Archive

Category Archives for "Networking"

Experts: The future of IoT will be fascinating and also potentially catastrophic

The Internet of Things is going to be inescapable, pervasive, and riddled with insecurity, but it’s at least going to be interesting, according to a raft of prominent technologists surveyed by the Pew Research Center.Unsurprisingly, IoT security was the name of the game, the experts agreed, but it’s the effect of the present insecurity in IoT and the possible future effects that have them fascinated. The security breaches that have happened already were clearly on the minds of the respondents. Not only has IoT contributed to general online chaos via the Mirai botnet and other incidents, the trend of integrating connected devices ever more deeply into vital infrastructure reveals the potential for even more destructive attacks.To read this article in full or to leave a comment, please click here

Feds charge NSA contractor for leaking Top Secret report about Russia hacking election

Russian military intelligence hackers, believed to be working within the Russian General Staff Main Intelligence Directorate (GRU), tried to break into VR Systems, a company that sells voting registration equipment which was used in the 2016 election. That’s what the NSA determined, according to a classified intelligence report which was leaked to The Intercept.An hour after The Intercept published the NSA document, the Justice Department announced charges against Reality Leigh Winner, a 25-year-old intelligence contractor working for Pluribus International Corporation in Georgia. She had only been working as a Pluribus contractor since Feb. 13. Winner, accused of “removing classified material from a government facility and mailing it to a news outlet,” has been charged with Espionage Act.To read this article in full or to leave a comment, please click here

Feds charge NSA contractor for leaking Top Secret report about Russia hacking election

Russian military intelligence hackers, believed to be working within the Russian General Staff Main Intelligence Directorate (GRU), tried to break into VR Systems, a company that sells voting registration equipment which was used in the 2016 election. That’s what the NSA determined, according to a classified intelligence report which was leaked to The Intercept.An hour after The Intercept published the NSA document, the Justice Department announced charges against Reality Leigh Winner, a 25-year-old intelligence contractor working for Pluribus International Corporation in Georgia. She had only been working as a Pluribus contractor since Feb. 13. Winner, accused of “removing classified material from a government facility and mailing it to a news outlet,” has been charged with Espionage Act.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Armis wants to resolve the IoT security issue

The Internet of Things (IoT) is a big deal. A really big one.There are approximately 8 billion connected devices on the market today, collectively accounting for 50 percent of internet traffic. And that is but a taste of the future—the number of devices is anticipated to increase 150 percent in the next three years. And where growth like that is predicted, every man and his dog is keen to grab market share. The security for IoT space is no different.+ Also on Network World: A lack of IoT security is scaring the heck out of everybody + There are some justified reasons why security in this new IoT context will be different. Connected devices (e.g., laptops, webcams, HVAC systems, etc.) are designed to connect wirelessly, without corporate oversight or control. This creates a dynamic, ever-expanding matrix of connections that not only boosts employee productivity and business efficiency, but simultaneously flies under the radar of security.To read this article in full or to leave a comment, please click here

Armis wants to resolve the IoT security issue

The Internet of Things (IoT) is a big deal. A really big one.There are approximately 8 billion connected devices on the market today, collectively accounting for 50 percent of internet traffic. And that is but a taste of the future—the number of devices is anticipated to increase 150 percent in the next three years. And where growth like that is predicted, every man and his dog is keen to grab market share. The security for IoT space is no different.+ Also on Network World: A lack of IoT security is scaring the heck out of everybody + There are some justified reasons why security in this new IoT context will be different. Connected devices (e.g., laptops, webcams, HVAC systems, etc.) are designed to connect wirelessly, without corporate oversight or control. This creates a dynamic, ever-expanding matrix of connections that not only boosts employee productivity and business efficiency, but simultaneously flies under the radar of security.To read this article in full or to leave a comment, please click here

