Archive

Category Archives for "Security"

7 Layers: IoT Part 2 — IoT Devices are Dangerously Insecure

This week is the second in a two-part series on the Internet of Things. We cover IoT security...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

A10 Bundles App Delivery, Security on Dell Hardware

Both bundles can use A10’s Harmony Controller for application management and integration into...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Chef Dishes Compliance, Desktop Automation

The updates follow a move by Chef last year to revamp its development, platforms, and go-to-market...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Headcount: Firings, Hirings, and Retirings — May 2020

Nutanix furloughed 25% of its workforce, saying COVID-19 is to blame; SAP cloud CFO jumped ship;...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Daily Roundup: VMware Lassos Lastline

VMware lassoed Lastline to boost security NDR; How to train employees not to fall for phishing...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

VMware Buys Lastline to Boost Security NDR

Lastline is known for its anti-malware research and artificial intelligence-powered network...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

How to Train Employees Not to Fall for Phishing Attacks

“I know it’s an extremely overused term in security awareness, but gamification is extremely...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Weekly Wrap: Cisco Licks Wounds, Targets Next Cloud Computing Wave

SDxCentral Weekly Wrap for June 5, 2020: Cisco admits to missing cloud's first wave; ThousandEyes...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Cisco Catches Dozens of IOS Security Bugs

The security vulnerabilities could have allowed attackers to gain remote access and execute...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

VMware Announces Intent to Acquire Lastline

By Tom Gillis, SVP and GM, Networking and Security Business Unit, VMware

EDITORIAL UPDATE: On June 18, 2020 VMware officially closed its acquisition of Lastline. The blog post below has been amended to reflect that announcement.

VMware announced its intent to acquire Lastline, a pioneer in anti-malware research and AI-powered network detection and response, and on June 18, 2020 the acquisition closed. This is an important step forward for VMware’s vision of Intrinsic Security, as it allows us to further take advantage of the intrinsic attributes of our virtualization platform to yield innovative security capabilities. Our aim is not to replicate that which exists today, but rather to build security solutions that we can uniquely deliver, spanning from the heart of the data center to users in a branch office and all the way to mobile users at home or on the road.

In the security industry, the nature of threats changes so rapidly that security technology is constantly being re-invented. In this context, it is not the algorithms per se that matter; it is the people that make the algorithms. Great people build great products, and great products build great companies. And that’s why we are so Continue reading

Lab Fun with Fish: My Little Lab Setup Gets a Major Overhaul

For digital CiscoLive 2020 I will be creating a number of follow up addendum videos to CLUS 2019’s BRKRST-2414 session “Network Sleuthing with Stealthwatch: The Science of Investigation” . These videos will be uploaded to the www.ciscolive.com on demand library... Read More ›

The post Lab Fun with Fish: My Little Lab Setup Gets a Major Overhaul appeared first on Networking with FISH.

VMware’s Gelsinger: Tech Is Better Than GDP, Software and Cloud Even Stronger

“COVID-19 makes digital transformation more important — not less,” Gelsinger said. “This is...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

SD-WAN Security: A Product Liability Insurance Law Would Certainly Help

On May 14th 2020, Marcel Gamma, tech industry journalist, and editor-in-chief at inside-it.ch and inside-channels.ch, published an article discussing several glaring security vulnerabilities in Silver Peak’s SD-WAN products on inside-it.ch. The original article was written in German; Marcel was kind enough to translate it into English and get permission from his publisher to have the English version published on ipSpace.net.


Security researchers make serious accusations against SD-Wan manufacturer Silver Peak. The latter disagrees. Swiss experts are analyzing the case.

By Marcel Gamma,

Silver Peak is accused of laxity in dealing with security issues and in dealing with security researchers who act within the framework of Responsible Disclosure.

SDxCentral’s Top 10 Articles — May 2020

IBM reportedly cut thousands of jobs; HPE slashed salaries; Microsoft revamped Its Azure VMware...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

What is Boolean?

My mother asks the following question, so I'm writing up a blogpost in response.
I am watching a George Boole bio on Prime but still don’t get it.
I started watching the first few minutes of the "Genius of George Boole" on Amazon Prime, and it was garbage. It's the typical content that's been dumbed-down so much that any useful content has been removed. It's the typical sort of hero worshipping biography that credits the subject with everything that it plausible can.


Boole was a mathematician who tried to apply the concepts of math to statements of "true" and false", rather than numbers like 1, 2, 3, 4, ... He also did a lot of other mathematical work, but it's this work that continues to bear his name ("boolean logic" or "boolean algebra").

But what we know of today as "boolean algebra" was really developed by others. They named it after him, but really all the important stuff was developed later. Moreover, the "1" and "0" of binary computers aren't precisely the same thing as the "true" and "false" of boolean algebra, though there is considerable overlap.

Computers are built from things called "transistors" which act as tiny switches, able to Continue reading

Pandemic Muddles SD-WAN Supply Chain

Supply chain disruptions are affecting SD-WAN vendors and managed service providers differently....

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

VMware Posts Q1 Beat, Reports Triple-Digit VMC on AWS Growth

“We have seen that COVID-19 is not stopping customers from their cloud migration projects with...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Secure Bare Metal Servers with VMware NSX Data Center

Securing workloads across an entire environment is the fundamental goal of a policy. But workloads come in a variety of form factors: virtual machines, containers, and bare metal servers. In order to protect every workload, experts recommend isolating workloads wherever possible — avoiding dependency on the host operating system and its firewall. Relying on the host firewall creates the dependency of a host to defend itself.

Securing virtual workloads is a task best handled by the hypervisor. Offering security via inspection of traffic on the virtual network interfaces of the virtual workload achieves the security you want. It also delivers isolation for security enforcement. Workloads to secure bare metal servers come in many form factors and a variety of means to achieve policy enforcement.

3 Factors to Consider when Securing Bare Metal Servers

Bare Metal Servers Still Serve A Purpose

Bare metal servers remain in use for a variety of reasons. Securing these servers remains a necessary task in today’s virtualized data center. Reasons we still use bare metal servers:

  • There may be no way to virtualize various operating systems, like AIX and Solaris.
  • Device-specific systems, such as medical equipment, or systems specific to other virtual markets may not yet have been virtualized. In some cases they may not Continue reading

The Hedge Podcast 037: Stephane Bortzmeyer and DNS Privacy

In this episode of the Hedge, Stephane Bortzmeyer joins Alvaro Retana and Russ White to discuss draft-ietf-dprive-rfc7626-bis, which “describes the privacy issues associated with the use of the DNS by Internet users.” Not many network engineers think about the privacy implications of DNS, a important part of the infrastructure we all rely on to make the Internet work.

download

Fortinet Fortifies Hyrdo One’s SD-WAN Offering

The Toronto-based telecom claims the service will provide customers with tools to support both...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

1 33 34 35 36 37 182