Archive

Category Archives for "Networking"

IT Resume Makeover: Gaining a new perspective

The last word you want to use to describe your resume is "generic," but that's exactly how Shepherd Book, whose name has been changed for this article, felt about his own resume. "It looked like a shopping list -- even though it included my latest list of duties, it really highlighted nothing," he says.To read this article in full or to leave a comment, please click here(Insider Story)

4 mini projectors: A show wherever you go

If you're on the road and want to give a presentation to your clients, you're not going to impress them if they have to squint over your shoulder at a laptop screen. But with the latest generation of mini projectors, most small enough to sit in the palm of your hand, you can carry the equivalent of a big-screen display around with you.Rif6 CubeTo read this article in full or to leave a comment, please click here(Insider Story)

SonicWall CEO talks of life after Dell spinout

SonicWall has been through it all. The San Jose, CA-based security company began as a hot start up, went public, then private, was acquired by Dell and then spun off to a private equity firm as part of the massive Dell/EMC merger in 2016. In the wake of that change, SonicWall also got a new CEO, Bill Conner, a long-time security and tech industry leader, who took the helm in November. To read this article in full or to leave a comment, please click here(Insider Story)

SonicWall CEO talks of life after Dell spinout

SonicWall has been through it all. The San Jose, CA-based security company began as a hot start up, went public, then private, was acquired by Dell and then spun off to a private equity firm as part of the massive Dell/EMC merger in 2016. In the wake of that change, SonicWall also got a new CEO, Bill Conner, a long-time security and tech industry leader, who took the helm in November. In this installment of the IDG CEO Interview Series, Conner spoke with Chief Content Officer John Gallant about what the Dell spin out means for customers and where SonicWall is focusing its development efforts. Hint: Think IoT, mobile and hybrid data centers. He also discussed the company’s cloud strategy and how the changing threat landscape opens up new opportunities in the enterprise for SonicWall, which is better known in the SMB space.To read this article in full or to leave a comment, please click here(Insider Story)

Obama’s cybersecurity legacy: Good intentions, good efforts, limited results

President Obama is only a couple of weeks out of office, but his legacy on cybersecurity is already getting reviews – mixed reviews.According to a number of experts, Obama said a lot of good things, did a lot of good things and devoted considerable energy to making cybersecurity a priority, but ultimately didn't accomplish the goal of making either government or the private sector more secure.The most recent, stark illustration was the series of leaks, enabled by hacks that US intelligence agencies attribute to Russia, that undermined both the credibility of Democratic presidential candidate Hillary Clinton and the election itself.To read this article in full or to leave a comment, please click here

Obama’s cybersecurity legacy: Good intentions, good efforts, limited results

President Obama is only a couple of weeks out of office, but his legacy on cybersecurity is already getting reviews – mixed reviews.According to a number of experts, Obama said a lot of good things, did a lot of good things and devoted considerable energy to making cybersecurity a priority, but ultimately didn't accomplish the goal of making either government or the private sector more secure.The most recent, stark illustration was the series of leaks, enabled by hacks that US intelligence agencies attribute to Russia, that undermined both the credibility of Democratic presidential candidate Hillary Clinton and the election itself.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Unleashing the full potential of 5G to create a massive Internet of Things

By now, the term Internet of Things or IoT has become a part of the tech world’s everyday vernacular, and it broadly describes the concept of an interconnected network of physical objects, including machines, wearables, buildings, automobiles and a plethora of other types of devices. And these connected “things” are being designed to bring new services and deliver new levels of efficiency and safety all around us—in homes, businesses, cities, and across industries.Now in 2017, despite billions of already-connected devices, we are only at the dawn of the IoT era. It is estimated that there will be more than 20 billion connected devices by the year 2020. This expansion will be fueled by the rapid growth of exciting new IoT use cases and opportunities all around the world.To read this article in full or to leave a comment, please click here

