Archive

Category Archives for "Networking"

Tackling cybersecurity threat information sharing challenges

There’s been considerable talk in recent years about the importance of cybersecurity information sharing. After all, few organizations can really work in a vacuum and no single organization can see all of the threats laying in wait on the internet.And many CISOs find it helpful to share notes with others in their industry to compare which strategies and practices work best and compare program maturity levels. But the nearly two-decade effort to share such information hasn’t been smooth.Many organizations are wary of sharing sensitive cybersecurity information, especially with governments. Not only can such information jeopardize the security posture of an organization, it can damage customer impressions of a company and even affect stock values.To read this article in full or to leave a comment, please click here

Miss me?

Wow! Do I feel like a bad parent or something right now –  I ahve realized that I have neglected my blog here for a few months now –  bad Fryguy! Work last year got crazy, good crazy! I have made a commitment to myself and you to post at least one blog posts per-month, planning […]

The post Miss me? appeared first on Fryguy's Blog.

50% off J5 Tactical V1-Pro Ultra Bright 3 Mode Flashlight – Deal Alert

Heavy duty, compact and tough as nails. Perhaps the last flashlight you'll ever need. That's how J5 Tactical describes their V1-Pro. A super bright 300 lumens LED produces an intense beam of light up to 600 feet with high, low and strobe modes. It can take a beating, is weather resistant, and works for hours on a single AA battery. With nearly 6,000 reviews on Amazon, it averages 4.5 out of 5 stars (read reviews). Its typical list price of $29.95 has been reduced by 50% to $14.95. See the discounted J5 Tactical V1-Pro flashlight now on Amazon.To read this article in full or to leave a comment, please click here

Endpoint security in 2017

Just a few years ago, there were about 6 to 10 well regarded AV vendors that dominated the market. Fast forward to 2017, and my colleague Doug Cahill and I are currently tracking around 50 endpoint security vendors. Why has this market changed so much in such a short timeframe? New types of targeted threats regularly circumvented signature-based AV software over the past few years. This weakness led to system compromises, data breaches and panicky CISOs in search of AV alternatives. This in turn persuaded the fat cats on Sand Hill Road to throw VC dollars at anything that hinted at endpoint security innovation.OK, I get the need for more than signature-based AV, but there simply isn’t room in the market for 50 endpoint security vendors. Thus, it’s safe to assume we'll see a lot of M&A activity and outright business failures this year. To read this article in full or to leave a comment, please click here

IDG Contributor Network: Reliability, not principally speed, will drive 5G

Brand-new research from a consultant and a trade body released last week estimates the deployment of 5G networks could create up to 3 million jobs. Accenture, along with CTIA, also predict the new radio networking technology will add $500 billion to the American GDP.That's good news. However, questions about 5G remain. And they’re unrelated to the actual physics of the technology—which doesn’t really exist yet. The questions include an important matter: What’s going to drive these kinds of high-flown claims, and why is 5G being trumpeted as special? Is it really such a quantum leap over existing networks?To read this article in full or to leave a comment, please click here

IDG Contributor Network: Reliability, not principally speed, will drive 5G

Brand-new research from a consultant and a trade body released last week estimates the deployment of 5G networks could create up to 3 million jobs. Accenture, along with CTIA, also predict the new radio networking technology will add $500 billion to the American GDP.That's good news. However, questions about 5G remain. And they’re unrelated to the actual physics of the technology—which doesn’t really exist yet. The questions include an important matter: What’s going to drive these kinds of high-flown claims, and why is 5G being trumpeted as special? Is it really such a quantum leap over existing networks?To read this article in full or to leave a comment, please click here

L3 fabric DC -The underlay Network (BGP) -part2

In the previous post, we laid the foundation of L3 fabric DC In this post we will discuss the underlay network which mainly provide IP reachability plus ECMP capability, here BGP would play a role in your DC next to the 3 other that we discussed one of the previous posts. For the sake of simplicity …

The post L3 fabric DC -The underlay Network (BGP) -part2 appeared first on Networkers-online.com.

