I think everyone that touches security has had multiple conversations about the hardened edge and soft center, commonly found in networks. This usually accompanies some discussion around the overlapping concepts of difference in depth, layered security and security ecosystems. It seems like many of the recent exploits have used a C2 connection for instructions. In those cases, assuming a perfect NGFW product and configuration actually existed that caught 100% of the malicious traffic, it would have the capability to impact those attacks.
However on June 27, Cisco Talos published an article about a ransomware variant known as Nyetya. As of today, Talos has been able to find no evidence of the more common initial infection vehicles. Both Cisco and Microsoft have cited the upgrade process for a tax accounting package as the initial point of infection.
Per Cisco Talos:
The identification of the initial vector is still under investigation. We have observed no use of email or Office documents as a delivery mechanism for this malware. We believe that infections are associated with software update systems for a Ukrainian tax accounting package called MeDoc. Talos is investigating this currently.
So what does this mean to the majority of the world that Continue reading
Block Armour built its security using Hyperledger code.
The initial code was created by Intel.
ForeScout now improves visibility into VMware environments.
Modern IT professionals face significant security challenges. As digital transformation continues to connect applications, users, and data in the cloud, perimeter security models that once offered businesses protection are no longer sufficient. Critical visibility into users and endpoints is missing, enforcing policies is difficult, and, in the meantime, cyberattacks are more sophisticated and costly than ever.
What do IT teams need to defend today’s applications, users, and data from potentially brand-damaging attacks?
That’s the question VMware experts will be tackling during our VMware EVOLVE Transform Security events, coming to a city near you. During these half-day, in-person events, you will learn how a ubiquitous software layer can help support the security challenges of the modern business.
VMware experts will guide you through how to:
Reserve your spot at an upcoming Transform Security-focused VMware EVOLVE event in your city:
The post VMware Evolve Transform Security is Coming to A City Near You! appeared first on Network Virtualization.
The 5G buzz is building and along with it are projections that some 5G networks will launch in 2018, with more widespread deployment in 2019. The launch of 5G networks will contribute to the large-scale proliferation of Internet of Things (IoT) devices.
ExtraHop is focused on understanding the context of multiple transactions from the network level.
This is the first major upgrade to the platform since Cisco acquired Jasper.
It aims to ‘democratizes security data’ for customers.
Other Cisco-McAfee security integrations are in the works.
SMBs don’t have all of the IT networking expertise that a large enterprise might have.
every expert in cryptography doesn't know thisOh, sure, you can find fringe wacko who also knows crypto that agrees with you but all the sane members of the security community will not.
Moving applications and data to the public cloud brings a number of security advantages.
The announcement has been made! It is completely official! I can finally share the awesome great news I am so excited about. Security will be my absolute #1 focus now.
Security has always fascinated me. My entire career. ….. It’s just that the fundamentals of routing and design intrigued me even more.
But now? Yeah baby! Now I get to flip a switch… dive into and completely surround myself with all things Security. And I just could not be any more tickled pink and excited. I feel like all my years of networking have been a build up towards this.
Am I leaving my CPOC lab and job I adore so much? Nah… I’d go through withdrawal. LOL. Nah… wouldn’t be pretty. It is just my role that will be changing.
Woot woot! Security here I come! ROCK!
Cisco claims it can detect malware threats in encrypted traffic.
The deal adds support for more than 100 cloud software and service providers.
NTT sources SD-WAN technology from multiple vendors in the space.
Analysts note that open source security concerns are more about deployment, not technology.
Welcome to Technology Short Take #84! This episode is a bit late (sorry about that!), but I figured better late than never, right? OK, bring on the links!