Archive

Category Archives for "Networking"

OpenStack SDN With OVN (Part 2) – Network Engineering Analysis

In this post we will see how OVN implements virtual networks for OpenStack. The structure of this post is such that starting from the highest level of networking abstraction we will delve deeper into implementation details with each subsequent section. The biggest emphasis will be on how networking data model gets transformed into a set of logical flows, which eventually become OpenFlow flows. The final section will introduce a new overlay protocol GENEVE and explain why VXLAN no longer satisfies the needs of an overlay protocol.

Continue reading

CCIE/CCDE Re-certification Time Again – Go for it? … or Emeritus?

It is “that” time again.  Time to start studying for one of the CCxE (CCIE/CCDE) re-certifications. Got my 1st CCIE back in 1997.  A couple years later my CCIE SNA/IP.  Then back in 2009 I passed my “favorite E” – the CCDE.  And now?   I’ll tell you a secret that I actually haven’t told anyone at all except for my wife. — I am so tired of studying for the writtens. I prefer spending my time getting my hands dirty in the lab at work in CPOC, learning new technologies, reading pcap files, technically reviewing books, writing blogs, making youtubes, CiscoLive….. Anything but studying… yet again…. just to pass a CCxE written.  Especially now with the 10% “evolving technologies” add.  For the past few months I’ve been trying so hard to get myself to sit down and do some studying.  It has really been a struggle to get myself to study and I have rescheduled my exam twice so far. It has just been really hard to find the motivation when there are so many other things I’d prefer to be doing.

To make matters worse, each and every time I actually Continue reading

6 network and security trends you can expect in 2017

‘Tis the season for tech bloggers to prognosticate and pontificate about the trends for the next year.  This is also the time of year when we fondly reflect on the amazing rate of innovation during the past year and try to imagine how the pace of new technology will continue to accelerate. When publicly making these types of predictions, it is prudent to write about trends that are probable, and it is unwise to write about things that are too far-reaching. Along these lines, here are six network and security technology predictions that are probable for 2017.1. Malware will continue to evolve Malware has been the most effective way for attackers to reach targets globally.  Malware propagation has been the definitive attack method for the past few years, and now the effectiveness of most antivirus products is called into question. More and more security vendors offer malware defenses, but not all of these vendor’s solutions are completely effective as malware continues to metamorphize.To read this article in full or to leave a comment, please click here

Why CISO Succeed and Why They Leave

Earlier this year, ESG and the Information Systems Security Association (ISSA) published a research report titled, The State of Cyber Security Careers.  The report was based on a survey of 437 cybersecurity professionals, the clear majority of which were ISSA members.Two-thirds of these cybersecurity professionals worked at an organization that employed a CSO or CISO.  These individuals were then asked to identify the most important qualities that make a successful CISO.  Here is a sample of the results: 50% of respondents said that strong leadership skills were most important 47% of respondents said that strong communication skills were most important 30% of respondents said that a strong relationship with business executives was most important 29% of respondents said that a strong relationship with the CIO and other members of the IT leadership team was most important 23% of respondents said that strong management skills were most important Based upon this list, it’s clear that successful CISOs need to be strong business people who can work with business and IT executives.  This is an important consideration since many security professionals are deeply rooted in the technology rather than the business aspects of infosec.To Continue reading

Why CISOs succeed and why they leave

Earlier this year, ESG and the Information Systems Security Association (ISSA) published a research report titled, The State of Cyber Security Careers. The report was based on a survey of 437 cybersecurity professionals, the clear majority of which were ISSA members.Two-thirds of these cybersecurity professionals worked at an organization that employed a CSO or CISO. These individuals were then asked to identify the most important qualities that make a successful CISO. Here is a sample of the results: 50% of respondents said strong leadership skills were most important 47% of respondents said strong communication skills were most important 30% of respondents said a strong relationship with business executives was most important 29% of respondents said a strong relationship with the CIO and other members of the IT leadership team was most important 23% of respondents said strong management skills were most important Based upon this list, it’s clear that successful CISOs need to be strong business people who can work with business and IT executives. This is an important consideration since many security professionals are deeply rooted in the technology rather than the business aspects of infosec.To read this article in full or to leave a comment, please Continue reading

Why CISOs succeed and why they leave

Earlier this year, ESG and the Information Systems Security Association (ISSA) published a research report titled, The State of Cyber Security Careers. The report was based on a survey of 437 cybersecurity professionals, the clear majority of which were ISSA members.Two-thirds of these cybersecurity professionals worked at an organization that employed a CSO or CISO. These individuals were then asked to identify the most important qualities that make a successful CISO. Here is a sample of the results: 50% of respondents said strong leadership skills were most important 47% of respondents said strong communication skills were most important 30% of respondents said a strong relationship with business executives was most important 29% of respondents said a strong relationship with the CIO and other members of the IT leadership team was most important 23% of respondents said strong management skills were most important Based upon this list, it’s clear that successful CISOs need to be strong business people who can work with business and IT executives. This is an important consideration since many security professionals are deeply rooted in the technology rather than the business aspects of infosec.To read this article in full or to leave a comment, please Continue reading