This Wi-Fi alternative rides on LTE rails

A group that sees enterprises and even consumers setting up their own LTE-like networks now has a formula to work from.On Tuesday, the MulteFire Alliance announced MulteFire Release 1.0, which defines an LTE-like network that can run entirely on unlicensed spectrum like the frequencies Wi-Fi uses. In some cases, it may be an alternative to Wi-Fi with more capacity, better security and easier handoffs from carrier networks, Alliance President Mazen Chmaytelli says.Users could include businesses that need highly predictable networks for time-sensitive industrial applications, stadium owners looking for a simpler way to speed up wireless for fans, and eventually consumers networking their homes. But none of these will happen overnight.To read this article in full or to leave a comment, please click here

This Wi-Fi alternative rides on LTE rails

A group that sees enterprises and even consumers setting up their own LTE-like networks now has a formula to work from.On Tuesday, the MulteFire Alliance announced MulteFire Release 1.0, which defines an LTE-like network that can run entirely on unlicensed spectrum like the frequencies Wi-Fi uses. In some cases, it may be an alternative to Wi-Fi with more capacity, better security and easier handoffs from carrier networks, Alliance President Mazen Chmaytelli says.Users could include businesses that need highly predictable networks for time-sensitive industrial applications, stadium owners looking for a simpler way to speed up wireless for fans, and eventually consumers networking their homes. But none of these will happen overnight.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Dome9 offers multi-cloud security, adds native support for Azure

Dome9 Security, a cloud infrastructure security and compliance vendor, announced today that it is offering native support for the Microsoft Azure cloud platform.This is interesting because until now, Dome9 had strongly pushed an Amazon Web Services (AWS) story. The reasons for that are clear: AWS is the 1,000-pound elephant when it comes to cloud infrastructure, greatly eclipsing all other vendors in terms of market share. But reliance on a single vendor is risky, and the number of third-party vendors at AWS’ recent re:Invent conference that looked uncomfortable at AWS announcements shows the folly of being completely tied to one platform.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Dome9 offers multi-cloud security, adds native support for Azure

Dome9 Security, a cloud infrastructure security and compliance vendor, announced today that it is offering native support for the Microsoft Azure cloud platform.This is interesting because until now, Dome9 had strongly pushed an Amazon Web Services (AWS) story. The reasons for that are clear: AWS is the 1,000-pound elephant when it comes to cloud infrastructure, greatly eclipsing all other vendors in terms of market share. But reliance on a single vendor is risky, and the number of third-party vendors at AWS’ recent re:Invent conference that looked uncomfortable at AWS announcements shows the folly of being completely tied to one platform.To read this article in full or to leave a comment, please click here

A network geek pilgrimage – Networking Field Day 14

What is Networking Field Day?

Networking Field Day 14 or #NFD14 is almost upon us! I am heading to sunny San Jose, California to drink from the fire hose of data – the heavens will part and rain down golden non-fragmented packets of information and insight.

If you’re not familiar with Networking Field Day, which is part of Tech Field Day hosted by Gestalt IT, you can go here to get a full overview.

The Delegates

Networking Field Day is rare opportunity for individuals (delegates) that are engaged in the practice of network engineering/architecture to come together and interact not only with the vendors who are presenting but also fellow delegates.

While some of the delegates have attended previous Tech Field Day events, others, like myself are first timers and will be taking in the vast array of technical content as fast as our buffers permit.

The delegates comprise a group of like-minded and yet diverse networkers that are heavily invested in the community of network engineers and IT.

It’s truly a privilege to be be invited to NFD14 and I count myself fortunate to be in the company of some incredibly sharp practitioners of IP networking – a Continue reading

A network geek pilgrimage – Networking Field Day 14

What is Networking Field Day?

Networking Field Day 14 or #NFD14 is almost upon us! I am heading to sunny San Jose, California to drink from the fire hose of data – the heavens will part and rain down golden non-fragmented packets of information and insight.

