Archive

Category Archives for "Networking"

Campaigns use Big Data for political gain

With the presidential nominating conventions looming, the candidates are getting ready to add to the hundreds of millions they’ve already spent to tell you about themselves – but only what they want you to know about themselves.Meanwhile, they have also been spending millions of dollars collecting information about you – and you have no say in what is collected.Which means that, in the era of Big Data, if you’re a potential voter, they know a lot more about you than you know about them.[ ALSO ON CSO: When tech trips up presidential candidates ]To read this article in full or to leave a comment, please click here

Campaigns use Big Data for political gain

With the presidential nominating conventions looming, the candidates are getting ready to add to the hundreds of millions they’ve already spent to tell you about themselves – but only what they want you to know about themselves.Meanwhile, they have also been spending millions of dollars collecting information about you – and you have no say in what is collected.Which means that, in the era of Big Data, if you’re a potential voter, they know a lot more about you than you know about them.[ ALSO ON CSO: When tech trips up presidential candidates ]To read this article in full or to leave a comment, please click here

Defective products could result from cyberattacks on industrial 3D printers

Many 3D printers lack cybersecurity features, which presents opportunities to introduce defects as components are being built, a new study shows.The study, performed by a team of cybersecurity and materials engineers at New York University, concluded that with the growth of cloud-based and decentralized 3D printer production supply chains, there can be "significant risk to the reliability of the product."Additive manufacturing (3D printing) is creating a globally distributed manufacturing process and supply chain spanning multiple services, and therefore raises concerns about the reliability of the manufactured product, the study stated.To read this article in full or to leave a comment, please click here

Defective products could result from cyberattacks on industrial 3D printers

Many 3D printers lack cybersecurity features, which presents opportunities to introduce defects as components are being built, a new study shows.The study, performed by a team of cybersecurity and materials engineers at New York University, concluded that with the growth of cloud-based and decentralized 3D printer production supply chains, there can be "significant risk to the reliability of the product."Additive manufacturing (3D printing) is creating a globally distributed manufacturing process and supply chain spanning multiple services, and therefore raises concerns about the reliability of the manufactured product, the study stated.To read this article in full or to leave a comment, please click here

New Locky ransomware version can operate in offline mode

The creators of the widespread Locky ransomware have added a fallback mechanism in the latest version of their program for situations where the malware can't reach their command-and-control servers.Security researchers from antivirus vendor Avira have found a new Locky variant that starts encrypting files even when it cannot request a unique encryption key from the attacker's servers because the computer is offline or a firewall blocks the communication.Calling home to a server is important for ransomware programs that use public key cryptography. In fact, if they're unable to report back to a server after they infect a new computer, most such programs don't start encrypting files.To read this article in full or to leave a comment, please click here

New Locky ransomware version can operate in offline mode

The creators of the widespread Locky ransomware have added a fallback mechanism in the latest version of their program for situations where the malware can't reach their command-and-control servers. Security researchers from antivirus vendor Avira have found a new Locky variant that starts encrypting files even when it cannot request a unique encryption key from the attacker's servers because the computer is offline or a firewall blocks the communication. Calling home to a server is important for ransomware programs that use public key cryptography. In fact, if they're unable to report back to a server after they infect a new computer, most such programs don't start encrypting files.To read this article in full or to leave a comment, please click here

A smaller version of Raspberry Pi 3 is coming soon

A smaller version of the popular Raspberry Pi 3 will go on sale in a few months.Raspberry Pi is developing a new version of its Compute Module, a single-board computer that plugs into specific on-board memory slots. The new Pi will be more like a mini-computer inside a computer, and it won't come with a power supply.The Compute Module will have similar circuitry to that of Raspberry Pi 3, a wildly successful computer that can be a PC replacement. But it will be smaller, with the memory, CPU, and storage embedded tightly on a board. The differences between the Compute Module and the Raspberry Pi 3 will be subtle. While the Compute Module will have a 64-bit ARM processor like the Pi 3, it won't have Wi-Fi, Eben Upton, founder of Raspberry Pi, said in an interview with IDG News Service.To read this article in full or to leave a comment, please click here

What’s hot at Cisco Live!