Intel, Microsoft going long distance with Cortana on Windows 10 PCs

Intel and Microsoft are working on technology allowing you to shout out commands to Cortana or activate a Windows 10 PC from sleep mode without being all that close to it.The chipmaker is working with Microsoft to add "far-field speech recognition" technology, where one can shout out Cortana commands to a Windows PC from longer distances."Soon, you’ll be able to speak to your PC from a distance and access all of your information on the device and in the cloud," Navin Shenoy is senior vice president and general manager for the Client Computing Group for Intel, said in a blog entry this week. To read this article in full or to leave a comment, please click here

Obama orders review of election hacks as Trump doubts Russia’s role

President Barack Obama has ordered U.S. intelligence agencies to conduct a full review of the cyberattacks that allegedly tried to disrupt this year's election, as his successor Donald Trump casts doubt over Russia's possible involvement. Obama's homeland security advisor Lisa Monaco first mentioned the need for the review while speaking to reporters on Friday morning, according to Politico."We may be crossed into a new threshold, and it is incumbent upon us to take stock of that, to review, to conduct some after-action, to understand what this means, and to impart those lessons learned," Monaco reportedly said.To read this article in full or to leave a comment, please click here

Obama orders review of election hacks as Trump doubts Russia’s role

President Barack Obama has ordered U.S. intelligence agencies to conduct a full review of the cyberattacks that allegedly tried to disrupt this year's election, as his successor Donald Trump casts doubt over Russia's possible involvement. Obama's homeland security advisor Lisa Monaco first mentioned the need for the review while speaking to reporters on Friday morning, according to Politico."We may be crossed into a new threshold, and it is incumbent upon us to take stock of that, to review, to conduct some after-action, to understand what this means, and to impart those lessons learned," Monaco reportedly said.To read this article in full or to leave a comment, please click here

Ransomware attacks against businesses increased threefold in 2016

The number of ransomware attacks targeting companies increased threefold from January to September, affecting one in every five businesses worldwide.According to a new report from security company Kaspersky Lab, the rate of ransomware attacks against businesses increased from one every two minutes to one every 40 seconds during that period. For consumers it was even worse, with the rate reaching one attack every 10 seconds in September.During the third quarter of the year, there were 32,091 new ransomware variations detected by Kaspersky Lab compared to only 2,900 during the first quarter. Overall, 62 new ransomware families appeared this year, the company said.To read this article in full or to leave a comment, please click here

Ransomware attacks against businesses increased threefold in 2016

The number of ransomware attacks targeting companies increased threefold from January to September, affecting one in every five businesses worldwide.According to a new report from security company Kaspersky Lab, the rate of ransomware attacks against businesses increased from one every two minutes to one every 40 seconds during that period. For consumers it was even worse, with the rate reaching one attack every 10 seconds in September.During the third quarter of the year, there were 32,091 new ransomware variations detected by Kaspersky Lab compared to only 2,900 during the first quarter. Overall, 62 new ransomware families appeared this year, the company said.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Digital transformation: Not your grandfather’s bank

Changes in the way we do business with banks are rarely initiated by banks themselves. Instead, banks are often forced to adapt because of technological advancements that are shifting social culture and customer expectations. Just as mobile technology made selfies the norm, the introduction of new technologies is changing banking as we know it; paying by a social media app or on-demand lending are just the start.Keeping up with customers Established banks have an array of touchpoints with their customers that generate valuable insights about who their customers are. Yet all too often, banks do not act on those insights and pass up the opportunity to create a great customer experience.To read this article in full or to leave a comment, please click here

Petcube Play: An in-home camera for watching your pets do stuff

Most people enjoy pets. Some enjoy them enough where they want to do things with them when they’re away from their house. That’s the idea behind the Petcube Play, an in-home camera that connects to your Wi-Fi network so you can watch your pets while you’re at work or not at home. In addition to the live camera feed, it includes a two-way audio speaker for speaking to your pet (“Max! Get off the couch!”) and a red laser-pointer that you can move around by pointing to locations on your smartphone’s display and hope that the cat or dog starts to chase it – hilarity ensues.The Petcube itself is a cube – it’s about the size of a slightly larger Rubik’s Cube puzzle game. It doesn’t have a battery, so the first thing you need to figure out when placing the Petcube Play is to make sure it’s close enough to a power adapter. The instructions warn about making sure your pet doesn’t chew the power cable. It also comes with a small tripod attachment that you can screw into the bottom of the Petcube if you’re looking to place it higher than a table or desk. Continue reading