If you’re not familiar with Networking Field Day, which is part of Tech Field Day hosted by Gestalt IT, you can go here to get a full overview.

The Delegates

Networking Field Day is rare opportunity for individuals (delegates) that are engaged in the practice of network engineering/architecture to come together and interact not only with the vendors who are presenting but also fellow delegates.

While some of the delegates have attended previous Tech Field Day events, others, like myself are first timers and will be taking in the vast array of technical content as fast as our buffers permit.

The delegates comprise a group of like-minded and yet diverse networkers that are heavily invested in the community of network engineers and IT.

It’s truly a privilege to be be invited to NFD14 and I count myself fortunate to be in the company of some incredibly sharp practitioners of IP networking – a Continue reading

IDG Contributor Network: Fighting cybercrime using IoT and AI-based automation

Last November, detectives investigating a murder case in Bentonville, Arkansas, accessed utility data from a smart meter to determine that 140 gallons of water had been used at the victim’s home between 1 a.m. and 3 a.m. It was more water than had been used at the home before, and it was used at a suspicious time—evidence that the patio area had been sprayed down to conceal the murder scene.As technology advances, we have more detailed data and analytics at our fingertips than ever before. It can potentially offer new insights for crime investigators.One area crying out for more insight is cybersecurity.By 2020, 60 percent of digital businesses will suffer a major service failure due to the inability of IT security teams to manage digital risk, according to Gartner. If we pair all this new Internet of Things (IoT) data with artificial intelligence (AI) and machine learning, there’s scope to turn the tide in the fight against cybercriminals.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Fighting cybercrime using IoT and AI-based automation

Last November, detectives investigating a murder case in Bentonville, Arkansas, accessed utility data from a smart meter to determine that 140 gallons of water had been used at the victim’s home between 1 a.m. and 3 a.m. It was more water than had been used at the home before, and it was used at a suspicious time—evidence that the patio area had been sprayed down to conceal the murder scene.As technology advances, we have more detailed data and analytics at our fingertips than ever before. It can potentially offer new insights for crime investigators.One area crying out for more insight is cybersecurity.By 2020, 60 percent of digital businesses will suffer a major service failure due to the inability of IT security teams to manage digital risk, according to Gartner. If we pair all this new Internet of Things (IoT) data with artificial intelligence (AI) and machine learning, there’s scope to turn the tide in the fight against cybercriminals.To read this article in full or to leave a comment, please click here

Indian privacy case against WhatsApp gains momentum

A privacy lawsuit against WhatsApp in India over its new data sharing policy has got momentum with the country’s top court seeking responses from Facebook, WhatsApp and the federal government.The privacy policy of WhatsApp at launch in 2010 did not allow sharing of user data with any other party, and after Facebook announced its acquisition of the messaging app in 2014, it was “publicly announced and acknowledged” by WhatsApp that the privacy policy would not change, according to the petition filed by Indian users of WhatsApp.WhatsApp sparked off a furore last year when it said it would be sharing some account information of users with Facebook and its companies, including the mobile phone numbers they verified when they registered with WhatsApp. The sharing of information will enable users to see better friend suggestions and more relevant ads on Facebook, it added.To read this article in full or to leave a comment, please click here

Indian privacy case against WhatsApp gains momentum

A privacy lawsuit against WhatsApp in India over its new data sharing policy has got momentum with the country’s top court seeking responses from Facebook, WhatsApp and the federal government.The privacy policy of WhatsApp at launch in 2010 did not allow sharing of user data with any other party, and after Facebook announced its acquisition of the messaging app in 2014, it was “publicly announced and acknowledged” by WhatsApp that the privacy policy would not change, according to the petition filed by Indian users of WhatsApp.WhatsApp sparked off a furore last year when it said it would be sharing some account information of users with Facebook and its companies, including the mobile phone numbers they verified when they registered with WhatsApp. The sharing of information will enable users to see better friend suggestions and more relevant ads on Facebook, it added.To read this article in full or to leave a comment, please click here