ECI Introduces the First Layer 1 Optical Encryption as a Service Solution With Line Rates up to 200Gbps – Yahoo Finance

PETACH TIKVA, Israel, March 9, 2017 /PRNewswire/ --

ECI, a global provider of ELASTIC Network solutions for service providers, critical infrastructures and data center operators, announced today the introduction of its first optical encryption as a service solution. The solution supports per-service encryption up to 100Gbps, with line rates up to 200Gbps, without sacrificing interoperability, scalability, or flexibility. This makes it particularly suitable for service providers, financial, medical and government institutions.

(Logo: http://photos.prnewswire.com/prnh/20141117/158923LOGO )

Jimmy Mizrahi, EVP Global Portfolio at ECI said, "In today's world, information security is a critical business imperative for any institution. Communications traffic can be intercepted at any point in the network, via fiber taps for example, thus necessitating encryption to guarantee the integrity of the data being transmitted. As such, optical-layer encryption has become key to a sound security strategy. For financial and government institutions, where livelihoods depend on the transfer of extremely sensitive information, this is even more important."

ECI's solution offers a unique encryption on a per-service basis up to 200Gbps, making it one of the fastest in the market. Moreover, the solution enables service providers and other institutions to offer Layer 1 encryption as a service for additional revenue streams. This reinforces ECI's tailored security offering targeted at service providers launched earlier this year. ECI's encryption method is certified FIPS 140-2 Security Level 2. The L1 encryption can also run as alien lambda over other optical networks offering a much more flexible and economical solution.

Contrary to Layer 2 (or higher layer) encryption, optical encryption provides no information about the underlying services to a potential hacker. It adds almost no latency and can be used to encrypt any service - not just Ethernet-based services. As such, optical encryption is preferred in situations where latency is crucial such as healthcare, smart cities and intelligent transportation.

ECI will be exhibiting its cloud and security offerings at Cloud Expo Europe 2017 to be held in London ExCel, March 15-16, 2017 at Booth #825.

About ECI

ECI is a global provider of ELASTIC network solutions to CSPs, critical infrastructures as well as data center operators. Along with its long-standing, industry-proven packet-optical transport, ECI offers a variety of SDN/NFV applications, end-to-end network management, a comprehensive cyber security solution, and a range of professional services. ECI's ELASTIC solutions ensure open, future-proof, and secure communications. With ECI, customers have the luxury of choosing a network that can be tailor-made to their needs today while being flexible enough to evolve with the changing needs of tomorrow. For more information, visit us at http://www.ecitele.com.

Press contact: Marjie Hadad - MH Communications On behalf of ECI +972-54-536-5220 marjierhadad@gmail.com

Read the original here:
ECI Introduces the First Layer 1 Optical Encryption as a Service Solution With Line Rates up to 200Gbps - Yahoo Finance

Has The CIA Killed Encryption For Mobile, Connected Devices? – MediaPost Communications

WikiLeaks dumped another batch of classified documents on Tuesday depicting the CIAs methods for bypassing encrypted mobile devices and applications.

Dubbed #Vault7, Tuesdays leak of thousands of Web pages describes the types of technology the Central Intelligence Agency (CIA) uses to hack targeted citizens and foreign governments. WikiLeaks claims this is the first part of a series of leaks it has titled Year Zero, allegedly taken from the CIAs Center for Cyber Intelligence unit in Langley, Virginia.

In what may be the largest CIA breach in history, the Vault7 files describe the software tools the agency uses to break into computers and devices connected to the Internet, including televisions.

The leaked documents also reveal that the CIA has developed sophisticated technology for hacking Apple and Android mobile devices, collecting audio and messaging data and bypassing encryption on mobile applications like Signal and Whatsapp.

advertisement

advertisement

ProtonMail, an end-to-end encrypted email service, has confirmed that none of the Vault7 documents indicate the company's encryption has been compromised.

We can state unequivocally that there is nothing in the leaked CIA files which indicates any sort of crack of ProtonMails encryption, states Andy Yen, co-founder of ProtonMail, in a blog post.And despite claims to the contrary, there is also no evidence that Signal/Whatsapp end-to-end encryption has been breached.

Founded in 2013 after Edward Snowdens NSA revelations, ProtonMail has since become a popular and secure email service for journalists, activists, dissidents and privacy fans.

Over the past three years, the CIA has put together a formidable arsenal of cyberweapons specially designed to gain surveillance capabilities over end-user devices such as mobile phones and laptop/desktop computers, writes Yen. These advanced malwares enable the CIA to record actions such as keystrokes on a mobile device, allowing them to conduct surveillance without breaking encryption. Through this technique, US intelligence agencies can gain access to databeforethey have been encrypted.

