Archive

Category Archives for "Networking"

Alcatel Lucent Enterprise brings pay per use to the network

It seems like we can buy almost anything as a service today. Servers, storage, applications and collaboration can all be purchased using an “as a service” model. Recently Sprint introduced both Workplace and Mobility as a service to add to the growing portfolio of consumption-based products. In our consumer lives the Amazon button turns consumer goods into a service. The one piece of technology that’s still difficult to buy as a service is the network.Earlier this month, I authored this post discussing how the network needs to evolve into this kind of model.To read this article in full or to leave a comment, please click here

orhanergun.net New Design – New Price !

This is a great news everyone ! Now you will enjoy your CCDE preparation much more than before: orhanergun.net has a new fancy design and a new membership price for the most special network design content! You won’t believe but it’s ONLY $349 per year! Besides, it means that the investment in your career is […]

The post orhanergun.net New Design – New Price ! appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Ransomware attacks on U.S. companies blamed on state-sponsored Chinese hackers

So what do Chinese government-supported hackers turn to after China backed off on supporting economic espionage? Applying their APT skills to infecting companies with ransomware…at least that is the prevailing theory put forth by several security firms.If China really did pull its previous level of support for economic espionage after its agreement with the US late last year, then those same hackers may be supplementing their income by joining the booming business of ransomware.Security firms involved in investigating ransomware attacks that have not previously been made public told Reuters that Chinese hackers are the most likely suspects behind the attacks. It should be noted that none of the security companies could be positive that plain-old cybercrooks weren’t behind the attacks after upping their game, improving skills and purchasing tools previously used only by governments. At least a half dozen ransomware attacks in the last three months have a level of sophistication that is usually only used in state-sponsored attacks.To read this article in full or to leave a comment, please click here

SWSX highlights bright and dark tech futures

Visions of the future clashed during South By Southwest (SXSW) Interactive in Austin, as some experts saw an uncertain future, some saw an unbounded future and some were frustrated by the present.As for uncertainty, the worlds of big data, AI, and government are just beginning to collide, and public policy decisions made now will cast shadows far into the future, panelists agreed at a session titled, "Data Ethics in the Age of the Quantified Society.""We are at an inflection point," said Nicole Wong, former White House policy advisor. "We are paving the roads for what the future will look like. Will it be a dystopian world like The Hunger Games, or a different world, with health care for millions, precision medicine and equitable distribution of benefits? But how do we build the underlying roads?"To read this article in full or to leave a comment, please click here

How to get started in IT security consulting

IT security consulting is an excellent way to grow as a security professional. In contrast to an corporate role, consultants are exposed to a variety of business situations and industries. Those who succeed in the consulting world find themselves equipped with greater skills and cutting-edge knowledge of new technologies.Before you enter consulting, take note of the field’s current opportunities and challenges. “Migrating security services to the cloud, incident response, forensics and security risk assessments are areas in high demand,” comments Brian Honan, founder of BH Consulting. The Ireland-based IT security consulting firm has grown to 10 consultants and serves clients in Ireland, Europe, the United Kingdom and the US.To read this article in full or to leave a comment, please click here(Insider Story)

How to respond to ransomware threats

Don't jumpImage by ThinkStockRansomware is obviously analogous to kidnapping, and dealing with the perpetrators can feel much like negotiating with a jumper standing on the edge of high-rise roof. The Institute for Critical Infrastructure Technology recently released a report that in part describes how to deal with criminals when they are holding your data hostage. The report talks of what to do once a breach has been found.To read this article in full or to leave a comment, please click here

Symantec partners with hosting providers to offer free TLS certificates to website owners

Symantec wants to see the encrypted Web grow and will offer free basic SSL/TLS certificates to domain owners through Web hosting companies that join its new Encryption Everywhere program.The company has already signed partnerships with more than ten hosting providers, including InterNetX, CertCenter, Hostpoint and Zoned in Europe, and is close to finalizing deals with ten others. The customers of those companies will receive a basic website encryption package that includes a standard TLS certificate valid for one year.Depending on their needs, customers will also be able to opt for paid premium packages that include extended validation (EV) certificates or wildcard certificates that are valid for multiple websites hosted on different subdomains.To read this article in full or to leave a comment, please click here