Cisco held its annual customer conclave in Las Vegas this week and aside from the actual heat – which averaged about 109 every day – it was clear from the start that security was the hottest topic. As one Cisco exec put it “it’s great to be at what’s becoming quickly the biggest security conference in the world.”There were of course some other technologies discussed at the show. Here we take a look at some of the hottest topics from Cisco Live!CEO Chuck RobbinsThis is Chuck Robbins first Cisco Live! as CEO and he put his stamp on the show. In his keynote he played up all manner of areas Cisco will need to battle in to stay out in front of competitors. In the security realm he said that the two things that are going to be most important in the future are security and innovating over and over quickly. "Our acquisition strategy is core. It's core to our overall innovation strategy," Robbins said. “We’ve bought over 190 companies. Since I was named CEO in May a year ago we’ve actually bought 15, so we’ve been sort of active.”To read this article in Continue reading

What’s hot at Cisco Live!

Cisco held its annual customer conclave in Las Vegas this week and aside from the actual heat – which averaged about 109 every day – it was clear from the start that security was the hottest topic. As one Cisco exec put it “it’s great to be at what’s becoming quickly the biggest security conference in the world.”There were of course some other technologies discussed at the show. Here we take a look at some of the hottest topics from Cisco Live!CEO Chuck RobbinsThis is Chuck Robbins first Cisco Live! as CEO and he put his stamp on the show. In his keynote he played up all manner of areas Cisco will need to battle in to stay out in front of competitors. In the security realm he said that the two things that are going to be most important in the future are security and innovating over and over quickly. "Our acquisition strategy is core. It's core to our overall innovation strategy," Robbins said. “We’ve bought over 190 companies. Since I was named CEO in May a year ago we’ve actually bought 15, so we’ve been sort of active.”To read this article in Continue reading

What’s hot at Cisco Live

Cisco held its annual customer conclave in Las Vegas this week and aside from the actual heat – which averaged about 109 every day – it was clear from the start that security was the hottest topic. As one Cisco exec put it “it’s great to be at what’s becoming quickly the biggest security conference in the world.”There were of course some other technologies discussed at the show. Here we take a look at some of the hottest topics from Cisco Live.CEO Chuck RobbinsThis is Chuck Robbins first Cisco Live as CEO and he put his stamp on the show. In his keynote he played up all manner of areas Cisco will need to battle in to stay out in front of competitors. In the security realm he said that the two things that are going to be most important in the future are security and innovating over and over quickly. "Our acquisition strategy is core. It's core to our overall innovation strategy," Robbins said. “We’ve bought over 190 companies. Since I was named CEO in May a year ago we’ve actually bought 15, so we’ve been sort of active.”To read this article in Continue reading

What’s hot at Cisco Live!

Cisco held its annual customer conclave in Las Vegas this week and aside from the actual heat – which averaged about 109 every day – it was clear from the start that security was the hottest topic. As one Cisco exec put it “it’s great to be at what’s becoming quickly the biggest security conference in the world.”There were of course some other technologies discussed at the show. Here we take a look at some of the hottest topics from Cisco Live!CEO Chuck RobbinsThis is Chuck Robbins first Cisco Live! as CEO and he put his stamp on the show. In his keynote he played up all manner of areas Cisco will need to battle in to stay out in front of competitors. In the security realm he said that the two things that are going to be most important in the future are security and innovating over and over quickly. "Our acquisition strategy is core. It's core to our overall innovation strategy," Robbins said. “We’ve bought over 190 companies. Since I was named CEO in May a year ago we’ve actually bought 15, so we’ve been sort of active.”To read this article in Continue reading

What’s hot at Cisco Live

Cisco held its annual customer conclave in Las Vegas this week and aside from the actual heat – which averaged about 109 every day – it was clear from the start that security was the hottest topic. As one Cisco exec put it “it’s great to be at what’s becoming quickly the biggest security conference in the world.”There were of course some other technologies discussed at the show. Here we take a look at some of the hottest topics from Cisco Live.CEO Chuck RobbinsThis is Chuck Robbins first Cisco Live as CEO and he put his stamp on the show. In his keynote he played up all manner of areas Cisco will need to battle in to stay out in front of competitors. In the security realm he said that the two things that are going to be most important in the future are security and innovating over and over quickly. "Our acquisition strategy is core. It's core to our overall innovation strategy," Robbins said. “We’ve bought over 190 companies. Since I was named CEO in May a year ago we’ve actually bought 15, so we’ve been sort of active.”To read this article in Continue reading

