Posts tagged: security

Xerox Hosts Security Summit at New York Stock Exchange

Rebecca Schiffenhaus
 Jan 24, 2018

CNBC Bell Ringing

On January 23rd, 2018, Xerox hosted the Xerox Security Summit at the New York Stock Exchange. Understanding that cybersecurity has become essential for MFPs and printers as “always on end-points”, Xerox brought together thought leaders and partners in this field to join Xerox for the bell ringing and an afternoon of cybersecurity conversations. Mike Feldman, Executive VP and President, NAO, Xerox Corporation, opened the event by reflecting on the rebirth of Xerox one year ago, when Conduent became a separate company and Xerox was able to center itself.  In this past year Xerox has had many accomplishments, including a huge launch of 29 new devices, growth in ConnectKey and apps, and new devices and inks for production print.

Alissa Johnson, Chief Information Security Officer and former Deputy CIO for the White House opened the sessions by emphasizing awareness. Johnson said that breaches can usually be traced to a visible IP, an open port, or a vulnerable service. To protect these areas, Johnson had three tips, 1. Hunt- always assume there is a compromise, 2. Zero trust- whitelist instead of allowing, and 3. Cognitive security- develop advanced AI. Candace Worley, Vice President and Chief Technical Strategist for McAfee, discussed cybersecurity fears around automation. Namely, individuals fear that the system will malfunction, and they will be held accountable. Worley shared some important developments in this field, like the shift from prior work environments, with only a few operating systems and devices, to the current, complex network ecosystems with virtual desktops, countless devices, cloud services and more. Worley also discussed the anticipated labor shortage in cybersecurity, as there is a lack of talent to fill the jobs necessitated by cybersecurity. It is anticipated that by 2022 over 70% of jobs will go unfilled, and 9 out of 10 cybersecurity workers believe that they will need technology to fill that talent gap. Worley emphasized the need for more open culture, with sharing across vendors, to develop the technology to handle this.

Sergio Caltagirone, Director of Threat Intelligence and Analytics at Dragos, discussed the offensive and defensive sides of hacking. Encouraging everyone to be realistic about security, he stated that there are hunters and hunted. Caltagirone shared the Defender’s dilemma, “the adversary needs to be right once, the defender needs to be right every time,” but Caltagirone emphasized that the defender has the power, “the defender controls the space”. By shaping and controlling the environment, security experts have the upper hand so long as they maintain it. Dov Yoran, Sr. Director, Strategy and Business Development Security Group for Cisco, shocked and awed sharing this video, discussing the industrialization of cybercrime and how prevalent and intelligent it has become. Steve Hoover, CTP, Xerox, and Ersin Uzun, Vice President, Director of System Sciences Laboratory, PARC, discussed how approaching cybersecurity can emulate the way we approach parenting. Teaching security programs how to “think” by interrupting processes and asking it to explain why it made choices and having teaching moments for the next event. This leads to greater trust and faith in the program and helps preserve the human role in cybersecurity.

Over lunch, famed hacker Kevin Mitnick, showed us all how easy it was to fall victim to an intelligent cyber-scheme and made everyone feel like throwing their devices into the Hudson. He shared tips and tricks about phishing, ransomware, malware, cloning HID cards, and proved just how simple it would be to be targeted through a great number of innocuous daily business processes. During the final panel, the panelists were asked which they would prioritize: protection, detection, or prevention and the unanimous winner was detection. Detection was emphasized as necessary for expedient handling, as well as integral as a learning opportunity. To end the event, the panelists  shared what would be the one piece of advice they’d give for the day:

  • The most important things are integration and automation, this allows you to react faster and technology to work together.”- Dov Yoran
  • Patch quickly! It’s old school advice but do it. Patch rapidly because people hack rapidly.” – Candace Worley
  • Be proactive about insecurities- if your day to day is just monitoring, you’ve already lost.”- Sergio Caltagirone
  • Stay current.” – Steve Hoover
  • Educate your people about security, people are still a major source of access.”- Ersin Uzun

Xerox introduced the personified tenants of its security approach as characters of a “Super Cyber Squad”- the Protector, the Detector, the Preventer, and the Partner. It’s abundantly clear that conversations about cybersecurity are vital, and the more our industry collaborates and brings together different players, the better we will become achieving those tenants. This summit, and ongoing opportunities for sharing and learning among vendors, customers, partners, dealers, and subject matter experts, help to shape the future of cybersecurity.

 

Kevin Mitnick cloning an HID card 3 different ways in under two minutes.

Panel: Alissa Johnson, Ersin Uzun, Steve Hoover, Sergio Caltagirone, Candace Worley, and Dov Yoran 

 

 

HP Announces Software to Enhance Mobile Printing Experience

Allison Correia
 Jun 2, 2016

 

hp logo

Following the spring hardware updates, today HP announced a range of solutions and enhancements to their mobile printing and print analytics solutions strategies for business. HP is addressing IT needs and end user expectations with these new solutions that attend to security challenges, cost containment, deployment issues, and device lifecycle management that IT struggles with, while also addressing end user wants such as flexibility and device diversity. Read more »

HP Introduces Next-Generation LaserJet Printers

Christine Dunne Dunne
 Mar 10, 2015

Today, HP announced the global launch of a “re-engineered, sleek” new series of A4 color LaserJet printers intended to make businesses more efficient. The devices—which consist of one MFP and three single function printers—are a significant departure from previous LaserJet products. Comprising new “JetIntelligence” technology, they take up 40% less space; use up to 53% less energy; and wake up, print, and duplex “in a fraction of the time.”

