Cisco has warned of a high priority security hole in its IOS software that could have let attackers snatch memory contents from a variety of products that could lead to the disclosure of confidential information.
+More on Network World: Cisco buys into containers with Container X acquisition+
Specifically Cisco said the vulnerability is due to “insufficient condition checks in the part of the code that handles [Internet Key Exchange] IKEv1 security negotiation requests. An attacker could exploit this vulnerability by sending a crafted IKEv1 packet to an affected device configured to accept IKEv1 security negotiation requests.”To read this article in full or to leave a comment, please click here
Cisco has warned of a high priority security hole in its IOS software that could have let attackers snatch memory contents from a variety of products that could lead to the disclosure of confidential information.
+More on Network World: Cisco buys into containers with Container X acquisition+
Specifically Cisco said the vulnerability is due to “insufficient condition checks in the part of the code that handles [Internet Key Exchange] IKEv1 security negotiation requests. An attacker could exploit this vulnerability by sending a crafted IKEv1 packet to an affected device configured to accept IKEv1 security negotiation requests.”To read this article in full or to leave a comment, please click here
If you are a federal Chief Information Security Officers – or even if you are not, you face some serious trials just to do your difficult job.Federal agencies in particular lack clarity on how to ensure that their CISOs have adequate authority to effectively carry out their duties in the face of numerous challenges, a report out this week form the watchdogs at the Government Accountability Office stated.+More on Network World: The 7 most common challenges to cloud computing+The GAO said that 13 of the 24 agencies it reviewed – including the Departments of Defense, Commerce Energy, Justice and State-- for its report “had not fully defined the role of their CISO in accordance with these requirements. For example, these agencies did not always identify a role for the CISO in ensuring that security controls are periodically tested; procedures are in place for detecting, reporting, and responding to security incidents; or contingency plans and procedures for agency information systems are in place. Thus, CISOs' ability to effectively oversee these agencies' information security activities can be limited,” the GAO stated.To read this article in full or to leave a comment, please click here
If you are a federal Chief Information Security Officers – or even if you are not, you face some serious trials just to do your difficult job.Federal agencies in particular lack clarity on how to ensure that their CISOs have adequate authority to effectively carry out their duties in the face of numerous challenges, a report out this week form the watchdogs at the Government Accountability Office stated.+More on Network World: The 7 most common challenges to cloud computing+The GAO said that 13 of the 24 agencies it reviewed – including the Departments of Defense, Commerce Energy, Justice and State-- for its report “had not fully defined the role of their CISO in accordance with these requirements. For example, these agencies did not always identify a role for the CISO in ensuring that security controls are periodically tested; procedures are in place for detecting, reporting, and responding to security incidents; or contingency plans and procedures for agency information systems are in place. Thus, CISOs' ability to effectively oversee these agencies' information security activities can be limited,” the GAO stated.To read this article in full or to leave a comment, please click here
If you are a federal Chief Information Security Officers – or even if you are not, you face some serious trials just to do your difficult job.Federal agencies in particular lack clarity on how to ensure that their CISOs have adequate authority to effectively carry out their duties in the face of numerous challenges, a report out this week form the watchdogs at the Government Accountability Office stated.+More on Network World: The 7 most common challenges to cloud computing+The GAO said that 13 of the 24 agencies it reviewed – including the Departments of Defense, Commerce Energy, Justice and State-- for its report “had not fully defined the role of their CISO in accordance with these requirements. For example, these agencies did not always identify a role for the CISO in ensuring that security controls are periodically tested; procedures are in place for detecting, reporting, and responding to security incidents; or contingency plans and procedures for agency information systems are in place. Thus, CISOs' ability to effectively oversee these agencies' information security activities can be limited,” the GAO stated.To read this article in full or to leave a comment, please click here
