Lastline is known for its anti-malware research and artificial intelligence-powered network...
“I know it’s an extremely overused term in security awareness, but gamification is extremely...
SDxCentral Weekly Wrap for June 5, 2020: Cisco admits to missing cloud's first wave; ThousandEyes...
The security vulnerabilities could have allowed attackers to gain remote access and execute...
By Tom Gillis, SVP and GM, Networking and Security Business Unit, VMware
EDITORIAL UPDATE: On June 18, 2020 VMware officially closed its acquisition of Lastline. The blog post below has been amended to reflect that announcement.
VMware announced its intent to acquire Lastline, a pioneer in anti-malware research and AI-powered network detection and response, and on June 18, 2020 the acquisition closed. This is an important step forward for VMware’s vision of Intrinsic Security, as it allows us to further take advantage of the intrinsic attributes of our virtualization platform to yield innovative security capabilities. Our aim is not to replicate that which exists today, but rather to build security solutions that we can uniquely deliver, spanning from the heart of the data center to users in a branch office and all the way to mobile users at home or on the road.
In the security industry, the nature of threats changes so rapidly that security technology is constantly being re-invented. In this context, it is not the algorithms per se that matter; it is the people that make the algorithms. Great people build great products, and great products build great companies. And that’s why we are so Continue reading
For digital CiscoLive 2020 I will be creating a number of follow up addendum videos to CLUS 2019’s BRKRST-2414 session “Network Sleuthing with Stealthwatch: The Science of Investigation” . These videos will be uploaded to the www.ciscolive.com on demand library... Read More ›
The post Lab Fun with Fish: My Little Lab Setup Gets a Major Overhaul appeared first on Networking with FISH.
“COVID-19 makes digital transformation more important — not less,” Gelsinger said. “This is...
On May 14th 2020, Marcel Gamma, tech industry journalist, and editor-in-chief at inside-it.ch and inside-channels.ch, published an article discussing several glaring security vulnerabilities in Silver Peak’s SD-WAN products on inside-it.ch. The original article was written in German; Marcel was kind enough to translate it into English and get permission from his publisher to have the English version published on ipSpace.net.
Security researchers make serious accusations against SD-Wan manufacturer Silver Peak. The latter disagrees. Swiss experts are analyzing the case.
By Marcel Gamma,
Silver Peak is accused of laxity in dealing with security issues and in dealing with security researchers who act within the framework of Responsible Disclosure.
IBM reportedly cut thousands of jobs; HPE slashed salaries; Microsoft revamped Its Azure VMware...
I am watching a George Boole bio on Prime but still don’t get it.I started watching the first few minutes of the "Genius of George Boole" on Amazon Prime, and it was garbage. It's the typical content that's been dumbed-down so much that any useful content has been removed. It's the typical sort of hero worshipping biography that credits the subject with everything that it plausible can.
Supply chain disruptions are affecting SD-WAN vendors and managed service providers differently....
“We have seen that COVID-19 is not stopping customers from their cloud migration projects with...
Securing workloads across an entire environment is the fundamental goal of a policy. But workloads come in a variety of form factors: virtual machines, containers, and bare metal servers. In order to protect every workload, experts recommend isolating workloads wherever possible — avoiding dependency on the host operating system and its firewall. Relying on the host firewall creates the dependency of a host to defend itself.
Securing virtual workloads is a task best handled by the hypervisor. Offering security via inspection of traffic on the virtual network interfaces of the virtual workload achieves the security you want. It also delivers isolation for security enforcement. Workloads to secure bare metal servers come in many form factors and a variety of means to achieve policy enforcement.
Bare metal servers remain in use for a variety of reasons. Securing these servers remains a necessary task in today’s virtualized data center. Reasons we still use bare metal servers:
In this episode of the Hedge, Stephane Bortzmeyer joins Alvaro Retana and Russ White to discuss draft-ietf-dprive-rfc7626-bis, which “describes the privacy issues associated with the use of the DNS by Internet users.” Not many network engineers think about the privacy implications of DNS, a important part of the infrastructure we all rely on to make the Internet work.
The Toronto-based telecom claims the service will provide customers with tools to support both...
This week is the first in a two-part series on the Internet of Things. We answer: What is IoT? And...
“The evolution of web applications has not gone unnoticed by attackers, and web defenders...
Mist serves as the heart of Juniper’s AI-driven enterprise strategy. And Mavis is the brain.
The company’s Q3 revenues hit $869.4 million, up 20% year over year, bolstered by a pandemic...
Our customer's employees are now using our corporate application while working from home. They are concerned about security, protecting their trade secrets. What security feature can we add for these customers?The tl;dr answer is this: don't add gimmicky features, but instead, take this opportunity to do security things you should already be doing, starting with a "vulnerability disclosure program" or "vuln program".