Author Archives: Greg Ferro
Author Archives: Greg Ferro
Why BGPSec turned out the way it did ?
Apparently Net Neutrality repeat
On this episode of Priority Queue, which is sponsored today by Cisco, we tackle the General Data Protection Regulation, or GDPR.
This new regulation lays out data privacy and protection obligations for organizations that handle data of EU citizens, including loss prevention, breach notification requirements, and serious fines and penalties for violations.
We delve into GDPR requirements with Equilibrium Security and ePlus/IGX Global, two Cisco partners who share practical insight and advice for dealing with GDPR.
Our guests are Anish Chauhan, Director at Equilibrium Security; and Alex Goldstein, Security Architect at ePlus/IGX Global.
We’ll discuss how to break down and understand requirements, the importance of a risk assessment and gap analysis, and how to use security and management tools to comply with the regulations.
General Data Protection Regulation (GDPR) – Cisco
Equilibrium Cyber Security Services
Equilibrium Cyber Security Podcasts – Equilibrium
2017 DBIR: Understand Your Cybersecurity Threats – Verizon Enterprise Solutions
The post PQ 147: Connecting Security And GDPR Compliance (Sponsored) appeared first on Packet Pushers.
Stop pretending that you got a good deal when you paid premium prices for goods that cost a fraction of the sale price to make.
A deep, comprehensive review of BPF
Because iptables was never meant to do what it does
If you were a black hat hacker considering targets of opportunity, a service provider network might seem very interesting. The infrastructure is critical for commerce and governmental operations. The data carried is potentially interesting and valuable. And indeed, we know that carrier networks are highly targeted.
In this sponsored show with Cisco, we discuss how to think deeply about security on mission critical networks and protecting routers and other devices not behind a firewall.
That means making certain that the network operating system is running exactly the code we think it is. That the devices on the network are devices we know and can trust. And then once we ve secured the network, how we can use it as a platform to deliver additional security services.
Our guests are Dan Backman and Kaarthik Sivakumar of Cisco. Dan is a Technical Marketing Engineer on the Service Provider team, and Kaarthik is a Security Architect for IOS XR Engineering.
We discuss the general risks service providers face and why trusted network devices are essential. Then we dive into technical details on how Cisco protects IOS XR, including the Trust Anchor Module, how to audit trusted networks, and how to build Continue reading
A personal work philosophy I have adopted.
WiFi isn’t fit for use in Location Services
In the ten or so years I ve been blogging, Ivan Pepelnjak has been constant figure in the tech industry. His prolific blogging and sharing of knowledge is one of the inspirations for my own entry into blogging. Over the years, we have usually agreed violently on most things and disagreed on others.
His ipSpace website has grown from a blog into a membership and more recently into a consulting service.
On today’s Priority Queue, Ivan and I talk about automation, intent, product quality and what can be done to improve it, the direction private clouds might take, and whatever else catches our fancy.
Paessler AG is the maker of PRTG Network Monitor. PRTG monitors your whole IT infrastructure 24/7 and alerts you to problems before users even notice. Find out more about the monitoring software that helps system administrators work smarter, faster, better. Visit paessler.com today.
The post PQ 145: Greg And Ivan Have A Chat appeared first on Packet Pushers.
Modest skills in programming are necessary for operations.