Google’s crazy cool offices

17 photos of Google's coolest office setupsImage by GoogleGoogle is often ranked as one of the top tech companies to work for—and with good reason. The company is extraordinarily employee-friendly. In addition to a great array of benefits and employee perks, Google takes measures to ensure its employees work in extremely unique environments that are designed to foster creativity and out-of-the-box thinking. Additionally, it makes going to work a far more enjoyable experience when there are slides, bikes, basketball courts, ping pong tables and video games to enjoy. To read this article in full or to leave a comment, please click here

IoT’s payoff is in the big picture, and Nokia knows it

Large IoT systems usually have more than one job and need to work with other systems to be effective. Simplifying all this is one of the main things enterprise IoT platforms are designed to do.But it’s a moving target, so vendors need to keep adding new capabilities to their platforms. On Tuesday, Nokia announced updates to its Impact software platform to cover IoT applications including lighting, video analytics and parking management. There are also updates to accommodate new low-power networks.Impact is one of several software platforms designed to make IoT into more than a bunch of disparate sensor networks or automation systems. One application, like smart street lighting, may make another one, like connected parking meters, more effective. Data is the key, and integration can make all data more valuable.To read this article in full or to leave a comment, please click here

IoT’s payoff is in the big picture, and Nokia knows it

Large IoT systems usually have more than one job and need to work with other systems to be effective. Simplifying all this is one of the main things enterprise IoT platforms are designed to do.But it’s a moving target, so vendors need to keep adding new capabilities to their platforms. On Tuesday, Nokia announced updates to its Impact software platform to cover IoT applications including lighting, video analytics and parking management. There are also updates to accommodate new low-power networks.Impact is one of several software platforms designed to make IoT into more than a bunch of disparate sensor networks or automation systems. One application, like smart street lighting, may make another one, like connected parking meters, more effective. Data is the key, and integration can make all data more valuable.To read this article in full or to leave a comment, please click here

Amazon, Expedia tell US court Trump immigration order affects business

Amazon and Expedia have submitted declarations in a federal court in Washington, claiming that a recent immigration order by U.S. President Donald Trump is disrupting their business and affecting employees.The actions by these companies come amid widespread public protests against the order, with many tech companies prominently in the opposition.The declarations were filed by Amazon and Expedia in a lawsuit in which Washington State Attorney General Bob Ferguson has asked the court to invalidate parts of the executive order for a number of reasons including that it discriminates in the issuance of immigrant visas on the basis of race, nationality, place of birth, or place of residence.To read this article in full or to leave a comment, please click here

Addressing 2016

Time for another annual roundup from the world of IP addresses. Let’s see what has changed in the past 12 months in addressing the Internet, and look at how IP address allocation information can inform us of the changing nature of the network itself.

Flokibot Invades PoS: Trouble in Brazil

Introduction Threat actors salivate at the thought of an increased volume of credit and debit card transactions flowing through endpoints they have compromised with card-stealing malware. While there are many distinct malware families that scrape unencrypted process memory to obtain cards, some of these malware capabilities overlap with generic information stealing trojans such as Flokibot […]

VRF Series Article 5 – Stateful Inter-Vrf connectivity

This is the fifth and final article in a series that focused on Segmenting Layer 3 Networks with VRFs. In the third article, we discussed creating a shared services VRF and using it within the otherwise segmented network. In that article I alluded to the fact that we would asav-1later cover a way to securely allow traffic to flow between security zones. That is the intent of this article.

In this article, I am going to attach two sub interfaces between asav-1 and Main. One will attach into data and the other into pci. We will apply a simple policy that denies all traffic from data to pci, but allows telnet from pci to data (bad security example, but easy to demonstrate).

Before we jump into the configuration, I want to share the entire topology and give a summary of the current configuration status.

VRF_No_Int_Index

Current Configuration

In the above topology, anything that starts with “data” is in the data VRF. Likewise, anything that starts with “pci” is in the pci VRF. Everything within a given VRF can communicate with everything else in that same VRF. Both pci and data can communicate with the shared VRF (test IP address is Continue reading