Hi everyone.
I’ve not been posting lately because I have been studying very hard for the CCDE practical.
Passed the lab in Madrid? Isn’t this guy from the North? I was supposed to take this exam in Frankfurt on Tuesday the 17th of May. Wise from my trips to the CCIE lab in Brussels I took a flight that landed around noon on Monday. I have a routine I like to use the day before a big exam. I had just scouted the Pearson Professional Centre (PPC) location and got back to my room. At 14.05 I receive an e-mail from Pearson Vue saying they can’t deliver my exam. Can you imagine the panic I felt? I had been preparing for months of furious studying for this day. The CCDE practical is only delivered every three months so I would have to wait for three more months to take it if I could even get a seat then. I had prepared for this day and my plan was to try to pass it and if I didn’t, come back in three months and pass it then.
There was no time to waste. I found an open seat in Madrid Continue reading
Contrail is the "secret weapon."
Investors eagerly grab future pieces of Dell.
Orchestration deserves a tool of its own.
Security startup Siemplify aims to pick up where SIEMs leave off with threat analysis software that provides additional context and visualization to security alerts to help analysts identify and respond to the most relevant events.
The post Startup Radar: Siemplify Takes Threat Analysis Beyond SIEM Correlation appeared first on Packet Pushers.
Security startup Siemplify aims to pick up where SIEMs leave off with threat analysis software that provides additional context and visualization to security alerts to help analysts identify and respond to the most relevant events.
The post Startup Radar: Siemplify Takes Threat Analysis Beyond SIEM Correlation appeared first on Packet Pushers.
The post Worth Reading: Lego Robots versus Gesture Security appeared first on 'net work.
When Cyrus wanted to capture Babylon, he attacked the river that flows through the city, drying it out and then sending his army under the walls through the river entrance and exit points. In a similar way, the ventilator is a movie favorite, used in both Lord of the Rings and Star Wars, probably along with a thousand other movies and stories throughout time. What do rivers and ventilators have to do with network security?
Side channel attacks. Now I don’t know if the attacks described in these papers, or Cyrus’ attack through the Euphrates, are considered side channel, or just lateral, but either way: the most vulnerable point in your network is just where you assume you can’t be attacked, or that point where you haven’t thought through security. Two things I read this week reminded me of the importance of system level thinking when it comes to security.
The first explores the Network Time Protocol (NTP), beginning with the general security of the protocol. Security in a time protocol is particularly difficult, as the entire point of encryption is to use algorithms that take a lot of time for an attacker to calculate—and there’s probably some relationship between Continue reading