What do you get when you provide 12,800 kids with technology and programming classes? You get 12,800 people who are getting ready for the modern workforce of today and tomorrow. You also get 12,800 potential vulnerabilities. With the growing quantity of phishing emails, ransomware and malware that Coppell Independent School District (CISD) already had to combat with a small staff, this Texas school system was looking for smarter solutions.
“All these students who have taken programming classes, they’re often looking to bypass administrative privileges, looking for ways around the internet filters, or looking for ways to play games on the school computers,” said Stephen McGilvray, CISD Executive Director of Technology. “So, in addition to all these external threats we have to worry about, we also have a bunch of homegrown, internal threats.”
The school district recently underwent a data center refresh, which included updates for VMware vSphere, VMware App Volumes and VMware Horizon, and launched the implementation of VMware NSX Data Center. During the refresh, their VMware sales rep told them about a relatively new security product called VMware AppDefense.
At its core, AppDefense shifts the advantage from attackers to defenders by determining and ensuring good application Continue reading
Nicolas Noviello joined Symantec following its $4.65 billion acquisition of his old firm Blue Coat in 2016.
In this Network Collective Short Take, Russ and Eyvonne share their thoughts on some of the things you should consider learning in 2019.
The post Short Take – Things To Learn In 2019 appeared first on Network Collective.
Nutanix CEO calls VMware a bully; AT&T touts successes while it plots layoffs; demand for Kubernetes surges.

Every and any decision is a form of lock-in. The decision to buy on-brand or off-brand, open or closed source, vendor A or vendor B has consequences that follow.
The post Don’t Focus on Lock-in, Focus On The Undo appeared first on EtherealMind.
The report, which was sourced by ZTE, does admit that its findings aren’t likely to change the minds of many operators.
The initial botnet actor sold the proxy botnet as a service to other attackers who then used it for credential brute forcing, video advertisement fraud, and general traffic obfuscation.
Today's Network Break analyzes a slew of Cisco Live announcements including ACI Anywhere and HyperFlex for edge deployments, Huawei's run-ins with U.S. prosecutors, financial results from Juniper Networks and Mellanox, and more tech news.
The post Network Break 220: Cisco Announces ACI Anywhere; U.S. Prosecutors Target Huawei appeared first on Packet Pushers.

Government hacking: Japanese government workers will be able to hack into residents’ Internet of Things devices in an attempted survey of IoT insecurity, ZDNet reports. The Japanese government recently approved an amendment that allows the survey by employees of the National Institute of Information and Communications Technology. The government hacking effort is part of Japan’s preparation for the Tokyo 2020 Summer Olympics. Government officials are worried that other hackers might use compromised IoT devices to launch attacks against the games.
Evolving encryption: A story at TechTarget looks at the evolution of the Let’s Encrypt certificate authority, established in 2016. The free and automated certificate authority is “changing the industry in interesting ways” by making the certificate process less cumbersome, the story says. Meanwhile, a story at CSO Online looks at the Electronic Frontier Foundation’s efforts to encrypt the entire Internet and says that Let’s Encrypt is an important piece of that campaign.
Lagging encryption: Less than 30 percent of enterprise businesses encrypt their data across their on-premises environments, within their cloud services or on their mobile devices, according to a survey from French aerospace and security vendor Thales Group. A Computer Business Review story notes that encryption still isn’t widespread, Continue reading

Getting concerned about scummy and scummy approaches by market and financial research companies for advisory services.
The post Possible Analyst Scam: Your Experience for a Sample Report appeared first on EtherealMind.
This is part 4 of a six part series based on a talk I gave in Trento, Italy. To start from the beginning go here.
We don’t believe that any of our software, not a single line of code, provides us with a long-term advantage. We could, today, open source every single line of code at Cloudflare and we don’t believe we’d be hurt by it.
Why don’t we? We actually do open source a lot of code, but we try to be thoughtful about it. Firstly, a lot of our code is so Cloudflare-specific, full of logic about how our service works, that it’s not generic enough for someone else to pick up and use for their service. So, for example, open sourcing the code that runs our web front end would be largely useless.
But other bits of software are generic. There’s currently a debate going on internally about a piece of software called Quicksilver. I mentioned before that Cloudflare used a distributed key-value store to send configuration to machines across the world. We used to use an open source project called Kyoto Tycoon. It was pretty cool.
But Continue reading
I spent most of last week with a great team of fellow networking and security engineers in a windowless room listening to good, bad and plain boring presentations from (mostly) Cisco presenters describing new technologies and solutions – the yearly Tech Field Day Extra @ Cisco Live Europe event.
This year’s hit rate (the percentage of good presentations) was about 50% and these are the ones I found worth watching (in chronological order):
Read more ...3 steps to configure Syslog. Define a logging policy Define remote logging servers Define a logging source address (optional) Configuration Log to a local file. Logs are stored in the /var/log directory. Define a logging policy. cmd set system syslog user * any...continue reading
Not that it helps that much but keep in mind: you're not the only one. Here's a wonderful blog post by Al Rasheed.
Oh, and if you still feel like a fraud after being in the industry for years (check out the Impostor Syndrome), you're not alone either.