Black Hat Roundup: Keeping Tabs on the Ones That Got Away

B. Ostergaard
B. Ostergaard

Summary Bullets:

  • With the annual Black Hat event in Las Vegas, the global Internet community celebrates its felons.
  • Like physical combat, Internet security requires a good understanding of enemy black hat strategies.

Last week saw Las Vegas hosting the 15th annual Black Hat event.  From its inception in 1997, Black Hat has grown from a single annual conference in Las Vegas (still the main event with the highest stakes) to a global conference series with annual events in Abu Dhabi, Barcelona, Las Vegas and Washington, DC.  From its nefarious roots, it spouts uncomfortable truths about the insecurities we face every day as global net workers.  It’s difficult to find any other industry where crime and passion are so closely aligned and where ‘respect’ and ‘respectable’ are terms so far apart.  Cyber-warfare for profit and power lacks any basic ‘Geneva Convention’ that could specify global rules of conduct and the means to prosecute felons. Continue reading “Black Hat Roundup: Keeping Tabs on the Ones That Got Away”

UC Hanging On Users’ Permission

M. Halama
M. Halama

Summary Bullets:

  • User adoption challenges UC deployments.
  • Permission by presence status fits some corporate cultures but clashes with others.

Customers and providers of UC services cite low adoption and usage by end users as challenging.  Both buyers and providers of UC services have a stake in encouraging end users to adopt UC services; once demanding UC projects have been rolled out, finance directors are keen to see some sorts of return on investment.  Some UC features fare better than others (typically telephony gets high use) and they vary from user to user, but the power of ‘presence status’ to give contact permission can both deter and appeal to users. Continue reading “UC Hanging On Users’ Permission”