The core cryptography underlying encrypted services like ProtonMail or WhatsApp have not been compromised by intelligence agencies, but the CIA has seemingly disrupted the security of end-user devices.

The use ofend-to-end encryption means services such as ProtonMail are not actually able to decrypt user data, writes Yen. Even if we wanted to compromise user data, we do not have the technical means to decrypt the user emails.Furthermore, even if an attacker breached ProtonMail servers, all the emails stored on our servers are encrypted, so an attacker also would not be able to read user emails.

Link:
Has The CIA Killed Encryption For Mobile, Connected Devices? - MediaPost Communications

No, you shouldn’t delete Signal or other encrypted apps – TechCrunch


TechCrunch
No, you shouldn't delete Signal or other encrypted apps
TechCrunch
Journalists are just starting to pore over the files, but a number of security researchers and privacy advocates are hoping to quash the misconception that encrypted chat apps like Signal and WhatsApp have been compromised. A now corrected tweet by The ...
The Best Encryption Apps For Your PhoneKnow Your Mobile
Want to chat securely? Here's what to look for in an appCNNMoney
How secure is WhatsApp?CSO Australia
ATTN
all 14 news articles »

Read this article:
No, you shouldn't delete Signal or other encrypted apps - TechCrunch

If the CIA can sidestep encryption, what makes you think … – Computerworld

Having just spent much of the day browsing throughWikileaks latest batchof documents from the intelligence community in which government agents discussed ways to circumvent mobile encryption and to listen in on conversations near smart devices including smart TVs its clear that government agents have long had the ability to grab mobile content before its encrypted.

Some of the tactics have names that are quite explicit about their function, such as a TV mode called TV Fake-Off. These docs provide a fascinating look into the government teams that are emulating cyberthieves, trying to improve on their techniques rather than thwart them.

Personal security products (PSP) sandboxes typically have a set time limit they analyze a program for before making a decision. PSPs do not want to impose unnecessarily long wait times on the user, which may cause the user to disablePSPcomponents or try other products out of frustration, said one typical passage. A common technique of exploiting this mechanism is using a Sleep-like call at the start of a program to run out the clock. PSPs caught on and many will skip the sleep calls in their sandbox environment. To counteract this, Malware authors will call a meaningless function which performs some kind of task or calculation that takes a while to complete, before performing any malicious action. This makes it harder/impossible for PSPs to know what to skip, and the Malware can effectively run out the clock while in aPSPsandbox.

Interestingly, the CIA and other intelligence firms are doing the same process as most security firms studying cyberthief tactics but instead of using that knowledge to improve defenses, the CIA is using those lessons to craft better attacks.

This is a very impressive set of tools gathered, said Doug Barbin, principal cybersecurity leader of Schellman & Co., a CPA firm. But it wasnt something that a security researcher would be too surprised by. Its so detailed, though, that it takes the debate out of whether or not these types of attacks are hypothetical.

Barbin added, though, that some of the initial reports have been misleading. The CIAs tested method of monitoring that smart TV, for example, he said, used a USB stick placed into the set to initiate any monitoring. That would require physical contact with the set, as opposed to an over-the-air method of intercepting data.

Although Barbins point is well taken, some of these memos are two years old. Just because it was tested with a USB insert doesnt mean that the attack couldnt today be launched wirelessly.

Another security professional, Ken Pfeil, the chief architect at the TechDemocracy consulting firm, was equally unimpressed with the CIAs tactics.

These are pretty standard. The fact that they are using DLL injection is not surprising. In the exploit world, some of this stuff is pretty basic, Pfeil said. There is nothing sitting in front of me [from the Wikileaks data dump] that would surprise me. Absolutely nothing.

Agreed. Only the dumbest terrorist would opt to hold terror planning meetings in the same room as a smart TV that supports voice recognition. Then again, who ever said terrorists are especially smart? If only one plan is thwarted from some IQ-deficient murderer, its likely worth the effort.

Some of the advice in the CIA memos is positively coach-like. Consider: After verifying that the CTNR was called for thread creation, the kernel code can do some basic checks to see if the thread is being created in an interesting process. The important thing to remember about running code in the CTNR is that NO new threads can be created until each CTNR is finished. If your CTNR code takes 1 minute to run, then youve bottlenecked thread creation to 1 new thread a minute extreme example of course. Whatever you do in the CTNR, make sure its quick.

