Archive

Category Archives for "Networking"

Even encrypted medical record databases leak information

A new study from Microsoft researchers warns that many types of databases used for electronic medical records are vulnerable to leaking information despite the use of encryption.The paper, due to be presented at the ACM Conference on Computer and Communications Security next month, shows how sensitive medical information on patients could be pilfered using four different attacks.Researchers discovered the sex, race, age and admission information, among other data, using real patient records from 200 U.S. hospitals.In the light of increasing cyberattacks against the health care industry, the researchers recommended that the systems they studied "should not be used in the context of" electronic medical records.To read this article in full or to leave a comment, please click here

Networking Field Day 10 – Intel

Let me start this out by saying that I was thrilled to see Intel present at a NFD event!  While Intel is well known in the network space for their NICs, they are most well known for their powerful line of processors, boards, and controllers.  Most would argue that this doesn’t make them a ‘traditional’ network vendor but, as we all know, things are rapidly changing in the network space.  As more and more network processing moves from hardware to software the Intel’s of the world will have an increasingly large role to play in the network market.

Check out the following presentations they gave at the recent NFD10 event…

Intel Intro and Strategy

Intel Open Network Platform Solutions for NFV

Intel Software Defined Infrastructure: Tips, Tricks and Tools for Network Design and Optimization

Here are some of my thoughts on the presentations that I thought were worth highlighting…

The impact of software and NFV
Intel made some interesting observations comparing telco companies using big hardware to Google using SDN and NFV.  Most telco companies are still heavily reliant on big, high performance, hardware driven switches that can cost into the 10s of millions of dollars. Continue reading

Five steps to optimize your firewall configuration

Firewalls are an essential part of network security, yet Gartner says 95% of all firewall breaches are caused by misconfiguration. In my work I come across many firewall configuration mistakes, most of which are easily avoidable. Here are five simple steps that can help you optimize your settings:

* Set specific policy configurations with minimum privilege. Firewalls are often installed with broad filtering policies, allowing traffic from any source to any destination. This is because the Network Operations team doesn’t know exactly what is needed so start with this broad rule and then work backwards. However, the reality is that, due to time pressures or simply not regarding it as a priority, they never get round to defining the firewall policies, leaving your network in this perpetually exposed state.

To read this article in full or to leave a comment, please click here

Court: FTC can take action on corporate data breaches

The US Court of Appeals has ruled that the FTC mandate to protect consumers against fraudulent, deceptive and unfair business practices extends to oversight of corporate cybersecurity efforts -- and lapses. But security experts are split about whether the decision will help improve enterprise security. "It is not only appropriate, but critical, that the FTC has the ability to take action on behalf of consumers when companies fail to take reasonable steps to secure sensitive consumer information," said Federal Trade Commission Chairwoman Edith Ramirez in a statement. Specifically, last week's decision allowed the FTC to take action against Wyndham Hotels and Resorts for failing to reasonably protect consumers' personal information between 2008 and 2010, when hackers broke in three times and stole more than 600,000 bank card numbers.To read this article in full or to leave a comment, please click here

Intel promises $50M for quantum computing research

A fully functioning quantum computer is still twelve years off, according to Intel, but the company is already plowing research funding into the field.On Thursday, Intel promised to fund QuTech, a research unit at the Technical University of Delft in the Netherlands, to the tune of US$50 million over 10 years, and to provide additional staff and equipment to support its work.QuTech hopes the partnership will allow it to combine its theoretical work on quantum computing with Intel's manufacturing expertise to produce quantum computing devices on a larger scale.Quantum computers are composed of qubits that can take on multiple values simultaneously, unlike the bits stored and processed in traditional computers, which are either 0s or 1s. This multiplicity of values makes quantum computing, at least in theory, highly useful for parallel computing problems such as financial analysis, molecular modelling or decryption.To read this article in full or to leave a comment, please click here

Feds advance open data roadmap despite challenges

Federal authorities are marching ahead with a new framework for opening government data, a process that aims to consolidate department and agency datasets into a standardized format and make them accessible for the public.Christina Ho, deputy assistant secretary for accounting policy and financial transparency at the Treasury Department, recently provided an update on the rollout of the 2014 DATA Act, a sweeping bill that for the first time mandates a holistic system for making government spending data transparent and freely available.To read this article in full or to leave a comment, please click here

Samsung’s SleepSense sleep tracker taps home appliances to help you doze off

There’s no shortage of devices these days that will track your sleep, but Samsung’s SleepSense is going a little further in helping you doze off in the first place. The slim device slips under a mattress and uses a contactless sensor to measure movements, heart rate, and respiratory rate. As the night goes on, SleepSense tracks how long it took to fall asleep, total sleep time, sleep efficiency, the number of times you wake up or get out of bed, and percentage of REM and deep sleep, all contributing to a general sleep score. Samsung also worked with a Harvard Medical School professor on sleep tips, which the SleepSense app will tailor to your own sleep patterns.To read this article in full or to leave a comment, please click here

Are white box switches less secure?

 

Are white box switches less secure than proprietary alternatives like Juniper or Cisco switches?

Gregory Pickett, Founder of Hellfire Security, did a presentation about white box security during the last Black Hat conference, triggering a multitude of news articles which we will study in this post. Without dwelling on the author mixing ideas between SDN and White Box Networking (which is quite common these days – the title of the presentation is about SDN and the presentation is all about white box networking security) the security issues raised are real.

Those security issues are either network operating system (NOS) specific (which I will not comment on as none of them are related to PicOS), or Pre-Boot related (Bootkit). I will focus on the key issues relating to security of NOS boot loaders, specific to Open Networking / White Box Networking.

Rootkit and Bootkit

The typical goal of a malicious user is to install a rootkit on the device under attack. A rootkit is a collection of software designed to enable unauthorized access while masking its existence.

Because NOS’s protection mechanisms are becoming more elaborate, a new kind of attack came up. This type of attack bypasses all NOS security by Continue reading

Cisco security chief: 4 things CISOs need to survive

As the criminal infrastructure that supports cyber attacks grows more efficient to speed up development of new threats CISOs need to constantly learn new skills to keep their businesses and their jobs safe, according to Cisco’s head of security solutions.They have to have solid knowledge of network security, but also have to be able to communicate well, develop in-house security talent and stay on top of how the threat landscape is changing, says James Mobley, Cisco vice president of security solutions and former CEO of security consulting firm Neohapsis, which Cisco bought last year.+More on Network World: FBI: Major business e-mail scam blasts 270% increase since 2015+To read this article in full or to leave a comment, please click here