Cisco’s Corporate Social Responsibility gets some long-deserved recognition

Cisco is known as many things: the market leader in networking, collaboration, security and other markets. The company is also widely regarded as a thought leader in both the enterprise and service provider segments. Investors consider Cisco to be strong, stable stock. Much of your opinion of Cisco depends on the lens through which you look at the company. Cisco should also be known as being a great citizen of the world because of all the good work its Corporate Social Responsibility (CSR) team does. Using the company’s massive resources to make the planet a better place was always a passion of former CEO John Chambers and that’s carried over to current CEO, Chuck Robbins. Its Networking Academy has educated millions of people across the globe, including many in underdeveloped nations, giving people an opportunity to get jobs and be successful.To read this article in full or to leave a comment, please click here

FCC hails ‘monumental’ vote opening new spectrum for 5G and IoT

The U.S. Federal Communications Commission has voted to open nearly 11 gigahertz of high-band spectrum to new wireless uses, hailing it as a "monumental step" that will greatly increase network capacity for 5G and the Internet of Things.The FCC on Thursday adopted new rules for spectrum above 24 GHz, in a vote that Commission Chairman Tom Wheeler described as one of the most important decisions commissioners will make this year."This is a big day for our nation," he said. "This is a big day for our agency."The commission's vote makes the U.S. the first nation to open up spectrum for the coming 5G services, and the decision may serve as a blueprint for other countries. The spectrum allows for data transfer rates of up to 10 Gbps, but signals can travel only short distances, meaning small cell deployments will be needed to deliver most wireless services.To read this article in full or to leave a comment, please click here

How to prepare for a data breach  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  Michael Bruemmer's team is busy these days, and that's both good news and bad news for companies like yours. Bruemmer heads up the Data Breach Resolution group at Experian. This team provides the call center, notification and identity theft protection services to clients following a data breach.Over a span of 12 years, this arm of Experian has serviced nearly 17,000 breaches. In 2015, the group serviced 3,550 different incidents, from small breaches that affected just a few hundred people, to the headline-making breaches that affected tens of millions. The fact that Experian has been involved in responding to so many breaches is the bad news I alluded to.To read this article in full or to leave a comment, please click here

How to prepare for a data breach  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  Michael Bruemmer's team is busy these days, and that's both good news and bad news for companies like yours. Bruemmer heads up the Data Breach Resolution group at Experian. This team provides the call center, notification and identity theft protection services to clients following a data breach.Over a span of 12 years, this arm of Experian has serviced nearly 17,000 breaches. In 2015, the group serviced 3,550 different incidents, from small breaches that affected just a few hundred people, to the headline-making breaches that affected tens of millions. The fact that Experian has been involved in responding to so many breaches is the bad news I alluded to.To read this article in full or to leave a comment, please click here

BRKEWN-2011 – Managing An Enterprise WLAN With Cisco Prime Infrastructure

Presenter: Paul Lysander, Technical Marketing Engineer, Cisco

“How many of you are not using PI 3.x?” –Paul; perhaps 10-20% put up their hands.

Morning after the customer Appreciation Event. Good turnout. ?

Where does PI fit in the network? 

  • PI gets information from the network; it’s not the source of data
  • Sources include: wireless LAN controller, CMX, ISE

Side note: PI 3.1 maintenance release 1 (MR1) is coming next week. When released, it will be the generally recommended release for customers to run.

Create Sites and Location Groups before adding devices to the inventory. These groups are used throughout PI. Eg: a Site can be used with a Virtual Domain to provide role-based access to devices in the environment (Admin1 can’t see Admin2’s devices; Admin1 only session Campus1 and SuperAdmin sees all). Device membership in a site can be done statically or by policy.

  • Administration > Users > Virtual Domains (create and edit Virtual Domains)
  • Administration > Users > Users, Roles & AAA (map users to a Domain)

Config Templates:

  • Discovery: templates can be discovered by pulling in the config (or parts thereof) from an already configured WLC

New feature in 3.1: Plug and Play for Continue reading

Cybersecurity highlights from Cisco Live

Cisco is wrapping up its annual Cisco Live customer event. This year’s proceedings took over Las Vegas, occupying the Bellagio, Luxor, Mandalay Bay and MGM Grand hotel. At least for this week, Cisco was bigger in Vegas than Wayne Newton, Steve Wynn and even Carrot Top. While digital transformation served as the main theme at Cisco Live, cybersecurity had a strong supporting role throughout the event. For example, of all of the technology and business initiatives at Cisco, CEO Chuck Robbins highlighted cybersecurity in his keynote presentation by bringing the GM of Cisco’s cybersecurity business unit, David Goeckeler, on stage to describe his division’s progress. To read this article in full or to leave a comment, please click here