Many of the suggestions were aimed at, logically enough, tactics to avoid detection. Process Hollowing involves starting a benign process such as Internet Explorer using Windows CreateProcess, with a specific flag set to create the process in a suspended mode. At this point, the component removes the benign process code from the suspended process, injects its own malicious code, and resumes the process. PSPs may only do an initial scan when the process is created even though its suspended at the start and wont notice the code replacement. Also, dynamic analysis tools such as Procmon will only log/show that a benign process was created.

The CIA paid particular attention to getting around security defenses from Kaspersky. That might be a compliment of sorts to that products sophistication or it might simply be that Kaspersky has rejected many efforts to cooperate with government investigators.

The Kaspersky AVP.EXE process references a DLL called WHEAPGRD.DLL. This DLL is supposed to be located in one of the Kaspersky directories, which are protected by the PSP. Due to a UNICODE/ASCII processing mistake, the DLL name is prepended with the Windows installation drive letter, rather than the full path to the DLL, a memo said. For typical installations, this causes Kaspersky to look for the DLL CWHEAPGRD.DLL by following the standard DLL search path order. Loading our own DLL into the AVP process enables us to bypass Kasperskys protections.

Heres an interesting example of a more basic exploit on Windows. Process Hollowing involves starting a benign process, such as Internet Explorer, using Windows CreateProcess, with a specific flag set to create the process in a suspended mode. At this point, the component removes the benign process code from the suspended process, injects its own malicious code, and resumes the process, a memo said. PSPs may only do an initial scan when the process is created even though its suspended at the start and wont notice the code replacement. Also, dynamic analysis tools such as Procmon will only log/show that a benign process was created.

Other memos described time-savers. All function calls need to come from the ese.dll, and not esent.dll. The API appears the same, but exchange does not use esent.dll. Therefore all JET function calls need to be from ese.dll space. Thankfully, its already loaded into mem, the document said, before adding a smiley emoticon. Store.exe seems to export a wonderful function EcGetJetInstanceForMDB() that takes a GUID and returns a valid JET instance handle that has already been initialized and setup for use. Appears there is no need to figure out all the right SystemParameters, etc. and in order to create our own sessions from this instance. Use UuidFromString() to convert from String GUID to binary. However, this function isnt really need as once we are injected in, calling JetGetInstanceInfo() gives us everything we need.

The most interesting discussions, though, were candid in suggesting ways to bypass security restrictions. When building a tool, you will almost inevitably have to use some set of strings or sensitive data. When security products or professionals scan a system, we dont want to make it easy for them to find something malicious by just doing a string search. Thus, in order to obfuscate what the tool is doing, we obfuscate the strings or data being used, one memo said. You should also scan the binary you deliver against usernames and names of people on the project as many times mistakes are made and PDB strings file paths that often include usernames are left in the final binary. There are many products we use to help us automate portions or all of string/data obfuscation.

That memo continued, winking to the reader about its intended use. So you may already have a good idea of where were going with this. Memory refers to the volatile memory on the machine while the disk is non-volatile. This difference is important when developing malicious software, the note said. As a development shop, we tend to do most of our work in memory and rarely leave unencrypted artifacts on disk. That being said, all persistence is gained by writing to a non-volatile location on the machine. Thus, it is good to keep in mind that anything on disk shouldnt contain anything too cool for school. Also, on disk artifacts are more likely to be detected by Personal Security Products (PSPs).

All in all, just a run-of-the-mill day for your friendly neighborhood CIA agents.

Read the rest here:
If the CIA can sidestep encryption, what makes you think ... - Computerworld

How to make money from open source software | CIO – CIO

Talk about starting a business based on open source software and the conversation will inevitably shift to Red Hat. That's because the Linux vendor is a shining example of a company that's making money from an open source product. But how easy is it really to establish an open source startup that makes money? For every success story like Red Hat there are companies like Cyanogen that fail to thrive and projects that are abandoned.

It's tempting to believe that the Red Hat business model, which is based around selling subscriptions for support to a maintained and tested version of Linux (or a closely related model that offers consultancy and customization to an open source software solution as well support and maintenance), is the most viable way to make money from open source software. But Sam Myers, a principal at Balderton Capital, a technology venture capital company, says that most open source startups are unlikely to succeed using these business models.

[ What CIOs don't know about open source software ]

"Despite Red Hat, it is actually quite challenging to make money selling customization, support and consultancy," Myers says. "Why? Because it is head-count driven, the model doesn't scale, and you get low renewals. And you have competition from other consultancies."