Brocade this week rolled out a big data center router its says will handle and help manage the massive amounts of traffic expected to cross enterprise networks in the not-to-distant future.The Brocade SLX 9850 expands the Brocade data center routing family and supports 15x more total capacity than the current Brocade MLXe box via a 230Tbps non-blocking chassis fabric capacity for 10/40/100 Gigabit Ethernet connectivity.+More on Network World: Brocade CEO says they've built an easy button for IP networks, are benefiting from SDN/NFV+To read this article in full or to leave a comment, please click here
Brocade this week rolled out a big data center router its says will handle and help manage the massive amounts of traffic expected to cross enterprise networks in the not-to-distant future.The Brocade SLX 9850 expands the Brocade data center routing family and supports 15x more total capacity than the current Brocade MLXe box via a 230Tbps non-blocking chassis fabric capacity for 10/40/100 Gigabit Ethernet connectivity.+More on Network World: Brocade CEO says they've built an easy button for IP networks, are benefiting from SDN/NFV+To read this article in full or to leave a comment, please click here
Looking to fill in some gaps in its own wireless LAN portfolio – such as security and managed services -- and jump into some new vertical markets like retail and transportation, Extreme Networks said it would buy Zebra Technologies wireless business for $55 million in cash.With the purchase, Extreme will get Zebra’s wireless LAN 802.11ac high-speed wireless access portfolio, which includes Zebra’s WiNG wireless operating system, NSight advanced network troubleshooting package as well as a managed service suite that Extreme does not currently offer, said Extreme President and CEO Ed Meyercord.+More on network World: CEO Ed Meyercord talks about Enterasys merger and an expanding set of software capabilities undergirding Extreme’s wired-wireless switches+To read this article in full or to leave a comment, please click here
The Cisco and Apple partnership has yielded a ton of new business features that include improved Wi-Fi connectivity, business app prioritization capabilities and the tighter integration of voice for collaboration – all via the today’s release of iOS 10 for Apple’s iPhone and iPad.Today’s announcement is a reflection of how important and integral mobile smartphones have become to businesses. For example Cisco earlier this year stated that smartphone traffic would exceed PC traffic by 2020. In 2015, PCs accounted for 53% of total IP traffic, but by 2020 PCs will account for only 29% of traffic. Smartphones will account for 30% of total IP traffic in 2020, up from 8% in 2015, Cisco wrote in its 11th annual Visual Networking Index in June.To read this article in full or to leave a comment, please click here
The Cisco and Apple partnership has yielded a ton of new business features that include improved Wi-Fi connectivity, business app prioritization capabilities and the tighter integration of voice for collaboration – all via the today’s release of iOS 10 for Apple’s iPhone and iPad.Today’s announcement is a reflection of how important and integral mobile smartphones have become to businesses. For example Cisco earlier this year stated that smartphone traffic would exceed PC traffic by 2020. In 2015, PCs accounted for 53% of total IP traffic, but by 2020 PCs will account for only 29% of traffic. Smartphones will account for 30% of total IP traffic in 2020, up from 8% in 2015, Cisco wrote in its 11th annual Visual Networking Index in June.To read this article in full or to leave a comment, please click here
The Cisco executive wheels keep churning. Today the person in charge of Cisco’s enterprise engineering organizations Robert Soderbery said he has left the company via a post on LinkedIn.
More on Network World: Cisco: IP traffic will surpass the zettabyte level in 2016+
Soderbery wrote: “It has been a fascinating time to be at Cisco and there are many experiences I take away with me. It was an incredibly diverse set of challenges, from the incessant battle with the likes of HP and Huawei for market share, to creating new products, businesses and even markets. My colleagues and I were fortunate to be early movers in IoT and the digital transition, which led to new businesses in new industries for Cisco; manufacturing, transportation, utilities and smart cities. In October of 2012 I met the Meraki [a company Cisco acquired in 2012] founding team and realized that the amazing company they built, when combined with the power of Cisco, would be something very special, which indeed turned out to be true. And of course the more recent work in networking innovation with Cisco Digital Network Architecture, and driving the transition to a software centric architecture has been exciting Continue reading
The Cisco executive wheels keep churning. Today the person in charge of Cisco’s enterprise engineering organizations Robert Soderbery said he has left the company via a post on LinkedIn.