Armis wants to resolve the IoT security issue

The Internet of Things (IoT) is a big deal. A really big one.There are approximately 8 billion connected devices on the market today, collectively accounting for 50 percent of internet traffic. And that is but a taste of the future—the number of devices is anticipated to increase 150 percent in the next three years. And where growth like that is predicted, every man and his dog is keen to grab market share. The security for IoT space is no different.+ Also on Network World: A lack of IoT security is scaring the heck out of everybody + There are some justified reasons why security in this new IoT context will be different. Connected devices (e.g., laptops, webcams, HVAC systems, etc.) are designed to connect wirelessly, without corporate oversight or control. This creates a dynamic, ever-expanding matrix of connections that not only boosts employee productivity and business efficiency, but simultaneously flies under the radar of security.To read this article in full or to leave a comment, please click here

In Our New Changed World We Need New Tools (Remarks at Next Generation Internet Summit)

On 6 June 2017, Internet Society President & CEO Kathy Brown spoke at the Opening Session of the Next Generation Internet Summit at the European Parliament in Brussels, Belgium. These are her remarks as prepared.


Good Afternoon ladies and gentleman, Honorable colleagues and friends.  

Thank you, President Bonvicini for your very gracious invitation to speak at this prescient Summit on the Next Generation Internet. 

Ms. Kathryn Brown

Introducing NetQ — a fabric validation system providing unparalleled visibility

Today is a big day for us over here at Cumulus Networks! We are pleased to announce the launch of a brand new product designed to bring you unparalleled network visibility & remediation.  The newest addition to the Cumulus Networks portfolio, NetQ, is a telemetry-based fabric validation system that ensures the network is behaving as it was intended to. It allows you to test, validate and troubleshoot using advanced fabric-wide telemetry and Cumulus Linux.

Why NetQ?

To respond to the evolving industry, increasing business demands and growth, many companies have started the web-scale journey by deploying a fully programmable fabric with fully automated configurations across an open network infrastructure. Companies that have implemented some of these best practices are quickly seeing the benefits of agility, efficiency and lowered costs.

However, these organizations are also facing some unknowns: They are worried about making ad-hoc changes that disrupt the network and they can’t easily demonstrate “network correctness.” They’re interested in moving towards intent-based networking methods, but don’t have the right technology in place to do so.

Traditional operations tools and workflows weren’t built for the speed and scale that a modern cloud data center needs as they are manual, reactive and Continue reading

Don’t be left behind by IPv6 deployment, ISOC warns enterprises

They have the resources, the expertise and, though they may not realize it, the need -- but it turns out that enterprises are often the ones that don't yet have IPv6.That's the finding of the Internet Society its latest report on IPv6 deployment, published five years after the organization began a worldwide push to deploy the new addressing protocol and almost 20 years after the protocol was defined.Around 13 percent of the top one million websites is inviting IPv6 traffic today, it said, citing a Hurricane Electric analysis of data provided by Amazon.com. That figure rises to around 22 percent for the top 1,000 websites.In 37 countries, IPv6 is used for over 5 percent of internet traffic, according to Google, which bases its estimate on traffic hitting its load-balancers.To read this article in full or to leave a comment, please click here

Don’t be left behind by IPv6 deployment, ISOC warns enterprises

They have the resources, the expertise and, though they may not realize it, the need -- but it turns out that enterprises are often the ones that don't yet have IPv6.That's the finding of the Internet Society its latest report on IPv6 deployment, published five years after the organization began a worldwide push to deploy the new addressing protocol and almost 20 years after the protocol was defined.Around 13 percent of the top one million websites is inviting IPv6 traffic today, it said, citing a Hurricane Electric analysis of data provided by Amazon.com. That figure rises to around 22 percent for the top 1,000 websites.In 37 countries, IPv6 is used for over 5 percent of internet traffic, according to Google, which bases its estimate on traffic hitting its load-balancers.To read this article in full or to leave a comment, please click here