Myers admits that the subscription model can occasionally be successful, but asserts that a more promising business model is to build a product line around an open source core. This can involve developing premium software modules that add features to the core open source software or, alternatively, building supporting applications that complement the core.

SuiteCRM, for example, offers its open source CRM software for free but charges for modules like an Outlook plugin. "What can upset people is when you develop new code that makes the core better but keep it proprietary, but if you build apps that work on top of it then there is no issue there," says Myers.

Another open source startup business model involves offering hardware that is suited to the software (in the way that Digium sells telephony hardware to run the open source Asterisk telephony software.) But Myers warns that this model can be difficult to sustain because customers typically only buy the hardware occasionally. Instead, he recommends looking for a business model that produces a recurring revenue stream. These can include offering open source software as a service or charging for API use in addition to selling premium modules or supporting applications as mentioned above.

[ The top 8 new open source projects ]

What quickly became apparent from speaking with Myers is that there is no "best" open source business model, and Allison Randal, president of the Open Source Initiative, says that open source startups should avoid searching for one. "The mistake people make is thinking about an open source business model. They should be thinking about a business model and how open source software fits into that," she says. "VCs are only beginning to understand open source and how to make money, but the way is the same as for any other business: by offering better value and making customers happy. "

A defining feature of many open source projects is the community that surrounds them, and there is always a danger that a company seeking to make money from open source software may alienate that community. That's because members of the community may feel that their volunteer efforts are being exploited for someone else's financial gain. So how much consideration should open source startups give to the project's community?

In some instances, like when a company provides almost all of the code commits to a project, Myers says that not much consideration needs to be given to community. "The main benefit of open source software isn't necessarily that development is crowdsourced. In some cases, something needs to be open source so that companies that use it don't have to be worried about vendor lock in," he says.

But in many cases there are great benefits to be had from adopting a business model that involves fostering an active community. "If you are looking for commits from outside then it is important to focus on the community, both to get developers working on code and also to see who your users are, because these are your leads for upselling."

Myers warns that communities don't just spring up and thrive by themselves though, so it's vital for an open source startup to spark interest in the community through marketing and communication. Avoiding alienating the community in the way that Cyanogen Inc. did when it decided to monetize the community's work communication is especially important, he says.

[ Open source: Career-maker, or wipeout? ]

What kind of marketing and communications are necessary? "You need to make sure that you say that X percent of your resources will be devoted to developing the open source project and Y percent will go to developing the proprietary modules or other applications that you plan to sell," says Myers. "If you can manage to do that successfully then you can manage any perceived conflict of interest."

Alex Freedland, CEO of Mirantis, a company that has built a business around the open source OpenStack cloud operating system, says that to foster widespread adoption of an open source product you need an ecosystem around it, and to get that you also need a strong community. For that reason, he says, Mirantis makes a point of ensuring its contributions to a project never exceed 25 percent of the total in a given time frame.

Freedland also says that the community should trump the business when it comes to choosing the direction software development should take. "You need to decide what is of benefit to the community and do it, even if it goes against the short-term interests of the company," says Freedland. "It is also important that community members feel they won't be punished for their actions you need to foster a culture where community members can do whatever they feel will benefit the community."

He also advocated that open source companies devote a proportion of their resources to seeding other groups to expand the ecosystem.

Myers says there are two mistakes that open source startups that want to make money should make a point of avoiding. "If you just take the community's code (and build proprietary modules around it) then you are bound to alienate the community, and I can't see that ending well," he says. "And another mistake is trying to charge too soon for premium versions before a project has a strong community around it. You need to build a large audience for an open source software project before you can start to monetize it."

The Open Source Initiatives Randal says that while most communities don't mind a company trying to monetize a project, it is key that the community still has a life of its own in the way that Red Hat has fostered the Fedora community. "What drives a community away is when you take the wind out of its sails and it feels taken over," she says. Randal adds that little things can make a big difference: if Cyanogen Inc. had chosen a different name (in place of Cyanogen OS) for its commercial product, which was based on the Cyanogen Mod project, then the community may not have felt so offended by it, she says.

Mirantis Freedland adds that open source projects should be run as meritocracies and remain open to new ideas because startups that try to micromanage the direction of a project are inevitably on the path to failure. "There are always religious zealots, but as the leader of a startup you need to limit your own influence. If you do that you won't alienate the community, but if you don't then it will come back to bite you in the end."

See more here:
How to make money from open source software | CIO - CIO

Open source: Free as in beer, puppy… or mattress? – ZDNet

An abandoned mattress may be free to use, but without knowing where it came from, would you want to?