The “enterprise” M552 and M553 single function printers, for instance, offer 100% duplex productivity—meaning that in addition to printing 40 one-sided pages per minute they can achieve 40 images per minute spread across two sides of the page. HP says the announcement represents its most significant laser printing re-engineering since the launch of the first LaserJet in 1984.

Footprint of New HP LaserJet Devices

Source: HP press event in New York City

Read more »

HP expands further into business inkjet with new enterprise devices

Christine Dunne Dunne
 Mar 25, 2014

In spring 2013 HP shook up the office printing industry with the introduction of the Officejet Pro X page-wide business inkjet devices. This spring HP is going further and has launched an enterprise version of the Officejet Pro X series.

Design of HP's new Officejet Enterprise Color MFPs/single-function printers

InfoTrends has taken a keen interest in the development of the business inkjet category. A global study revealed that laser users were willing to accept the idea of inkjet technology in the office more readily than perhaps many in the industry previously realized. It is therefore with great interest that we have received one of the new models to test in our own office. Read more »

How to Become a Futurist & Other Lessons Learned at AdTech New York

Jim Hamilton
 Nov 21, 2013

I didn’t expect to learn how to become a futurist at AdTech New York (November 6-7, Javits Center, New York City), but it’s one of the many lessons I learned from a day on the show floor and at the conference.

How to Become a Futurist — Sheryl Connelly, a futurist at Ford, gave the Thursday morning keynote and it was a sobering ten point summary of the challenges facing the world. Here are those challenges in short form Read more »

Are Your Solutions Advancing the Healthcare Market?

Other Posts
 Mar 26, 2013

Earlier this month, I attended the HIMSS 2013 conference, arguably the largest healthcare IT conference in the country. HIMSS attracted over 1,000 exhibitors and over 40,000 attendees, including physicians, nurses, IT administration, and healthcare providers. Mobile health (mHealth), integration, collaboration, and analytics were a big focus this year, however, much of this new mobile health technology already has widespread presence within the market. The bigger questions now are whether healthcare organizations are utilizing this technology, how it’s being implemented, and what the impacts are on patient care. Even more importantly, though, is how OEMs are addressing these trends, as many of them maintain a heavy focus on copiers and scanners rather than mHealth initiatives.

Read more »

Mobile, Mobile, Mobile – Florida Education Technology Conference Highlights

Other Posts
 Feb 5, 2013

If there was one word I could use to describe FETC 2013, it’d be mobile. Two words? iPads and Security. The exhibit hall contained a variety of vendors offering course/class management software, education social media platforms, grading software, to mobile device management vendors; and almost all of them included a mobile component with their offering. While the conference focused more around the K-12 market, many of the exhibitors played within the higher education space. Attendees included teachers, administrators, and IT directors/coordinators with either two major concerns in mind: how can I optimize or secure my current mobile device infrastructure or how do I implement a successful BYOD program? Read more »

A Secure Relationship on Valentine’s Day: Xerox and McAfee

Jon Reardon
 Feb 14, 2012

This blog originally posted on the Real Business At Xerox blog. 

We all know people who send personal information from their workplace computers. Maybe you’ve done it. It’s not always easy to separate work from personal life.

Take Valentine’s Day as the example. Today is a day when you realize how widespread the use of personal devices in the workplace has become. As employees are busy sending sweet messages to their loved ones via handheld devices, tablets, webcams, even printers, copiers or multifunction devices, the truth is that company data may be at risk. Read more »

BYOD: Bring-Your-Own-Device to Work…But Don’t Expect Much Security

Other Posts
 Jun 24, 2011

Consumerization of IT is one of the major forces shifting the way office workers and organizations operate. Although still in its infancy, we can already see the effects of consumers bringing in personal devices and using personal online services within the workplace. And thanks to tech-savvy Generation Y’ers and Z’ers (born with iPod-in-hand), the consumerization-of-IT trend is only going to grow, and rapidly at that.

Because PCs have been the standard computing device for quite some time, an organization’s IT department is able to easily administer access and information between a desktop computer and a company network. Today, the line differentiating work devices and personal devices is rather fuzzy, and the line between how those devices are used is even fuzzier. An organization’s IT department now has to juggle multiple mobile devices where the majority of them are not company-owned. Read more »

Cloudy with a Chance of Outages and Breaches

Other Posts
 Apr 28, 2011

Last week’s outage of Amazon’s EC2 cloud services and Sony’s hacked PlayStation Network brought us down from cloud nine; forcing upon us the same questions of security and reliability within cloud computing and online networks that has been swirling around the IT industry for quite some time.

Amazon’s EC2 cloud services failure affected sites like Foursquare, Reddit, and Quora, while Sony’s PlayStation Network outage continues to frustrate gamers entering its eighth day. More importantly, however, is credit card information and personal data that was allegedly stolen from Sony PlayStation users.

Read more »

2016 InfoTrends, Inc.

WordPress Appliance - Powered by TurnKey Linux