Author Archives: Greg Ferro
Author Archives: Greg Ferro

Why BGPSec turned out the way it did ?
On this episode of Priority Queue, which is sponsored today by Cisco, we tackle the General Data Protection Regulation, or GDPR.
This new regulation lays out data privacy and protection obligations for organizations that handle data of EU citizens, including loss prevention, breach notification requirements, and serious fines and penalties for violations.
We delve into GDPR requirements with Equilibrium Security and ePlus/IGX Global, two Cisco partners who share practical insight and advice for dealing with GDPR.
Our guests are Anish Chauhan, Director at Equilibrium Security; and Alex Goldstein, Security Architect at ePlus/IGX Global.
We’ll discuss how to break down and understand requirements, the importance of a risk assessment and gap analysis, and how to use security and management tools to comply with the regulations.
General Data Protection Regulation (GDPR) – Cisco
Equilibrium Cyber Security Services
Equilibrium Cyber Security Podcasts – Equilibrium
2017 DBIR: Understand Your Cybersecurity Threats – Verizon Enterprise Solutions
The post PQ 147: Connecting Security And GDPR Compliance (Sponsored) appeared first on Packet Pushers.
This article was first published in Human Infrastructure Magazine at PacketPushers.net. The cost selling products to the Enterprise is large. How large ? As a rough guide, 20% of a typical IT companies cost is sales and marketing. The number varies, more when a company has a push to grow quickly (Palo Alto Networks had […]
Stop pretending that you got a good deal when you paid premium prices for goods that cost a fraction of the sale price to make.

A deep, comprehensive review of BPF

Because iptables was never meant to do what it does
If you were a black hat hacker considering targets of opportunity, a service provider network might seem very interesting. The infrastructure is critical for commerce and governmental operations. The data carried is potentially interesting and valuable. And indeed, we know that carrier networks are highly targeted.
In this sponsored show with Cisco, we discuss how to think deeply about security on mission critical networks and protecting routers and other devices not behind a firewall.
That means making certain that the network operating system is running exactly the code we think it is. That the devices on the network are devices we know and can trust. And then once we ve secured the network, how we can use it as a platform to deliver additional security services.
Our guests are Dan Backman and Kaarthik Sivakumar of Cisco. Dan is a Technical Marketing Engineer on the Service Provider team, and Kaarthik is a Security Architect for IOS XR Engineering.
We discuss the general risks service providers face and why trusted network devices are essential. Then we dive into technical details on how Cisco protects IOS XR, including the Trust Anchor Module, how to audit trusted networks, and how to build Continue reading
There are many ways that buyers of Enterprise IT are stupid. Mostly its bad leadership and poor management that leads to poor decisions and processes like ITIL. Sometimes its pride preventing you from admitting failure, or the allure of a free steak lunch (putting one over your salary owner by paying for it with overpriced […]
WiFi isn’t fit for use in Location Services
In the ten or so years I ve been blogging, Ivan Pepelnjak has been constant figure in the tech industry. His prolific blogging and sharing of knowledge is one of the inspirations for my own entry into blogging. Over the years, we have usually agreed violently on most things and disagreed on others.
His ipSpace website has grown from a blog into a membership and more recently into a consulting service.
On today’s Priority Queue, Ivan and I talk about automation, intent, product quality and what can be done to improve it, the direction private clouds might take, and whatever else catches our fancy.
Paessler AG is the maker of PRTG Network Monitor. PRTG monitors your whole IT infrastructure 24/7 and alerts you to problems before users even notice. Find out more about the monitoring software that helps system administrators work smarter, faster, better. Visit paessler.com today.
The post PQ 145: Greg And Ivan Have A Chat appeared first on Packet Pushers.
Its not complicated (natch). Its distributed. And we don’t have visibility to know. Distributed Systems What makes networking hard ? A network is a distributed system where state must be shared between devices that are unreliably connected. Its a fallacy that a network will ever be reliable or predictable. Skills Network technologies and their fundamentals […]
People think that big companies are too big to fail and thats why you should buy from big companies. Except that this is no longer true. To whit: HPE just divested all of its software assets. While HPE maintains a substantial interest in the new owner, I’m confident that HPE will walk away from those […]
Modest skills in programming are necessary for operations.