When open source first started to become mainstream in the 90s, there was a good deal of debate about what 'free software' meant.

It wasn't just about something you didn't have to pay for, went the philosophy, it was also about being able to see the source code to understand what was going on, and to make your own changes.

'Free' as in speech, not 'free' as in beer, went the motto.

That's a good start, but it doesn't really go far enough; free speech has consequences but they're not the first thing people think of when you say that. The argument that 'all bugs are trivial when you have enough eyeballs' assumes that all those eyeballs belong to people who are looking, understanding, and contributing.

In a lot of cases, many eyeballs are shallow eyeballs, because everyone assumes that someone else has done the hard work of understanding the code. And as open source becomes widely used, there are many more people using open source code who aren't going to be expert coders in the language a particular project is written in -- if they're coders at all.

So I started saying that open source was also 'free as in puppy'. Yes, it looks cute, but when you bring it home you have to feed it, exercise it, clean up its messes and take responsibility for it. And when it grows up, that puppy may not be the small, cute, little project you saw in the window, so you need to look into the pedigree of that puppy.

As open source has become more important commercially, a lot more people have started talking about 'free as in puppy' -- because any software you pick up and incorporate into your business or your development workflow brings with it responsibilities. Key open source software that an entire industry relies on has been critically underfunded for decades; the Linux Foundation's Critical Infrastructure projects are an attempt to redress this, because it doesn't just happen on its own.

If you were using FoundationDB because you thought it was open source like the other NoSQL databases, because you'd never read the licence, you would have got a rude shock when Apple bought the company and pulled all the code from GitHub. Turns out it was only some code to help you use the proprietary database code that was actually open source.

If the open source puppy makes things sound too appealing, I sometimes say 'free as in mattress'. As in, there's a mattress leaning up against a wall, and anyone can take it home -- but without knowing where it came from, would you want to?

Now, open source is becoming so widely used that open source creators and maintainers are starting to feel the strain, not least because not all new open source users are polite, friendly, and considerate (nor indeed, are all experienced open source users).

It's great to report a bug in an open source project, or even write up some code to fix it and submit that as a pull request. But whether it's the sheer volume of reports, the users who are rude and demanding when they give feedback or criticize the direction of the open source project, the would-be contributors who offer code that doesn't fit the long-term direction of the project or just increases the maintenance work for the project, open source creators and maintainers are starting to talk about overload and burnout, self care, and prioritization.

It's a tragedy of the commons, because individuals don't scale the way technology does.

The usual answer is to suggest how important it is to have a community (formal or informal) around projects to share that load, but it's easy to forget how hard it is to build and nurture those communities. Look at the Node.js contribution policy to see how much work it takes to run a large community.

If you're working on building an open source community, take a look at Nadia Eghbal's (free) book, Roads and Bridges: The unseen labour behind our digital infrastructure.

Seeing the latest discussions about how widely unappreciated the work to maintain open source is made me add another free to my list: free as in 'night off'.

There's a reason that commercial software companies don't only have developers -- they have testers, support teams, marketers, and an entire ecosystem supporting the coders. A lot of larger open source projects are sponsored by or interlinked with commercial companies, because that ecosystem can be a thriving business, as well as taking a load off the coders.

Not everyone wants to add a commercial aspect to their open source project, so we need a wide range of models to make this work. But if we're not thinking about all the meanings of 'free' for open source, we're going to keep seeing unintended but very predictable consequences for code that we're all coming to depend on.

See more here:
Open source: Free as in beer, puppy... or mattress? - ZDNet

How to make money from open source software | ITworld – ITworld

Talk about starting a business based on open source software and the conversation will inevitably shift to Red Hat. That's because the Linux vendor is a shining example of a company that's making money from an open source product. But how easy is it really to establish an open source startup that makes money? For every success story like Red Hat there are companies like Cyanogen that fail to thrive and projects that are abandoned.

It's tempting to believe that the Red Hat business model, which is based around selling subscriptions for support to a maintained and tested version of Linux (or a closely related model that offers consultancy and customization to an open source software solution as well support and maintenance), is the most viable way to make money from open source software. But Sam Myers, a principal at Balderton Capital, a technology venture capital company, says that most open source startups are unlikely to succeed using these business models.

[ What CIOs don't know about open source software ]

"Despite Red Hat, it is actually quite challenging to make money selling customization, support and consultancy," Myers says. "Why? Because it is head-count driven, the model doesn't scale, and you get low renewals. And you have competition from other consultancies."

