VMware: Cloud-centric businesses need a cloud-centric network

It’s May, and that means all the April showers we had will soon bring spring flowers. April and May are also busy conference months, as many vendors host customer, partner, or analyst events. This week, it was Dell’s turn as the company held its first-ever Dell Technology World. Dell has obviously had other user events before, including Dell World and Dell-EMC World, but the naming of this one is indicative of how Dell is now one company and there’s better product and go-to-market integration between Dell, EMC and VMware.

Jeff Man, Recap of RSAC – Paul’s Security Weekly #557

This week in the Topic Segment, our very own Jeff Man gives us a recap on the 2018 RSA Conference! He discusses HackerOne CEO talking Bug Bounty programs, DevSecOps day at RSA demonstrates how the thinking around secure software has evolved, if it’s time to kill the Pen Test, and more!

Misty Robotics Builds on Developer Platform With New Personal Robot

Advertisement

Editor’s Picks

Misty Robotics announced their developer platform, Misty I, just a few months ago. Misty I was a hand-built prototype, with similar essential functionality in hardware and software to a more refined production robot that the company planned to release later in the year. Later in the year has now arrived, and today Misty Robotics is launching a crowdfunding campaign for a much more polished personal robot, Misty II, which can be yours to program starting at $1,500.

IDG Contributor Network: Adopt the NIST cybersecurity framework (CSF) and harness the wisdom of crowds

The risks that come with cybersecurity can be overwhelming to many organizations. Building out a robust cybersecurity program is often complex and difficult to strategize for any organization, regardless of size. Frameworks are not a new concept to cybersecurity professionals. The benefits are immense – nor do they need to be complex to be effective. In this article, I will discuss some of the historical and conceptual links to our modern-day frameworks such as the NIST CSF.

Tenable Research Advisory: Critical Schneider Electric InduSoft Web Studio and InTouch Machine Edition Vulnerability

Tenable Research recently discovered a new remote code execution vulnerability in Schneider Electric’s InduSoft Web Studio and InTouch Machine Edition. The applications contain an overflow condition that is triggered when input is not properly validated. This allows an attacker to force a stack-based buffer overflow, resulting in denial of service or potentially allowing the execution of arbitrary code.