most popular talk on Wednesday's ISE Main Stage focused on IoT, or more correctly… IoTageddon.

What's IoTageddon? 

Editor-in-Chief at Channel Media Europe, Bob Snyder linked five important facts to illustrate the dangers ahead with IoT.

Bob Snyder on ISE Main Stage

First, IoT began life some years ago as a "dumb" machine-to-machine technology and now is being touted as the "Intelligence of Things.” Snyder drew a comparison between drones without cameras and IoT without sensors.

Second, he reported industry analysts have an impressive list of more than 1000 IoT platforms selling on the market today. Yet experts declare, after some investigation, that only 400 have true platform capabilities.

Third, Ericsson, Cisco and many others predicted in 2010 we would have 50 billion IoT devices by 2020. But we now only have about 9 billion (even if you include smartphones). Snyder called the missing 41 billion devices "the biggest mistake in market prediction in the history of the IT business—and perhaps in the history of all business."

Fourth, many sources report high failure rates for trial IoT projects. Cisco claims as many as 76% fail. That's 3 out of 4. If IoT was a sport, it would be thrown out of the game.

Lastly, Snyder pointed out how there is no adoption of a common security standard for IoT. Billions of devices and all with less security than your grandma’s PC. He referenced a web site which calls itself "the search engine of the internet of things" where anyone can go and find the list of millions of unsecured devices. And, despite this public shaming, still hardly anyone does anything to get their devices off that list.

IoTageddon comes as more and more IoT platforms reach out aggressively selling IoT while the universe of unprotected things grows and grows. Snyder predicted very big, very public and very embarrassing security hacks will happen before people react and before they start to change. Human nature, insists Snyder, seems to leave us watching planetary climate change coming at us like an oncoming freight train and yet we are unable to get off the tracks until the train hits us.

If that seems pessimistic, Snyder also shared some useful questions to ask before deploying IoT. And 12 steps needed to bring security into the “Intelligence of Things.”

It’s an engaging speech with a structured story line: the link to watch this ISE Main Stage presentation is below.

WATCH Bob Snyder’s How to Avoid IoTageddon

IDC: Firewall Demand Drives Security Appliances

E-mail Print PDF

According to IDC, the global security appliance market sees shipment and revenue growth in Q4 2019, as revenues are up by 9.4% Y-o-Y to $4.8 billion while shipments total 1.3 million units, a 21.1% Y-o-Y increase.

IDC Security appliances

The traditional firewall segment accounts for the "most significant" revenue growth, as it accounts for over $192m more in revenue in Q4 2019 than Q4 2018. Despite being the overall largest segment, unified threat management (UTM) is up 5.8% Y-o-Y and represents 57.1% of the Q4 2019 security appliance market.

Page 24 of 200