Don’t be left behind by IPv6 deployment, ISOC warns enterprises

They have the resources, the expertise and, though they may not realize it, the need -- but it turns out that enterprises are often the ones that don't yet have IPv6.That's the finding of the Internet Society its latest report on IPv6 deployment, published five years after the organization began a worldwide push to deploy the new addressing protocol and almost 20 years after the protocol was defined.Around 13 percent of the top 1 million websites is inviting IPv6 traffic today, it said, citing a Hurricane Electric analysis of data provided by Amazon.com. That figure rises to around 22 percent for the top 1,000 websites.In 37 countries, IPv6 is used for over 5 percent of internet traffic, according to Google, which bases its estimate on traffic hitting its load-balancers.To read this article in full or to leave a comment, please click here

Self-Study Exercises Added to Ansible for Networking Engineers Webinar

Last week I published self-study exercises for the YAML and Jinja2 modules in the Ansible for Networking Engineers webinars, and a long list of review questions for the Using Ansible and Ansible Deeper Dive sections.

I also reformatted the webinar materials page. Hope you’ll find the new format easier to read than the old one (it’s hard to squeeze over 70 videos and links on a single page ;).

Oh, and you do know you get Ansible webinar (and over 50 other webinars) with ipSpace.net subscription, right?

Certification – Major News for Expert Level Recertification

Certification – Major News for Expert Level Recertification

Everyone holding an expert level Cisco certification knows the pain of recertifying. Recertification today is achieved by taking any expert level written exam which means you can take the written in the track you are already certified in (the “safe bet”) or in another track if you want to learn something new. The quality of these written exams have varied over the years. Some revisions have been very difficult to pass even for people that are masters of their trade due to the pool of questions not being as high quality as can be expected from an expert level exam. This has been debated for years.

Every two years the pain of recertifying kicks in. Taking the written exam costs around 400$ per attempt depending on local rates, VAT etc. Many people have had to go through multiple attempts to recertify and some have chosen other written exams than their own track because the written of that track was not up to par quality-wise.

Over the years we have been many that have suggested that there must be a better path to getting recertified. Many of us go to Cisco Live, write Continue reading

BrandPost: Selecting the Right Managed SD-WAN Service Provider

Many of you are already aware that an SD-WAN enables distributed enterprises to connect users to applications with the flexibility to use any combination of underlying transport technologies (MPLS, broadband, LTE), bring branch offices online quickly and become more agile, all while saving money.THE VALUE OF CHOOSING AN SD-WAN MANAGED SERVICEHowever, finding the right SD-WAN solution for your business can take time and may not always be the highest business priority, given other digital transformation project priorities. The accelerating pace of technological change within the SD-WAN segment can also lead to confusion. It’s no surprise that many enterprises considering an SD-WAN to simplify their branch WAN deployments are turning to managed service providers to deploy and manage an SD-WAN as a managed service. As I wrote in my previous blog, there is tremendous value in working with a managed service provider for an SD-WAN.To read this article in full or to leave a comment, please click here

Defining Cybersecurity

Cybersecurity, as defined by Merriam-Webster, is “measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack.”

The true importance of cybersecurity can only be understood if our dependence on “computer systems” is understood. It is difficult to imagine a day using nothing that is actively dependent on technology. We depend on connected systems to purchase groceries, perform medical procedures, manage the delivery of utilities and facilitate communications. These systems facilitate safe travel and alert us of impending dangers. It is conceivable that a cyberattack could take the power grid offline making it difficult or impossible to fill a car with fuel, purchase groceries, receive healthcare and even gain access to the typical procedures to restore the grid itself.

In our world today, unless we are primitive camping, we are using products of computer systems continually. To state it differently, our lives would change drastically if these systems became under widespread compromise. Considering Maslow’s hierarchy of needs, most individuals in a civilized society depend on computer systems for most of the elements defined in the critical first two layers. Since we have built this dependence, we must also protect these systems Continue reading