The Netherlands-based startup provides device visibility, continuous network monitoring, and threat and anomaly detection specific to operational technology and industrial environments.
While Cisco adds Kubernetes support across its portfolio, other vendors like VMware and IBM recently bought companies to boost their container cred.
In my previous blog (Fun in the Lab: FTDv & FMC – Install and Deploy) we deployed a FMC VM and a FTDv VM and ended the blog with the FTDv successfully added to the FMC.
Now? Now let’s add IP addressing for the FTDv and also set up routing protocol neighbor relationships. I learned what I am about to show you from my co-worker and friend, Keith Brister. So don’t thank me, thank Keith.
I tossed together a ~29 minute YouTube. Obviously you can watch the entire thing. Or… here you go for the big sections.
Done and Done. Easy Peasy!
This new Research Brief from AvidThink delves into the evolution of the mobile network and explores new threats.
This is my Stealthwatch playground…. errrr… I mean … ahem… “work environment” for a Technical Solution Workshop I am working on for Stealthwatch.
Going to set up FTDv and FMC today. A co-worker and friend, Scott Barasch, helped me get jump started… so figure I’ll pass on what I just learned to you.
What this blog will cover is
So let’s begin. What I have to host my FMC & FTDv VMs is a UCS M4 with a NIC connected to a Cat4948 in vlan 1. That NIC is tied to vSwitch0 in the UCS. Continue reading
The virtualization giant updated its hybrid cloud stack with new Kubernetes support and also announced a new integration with IBM Cloud’s managed Kubernetes service.
Broadcom took over Veracode as part of its $18.9 billion purchase of CA Technologies, which it completed this week. CA bought Veracode in 2017.
It's no surprise that groups representing wireless workers claim the merger will cost American jobs. But connecting T-Mobile and Sprint to possible security risks related to China is a new angle that could have an impact on the deal.
The two acquisitions will boost the company's mobile and enterprise credentials, particularly with regard to Active Directory and mobile application security.
The security of the global Default Free Zone DFZ) has been a topic of much debate and concern for the last twenty years (or more). Two recent papers have brought this issue to the surface once again—it is worth looking at what these two papers add to the mix of what is known, and what solutions might be available. The first of these—
Demchak, Chris, and Yuval Shavitt. 2018. “China’s Maxim – Leave No Access Point Unexploited: The Hidden Story of China Telecom’s BGP Hijacking.” Military Cyber Affairs 3 (1). https://doi.org/10.5038/2378-0789.3.1.1050.
—traces the impact of Chinese “state actor” effects on BGP routing in recent years. Whether these are actual attacks, or mistakes from human error for various reasons generally cannot be known, but the potential, at least, for serious damage to companies and institutions relying on the DFZ is hard to overestimate. This paper lays out the basic problem, and the works through a number of BGP hijacks in recent years, showing how they misdirected traffic in ways that could have facilitated attacks, whether by mistake or intentionally. For instance, quoting from the paper—
Execs didn’t say which competitors Fortinet’s security products displaced, but it competes against companies including Palo Alto Networks, Check Point Software, and Cisco.
National-security experts have been warning of terrorist cyberattacks for 15 years. Why hasn’t one happened yet?As a pen-tester who has broken into power grids and found 0dayss in control center systems, I thought I'd write up some comments.
Cisco developed a four-step model for IT operations maturity showing where organizations are now and where they would like to be in two years.
To understand where next-gen communications will be tomorrow, look to the 5G trials of today.
The company offers open source-based software platforms that allow enterprises to manage distributed application infrastructure. It competes against companies like Puppet and Chef.
If you do @nmap scanning with big exclusion lists, things are about to get a lot faster. ;)— Daniel Miller ✝ (@bonsaiviking) November 1, 2018
Rory Peacock is the Deputy Executive Director of Technology at Education Service Center Region 11, where he oversees all technology services provided to Region 11 schools.
Region 11 is one of 20 education service centers throughout the State of Texas. In Texas, an education service center manages education programs, delivers technical assistance, and provides professional development to schools within its region. With regards to technology, education service centers assist their schools with hosted services and technical support.
Education Service Center Region 11 serves 70,699 educators and almost 600,000 students across 10 urban and rural counties.
I had the opportunity to talk to Rory about some of his largest technology challenges since he joined Region 11 in 2015.
Region 11 is a long-time VMware customer, introducing VMware vSphere in 2009. Since then, Region 11 has virtualized over 95% of their server environment. They’ve also made the move to virtual desktops utilizing VMware Horizon to support their 200 employees.
On the very day in 2016 that a meeting was set with the VMware NSX Data Center team to demo the product, Region 11 was hit with a zero-day attack of ransomware. A legacy system was hit in its demilitarized Continue reading
“Our goal is to bring a full software layer down to the lowest edge layer possible and to make building for the edge as easy as building for the cloud,” says CEO Kilton Hopkins.