It aims to ‘democratizes security data’ for customers.
Other Cisco-McAfee security integrations are in the works.
SMBs don’t have all of the IT networking expertise that a large enterprise might have.
every expert in cryptography doesn't know thisOh, sure, you can find fringe wacko who also knows crypto that agrees with you but all the sane members of the security community will not.
Moving applications and data to the public cloud brings a number of security advantages.
The announcement has been made! It is completely official! I can finally share the awesome great news I am so excited about. Security will be my absolute #1 focus now.
Security has always fascinated me. My entire career. ….. It’s just that the fundamentals of routing and design intrigued me even more.
But now? Yeah baby! Now I get to flip a switch… dive into and completely surround myself with all things Security. And I just could not be any more tickled pink and excited. I feel like all my years of networking have been a build up towards this.
Am I leaving my CPOC lab and job I adore so much? Nah… I’d go through withdrawal. LOL. Nah… wouldn’t be pretty. It is just my role that will be changing.
Woot woot! Security here I come! ROCK!
Cisco claims it can detect malware threats in encrypted traffic.
The deal adds support for more than 100 cloud software and service providers.
NTT sources SD-WAN technology from multiple vendors in the space.
Analysts note that open source security concerns are more about deployment, not technology.
Welcome to Technology Short Take #84! This episode is a bit late (sorry about that!), but I figured better late than never, right? OK, bring on the links!
Welcome to Technology Short Take #84! This episode is a bit late (sorry about that!), but I figured better late than never, right? OK, bring on the links!
Company is making software sticky so it can move customers to a subscription model.
I did not pass my CCDE re-certification last week. Why write a blog about a “failure”? Honestly? Because I think we as an IT industry overly focus and give too many kudos to the passing only. Not to the hours and hours of studying and learning… not to the lessons learned… not to the growth gained from the studying journey. Just to the “pass/fail”. Well damn… no wonder people cheat. Their focus isn’t on the learning or the journey. Just the passing.
I thoroughly believe the expression –
Sometimes you win….. Sometimes you learn.
Did I want to pass last week? ROFL! Are you kidding? Of course I did! Did I “deserve” to pass? Well…. um…. err… not exactly.
See that 10% at the bottom of the “Written Exam Topics v2.1?” Truth be told I didn’t quite exactly study that part very much.
So what is my plan now?
LEARN
Honestly in my job I am not doing much Cloud, SDN, or IoT. AND I have to admit I am quite happy I am now essentially forced to learn these to a Continue reading
I have often wondered why the “security as an enabler” model is as unique as unicorns in the wild. I think the logic works in a vacuum and it would be great if it held true. However when humans and politics (layer 8 stuff) come into the mix, it seems that the cybersecurity team tend to be viewed as the naysayers that block progress. Quite honestly, the “security as an enabler” mantra only seems to work for those organizations that are directly profiting from the sale of cybersecurity. Those that understand the role cybersecurity plays in a typical organization realize that this is unfortunate.
With this thought in mind, I was reading through an article about the traits of CEO’s and found identified points that I think contribute to these challenges for information security:
By no means am I criticizing CEO’s for these traits—they are primary contributors to keeping a given business relevant in its industry. I’m just using these to help explain the fallacy of a “security as an enabler” mindset within a given organization.
CEO’s are the highest single point of authority within an organization. They often appoint CSO’s (Chief Security Officers) or CISO’s Continue reading
Hypervisor platform uses containers to isolate hacks from spreading to critical car functions.
Almost half of US firms that use an IoT network have been hit by a security breach.
One of the current challenges of data center security is the East-West traffic that has become so pervasive as modern applications communicate a great deal between their different components. Conventional perimeter security is poorly placed to secure these lateral flows, to promote a zero-trust model in order to prevent threats moving within each application layer. VMware NSX addresses this, providing virtual firewall at the virtual NIC of each VM with a management framework where micro-segmentation is achievable with a sensible level of overhead. Check Point vSEC can be deployed in conjunction to provide threat and malware protection.
The VMware NSX Distributed Firewall (DFW) protects East-West L2-L4 traffic within the virtual data center. The DFW operates in the vSphere kernel and provides a firewall at the NIC of every VM. This enables micro-segmented, zero-trust networking with dynamic security policy leveraging the vCenter knowledge of VMs and applications to build policy rather than using IP or MAC addresses that may change. Tools for automation and orchestration as well as a rich set of APIs for partner and customer extensibility complete the toolset for security without impossible management overhead. While this is a dramatic improvement in the security Continue reading