Myers admits that the subscription model can occasionally be successful, but asserts that a more promising business model is to build a product line around an open source core. This can involve developing premium software modules that add features to the core open source software or, alternatively, building supporting applications that complement the core.

SuiteCRM, for example, offers its open source CRM software for free but charges for modules like an Outlook plugin. "What can upset people is when you develop new code that makes the core better but keep it proprietary, but if you build apps that work on top of it then there is no issue there," says Myers.

Another open source startup business model involves offering hardware that is suited to the software (in the way that Digium sells telephony hardware to run the open source Asterisk telephony software.) But Myers warns that this model can be difficult to sustain because customers typically only buy the hardware occasionally. Instead, he recommends looking for a business model that produces a recurring revenue stream. These can include offering open source software as a service or charging for API use in addition to selling premium modules or supporting applications as mentioned above.

[ The top 8 new open source projects ]

What quickly became apparent from speaking with Myers is that there is no "best" open source business model, and Allison Randal, president of the Open Source Initiative, says that open source startups should avoid searching for one. "The mistake people make is thinking about an open source business model. They should be thinking about a business model and how open source software fits into that," she says. "VCs are only beginning to understand open source and how to make money, but the way is the same as for any other business: by offering better value and making customers happy. "

A defining feature of many open source projects is the community that surrounds them, and there is always a danger that a company seeking to make money from open source software may alienate that community. That's because members of the community may feel that their volunteer efforts are being exploited for someone else's financial gain. So how much consideration should open source startups give to the project's community?

In some instances, like when a company provides almost all of the code commits to a project, Myers says that not much consideration needs to be given to community. "The main benefit of open source software isn't necessarily that development is crowdsourced. In some cases, something needs to be open source so that companies that use it don't have to be worried about vendor lock in," he says.

But in many cases there are great benefits to be had from adopting a business model that involves fostering an active community. "If you are looking for commits from outside then it is important to focus on the community, both to get developers working on code and also to see who your users are, because these are your leads for upselling."

Myers warns that communities don't just spring up and thrive by themselves though, so it's vital for an open source startup to spark interest in the community through marketing and communication. Avoiding alienating the community in the way that Cyanogen Inc. did when it decided to monetize the community's work communication is especially important, he says.

[ Open source: Career-maker, or wipeout? ]

What kind of marketing and communications are necessary? "You need to make sure that you say that X percent of your resources will be devoted to developing the open source project and Y percent will go to developing the proprietary modules or other applications that you plan to sell," says Myers. "If you can manage to do that successfully then you can manage any perceived conflict of interest."

Alex Freedland, CEO of Mirantis, a company that has built a business around the open source OpenStack cloud operating system, says that to foster widespread adoption of an open source product you need an ecosystem around it, and to get that you also need a strong community. For that reason, he says, Mirantis makes a point of ensuring its contributions to a project never exceed 25 percent of the total in a given time frame.

Freedland also says that the community should trump the business when it comes to choosing the direction software development should take. "You need to decide what is of benefit to the community and do it, even if it goes against the short-term interests of the company," says Freedland. "It is also important that community members feel they won't be punished for their actions you need to foster a culture where community members can do whatever they feel will benefit the community."

He also advocated that open source companies devote a proportion of their resources to seeding other groups to expand the ecosystem.

Myers says there are two mistakes that open source startups that want to make money should make a point of avoiding. "If you just take the community's code (and build proprietary modules around it) then you are bound to alienate the community, and I can't see that ending well," he says. "And another mistake is trying to charge too soon for premium versions before a project has a strong community around it. You need to build a large audience for an open source software project before you can start to monetize it."

The Open Source Initiatives Randal says that while most communities don't mind a company trying to monetize a project, it is key that the community still has a life of its own in the way that Red Hat has fostered the Fedora community. "What drives a community away is when you take the wind out of its sails and it feels taken over," she says. Randal adds that little things can make a big difference: if Cyanogen Inc. had chosen a different name (in place of Cyanogen OS) for its commercial product, which was based on the Cyanogen Mod project, then the community may not have felt so offended by it, she says.

Mirantis Freedland adds that open source projects should be run as meritocracies and remain open to new ideas because startups that try to micromanage the direction of a project are inevitably on the path to failure. "There are always religious zealots, but as the leader of a startup you need to limit your own influence. If you do that you won't alienate the community, but if you don't then it will come back to bite you in the end."

This story, "How to make money from open source software" was originally published by CIO.

See the article here:
How to make money from open source software | ITworld - ITworld

Teradata releases data lake platform to open source – CIO

Thank you

Your message has been sent.