More on Network World: Cisco: IP traffic will surpass the zettabyte level in 2016+
Soderbery wrote: “It has been a fascinating time to be at Cisco and there are many experiences I take away with me. It was an incredibly diverse set of challenges, from the incessant battle with the likes of HP and Huawei for market share, to creating new products, businesses and even markets. My colleagues and I were fortunate to be early movers in IoT and the digital transition, which led to new businesses in new industries for Cisco; manufacturing, transportation, utilities and smart cities. In October of 2012 I met the Meraki [a company Cisco acquired in 2012] founding team and realized that the amazing company they built, when combined with the power of Cisco, would be something very special, which indeed turned out to be true. And of course the more recent work in networking innovation with Cisco Digital Network Architecture, and driving the transition to a software centric architecture has been exciting Continue reading
Researchers from Carnegie Mellon University say they have developed an open source algorithm that can help spot social media frauds trying to sway valuable community influence.+More on Network World: Star Trek turns 50!+“Given the rise in popularity of social networks and other web services in recent years, fraudsters have strong incentives to manipulate these services. On several shady websites, anyone can buy fake Facebook page-likes or Twitter followers by the thousands. Yelp, Amazon and TripAdvisor fake reviews are also available for sale, misleading consumers about restaurants, hotels, and other services and products. Detecting and neutralizing these actions is important for companies and consumers alike,” the researchers wrote in a paper outlining their algorithm known as FRAUDAR.To read this article in full or to leave a comment, please click here
Researchers from Carnegie Mellon University say they have developed an open source algorithm that can help spot social media frauds trying to sway valuable community influence.+More on Network World: Star Trek turns 50!+“Given the rise in popularity of social networks and other web services in recent years, fraudsters have strong incentives to manipulate these services. On several shady websites, anyone can buy fake Facebook page-likes or Twitter followers by the thousands. Yelp, Amazon and TripAdvisor fake reviews are also available for sale, misleading consumers about restaurants, hotels, and other services and products. Detecting and neutralizing these actions is important for companies and consumers alike,” the researchers wrote in a paper outlining their algorithm known as FRAUDAR.To read this article in full or to leave a comment, please click here
Boldly going where no man has gone beforeImage by Reuters/ Kevin LamarqueWho knew that a TV series that debuted on Sept. 8, 1966 would have such a lasting impact on the world? Star Trek premiered on that date "to boldly go where no man has gone before." Indeed, the U.S.S. Enterprise and its crew over the years since have changed wildly (through five TV series and 13 movies) to alter our perception of what space and space exploration might be. Here we take a little look some of the interesting history and events around the show.To read this article in full or to leave a comment, please click here
The U.S. Department of Justice today said Marcel Lazar, aka hacker “Guccifer,” was sentenced today to 52 months in prison for unauthorized access to a protected computer and aggravated identity theft.+More on Network World: FBI: Bank robbery? There’s an app for that+Lazar, originally from Romania, was extradited to the U.S. earlier this year and was awaiting this sentencing for breaking into the email and social media accounts of various U.S. officials including former U.S. Secretary of State Colin Powell as well as a the daughter of former President George H.W. Bush.To read this article in full or to leave a comment, please click here
The U.S. Department of Justice today said Marcel Lazar, aka hacker “Guccifer,” was sentenced today to 52 months in prison for unauthorized access to a protected computer and aggravated identity theft.+More on Network World: FBI: Bank robbery? There’s an app for that+Lazar, originally from Romania, was extradited to the U.S. earlier this year and was awaiting this sentencing for breaking into the email and social media accounts of various U.S. officials including former U.S. Secretary of State Colin Powell as well as a the daughter of former President George H.W. Bush.To read this article in full or to leave a comment, please click here
Open and easy access to rare earth materials -- which are critical parts of electronics in everything from cars to computers -- is still more a dream than reality.One of the ways to address that anxiety is to harvest and reuse such material from used electronic components – in particular computer hard drives.+More on Network World: Quick look: World’s largest e-waste dump+To read this article in full or to leave a comment, please click here
A 17.5 foot long, 5.5 foot wide and 1.5 foot tall the 3D printed aircraft design tool has earned the title of largest solid 3D printed item by Guinness World Records.The 1,650 lb. apparatus known as a trim-and-drill tool is comparable in length to a large sport utility vehicle and will ultimately be tested for use in building the Boeing 777X passenger jet. Basically the tool will be used to secure the jet’s composite wing skin for drilling and machining before assembly according to researchers at the Department of Energy’s Oak Ridge National Laboratory (ONRL) who developed the tool.+More on Network World: The hottest 3D printing projects+To read this article in full or to leave a comment, please click here
A 17.5 foot long, 5.5 foot wide and 1.5 foot tall the 3D printed aircraft design tool has earned the title of largest solid 3D printed item by Guinness World Records.The 1,650 lb. apparatus known as a trim-and-drill tool is comparable in length to a large sport utility vehicle and will ultimately be tested for use in building the Boeing 777X passenger jet. Basically the tool will be used to secure the jet’s composite wing skin for drilling and machining before assembly according to researchers at the Department of Energy’s Oak Ridge National Laboratory (ONRL) who developed the tool.+More on Network World: The hottest 3D printing projects+To read this article in full or to leave a comment, please click here