There was an error emailing this page.

Teradata today released its data lake management software platform to the open source community. The project aims to help organizations address common challenges in data lake implementation, including skill shortages for engineers and administrators, learning and implementing governance best practices and driving data lake adoption beyond engineers.

Teradata is offering the new open source Kylo project under the Apache 2.0 license, and plans to offer services and support for the platform.

Kylo evolved from code developed by Teradata company Think Big Analytics over eight years of engagements with Fortune 1000 customers on more than 150 data lake projects. It was built using open source capabilities including Apache Hadoop, Apache Spark and Apache NiFi.

[ Related: 15 data and analytics trends that will dominate 2017 ]

"Open source software has an appeal to users seeking independence, cooperative learning, experimentation and flexibility for customized deployments, Rick Farnell, president of Think Big, said in a statement today.

Teradata says data lakes take too long to build, and in the average six to 12 month build cycle, users find that use cases often become out of date. In addition, while the software costs associated with data lakes may be lower, Teradata says engineering costs can mount quickly. When data lakes are successfully created, users often find them difficult to explore.

Teradata says Kylo will help organizations address these challenges, because it integrates and simplifies pipeline development and common data management tasks. That means organizations that leverage Kylo achieve faster time-to-value and greater user adoption and developer productivity. Teradata says Kylo doesn't require coding, and it offers an intuitive user interface that enables self-service data ingest. Meanwhile, reusable templates help increase productivity.

[ Analytics 50: Call for 2017 entries ]

One major telecommunications company recently implemented Kylo after a large team of 30 data engineers spent months hand-coding data ingestion pipelines. With Kylo, a single individual was able to ingest, cleanse, profile and validate the same data in less than a week, Teradata says.

The Kylo software, documentation and tutorials are now available via the Kylo project website and via the GitHub website. Think Big is offering optional services around Kylo including the following:

Thor Olavsrud covers IT security, big data, open source technology, Microsoft tools and servers for CIO.com.

Sponsored Links

Read the original post:
Teradata releases data lake platform to open source - CIO

The First Step to Uncovering Cryptography – Infosecurity Magazine

Cryptography is, by design, complex and difficult to understand. Cryptography is present in every corner of the internet or rather, it should be. Especially as the total value of the internet is anticipated to grow from $3.5 trillion last year to $5.8 trillion in 2020, according to the GSMA.

Google Brain has recently developed two artificial intelligences that evolved their own cryptographic algorithm to protect their messages from a third AI. While the study was successful, research continues to investigate how the developed algorithm actually works.

As cryptography becomes increasingly complicated and perhaps gradually more unintelligible for humans (especially as we hand it over to AI), understanding the precepts of security and cryptography is essential to all businesses, especially those that provide internet services or store customer data in internet-based systems.

Businesses in this position need to comprehend these principles to protect their assets as its unarguably critical in conducting business online in this modern age. However some of the principles underlying the complexity can be fairly accessible, so lets start there.

Symmetric and Asymmetric

Symmetric Key Cryptography is very classical in its approach. A single key is used to both encrypt and decrypt a given message. A schoolyard example of this is the Caesar Shift Cipher. In this cipher, the key is a single number between one and 25 - this key represents the number of positions the letter is slipped in the alphabet to perform the encryption and decryption of a plaintext message. This means that if the key were three, you'd translate 'A' in your plaintext to 'D' in an encrypted message. Equally, 'B' would become 'E' and 'C' would become 'F', etc.

Once a message is delivered, to decrypt a message the reader would perform the same alphabet slip, but inversely. For every 'D' found in the encrypted version, it would replace with an 'A', etc. until the message is revealed. This is an example of a substitution cipher, and even in modern symmetric encryption algorithms (such as Data Encryption Standard (DES) and Advanced Encryption Standard (AES)), substitution steps are still performed to scramble the message into a strongly encrypted message.

There are more symmetric key algorithms out there than I could comfortably hold count, and even more permutations when you consider modes of encryption - what do you do if your plaintext is not exactly a multiple of the key length? How can you parallelize the encryption task?

Suffice to say there are some industry-approved symmetric ciphers for particular tasks and for particularly risky appetites. Ive seen banks continuing to rely on 3DES and even 2DES for certain protocols, even though the use of 3DES is somewhat frowned upon.

Really, these days, not using AES-128 or AES-256 for bulk data encryption should be flagged as a risk. AES represents a very strong and universally accepted encryption technique which is also very quick to encrypt/decrypt depending on its mode of operation. This is a moving goalpost though, and businesses should engage periodically with the security industry to ensure they stay ahead of this game.

Asymmetric cryptography is quite easy to understand conceptually, but in practice is quite difficult to explain without diving into a mathematics degree. Essentially there are two keys: one is the private key which only the creator has access to; while the other is the public key which is available to everyone. The mathematical relationship between these two keys is such that with the public key, anyone can encrypt a message such that only the owner of the private key can decrypt.

One of the first practical and wide-spread algorithms to make use of asymmetric cryptographic principles was RSA. RSA makes use of the inherent difficulty in factoring the product of two prime numbers to secure messages. Research continues to speed up this factorization to break the RSA algorithm, but it remains secure making it a good choice for businesses to use with large enough key sizes. In fact, most HTTPS enabled websites today use RSA keys.

There are also other things you can do with RSA keys, such as signing and verifying documents. Together with its encryption capability, its easy to see how this versatile algorithm can be bent to not only enhance the security of an application, but can also be misconfigured to create an illusion of security. All too often Ive seen key architectures built where public keys are held secretly, for instance. Cryptography is often made very accessible by clever packaging or GUI interfaces, but its always worth getting a specialist involved to verify that the underlying cryptographic primitives are well suited to your application, rather than assuming that they are.

In practice, symmetric and asymmetric cryptographic techniques are used in combination to secure messages as they fly across the public internet. Symmetric ciphers suffer in the key management and distribution front, and asymmetric ciphers suffer as they cannot securely encrypt data longer than their key length. Symmetric ciphers are used to bulk encrypt data (webpages, images, documents, audio, video, etc.) and Asymmetric ciphers are to then used to encrypt that Symmetric key and protect it in transit.

Elliptic Curve Cryptography

A relative newcomer to the asymmetric party is Elliptic Curve Cryptography (ECC). ECC makes use of unusual properties in a two-dimensional curve to encrypt and decrypt.

ECC has two major advantages over RSA: ECC keys are significantly shorter and provide stronger security; and ECC is very easy to perform quickly on low powered devices. The features of ECC also make it a perfect candidate for the Internet of Things (IoT) and Blockchain technologies. Many progressive websites are using ECC for HTTPS sites too, which is providing better security for users.

While the security industry still approves the use of RSA with key sizes of 2048 or more, there is a big push right now to move towards the use of ECC. Its a goalpost we all know will soon move, so if you are deploying a new system, and its capable of supporting the use of ECC, (generally) do so! For example, Google and Facebook are already using ECC for their HTTPS protection.

With ECC, there are some decisions to be made as not all curves are equal! The American National Institute of Standards and Technology (NIST) have developed and published some, however concern over NSA influence of the parameters of those curves has raised the suspicions of some cryptographers as to whether backdoors have been introduced for those curves NIST approves.

There are some other curves though which have been independently researched and published which while not NIST approved, are preferred for use by those sceptics amongst the security industry.

There are lots of complex and baffling techniques being used to build the security we all rely on to conduct our business over an inherently insecure medium. For instance, research continues to be conducted into quantum cryptography whereby the quantum effect can be used to securely transmit keys or data.

Of course, encryption is essential in at least some respect for every business. However the breadth of complexity and variety of use cases within one business can make the selection process difficult.

An important step before such investigations however is to develop an understanding whether through their own learning or through consulting a partner - of what is involved with each application of cryptography, and therefore the differences and suitable uses for the individual technologies on offer. This allows prudent decisions to be made, and for a businesses and its customers to be protected appropriately.

Read the original:
The First Step to Uncovering Cryptography - Infosecurity Magazine

Julian Assange and Wikileaks are a direct threat to our security this cannot be allowed to continue – Telegraph.co.uk

Yet again Julian Assange and his deluded troupe of Wikileaks followers have provided a service that only Americas most dedicated enemies will celebrate they have laid bare more details about how the tools used by the US intelligence services to keep America and its allies and that includes Britain safe from attack.

The latest Wikileaks revelations concerns the hacking tools used by the CIA and other intelligence-gathering agencies to convert cellphones, smart televisions and other everyday household electronic devices into instruments of espionage.

As theWashington Postreports today, the thousands of files released by Wikileaks lays bare the design and capabilities of some of the USintelligence communitys most closely guarded cyberweapons and we can safely assume that many of these same tools will be used by our very own GCHQ listening post in Cheltenham.

The purpose of these...

More:
Julian Assange and Wikileaks are a direct threat to our security this cannot be allowed to continue - Telegraph.co.uk