Cisco discovered a number of vulnerabilities affecting devices that connect to its SD-WAN software. This includes one critical security flaw to its vController software.
ExtraHop CEO Arif Kareem is also positioning the software provider for an IPO in the next 24 months. But he’s quick to add, “that’s not our end goal.”
Have you ever tried to make water flow in a specific direction? Maybe you have some particularly muddy spot in your yard, so you dig a small ditch and think, “the water will now flow from here to there, and the muddy spot won’t be so muddy the next time it rains.” Then it rains, and the water goes a completely different direction, or overflows the little channel you’ve dug, making things worse. The most effective way to channel water, of course, is to put it in pipes—but this doesn’t always seem to work, either.
The next time you think about shadow IT in your organization, think of these pipes, and how the entire system of IT must look to a user in your organization. For instance, I have had corporate laptops where you must enter two or three passwords to boot the laptop, provided by departments that require you to use your corporate laptop for everything, and with security rules forbidding the use of any personal software on the corporate laptop. I have even had company issued laptops on which you could not modify the position of icons on the desktop, change the menu items in any piece Continue reading
Two main issues remain: Dissatisfaction by vendors with the technical approach being taken by the Defense Department, and if Pentagon personnel moves represent a conflict of interest.
The one-year delay is because initial 5G network launches are using the non-standalone architecture that relies on already deployed 4G LTE evolved packet core technology.

This is a guest post from Ryan Averill at FraudGuard.io.
At FraudGuard.io we are a team of just a few developers; all working with our customers to try to make their applications as safe as possible. We have been working on FraudGuard for about 3 years and we’ve had paying customers for more than 2 years now. The main idea behind FraudGuard is for us to get attacked so you don’t have to. In other words; reduce the overall number of attacks your application receives each day by leveraging our threat data. We do this by by taking our attack data from our network of honeypots and share that data via API direct to you. Instead of some businesses just running services like Maxmind, that update occasionally, we actually run the entire process in house so we can immediately share real-time attack data from around the world....
1&1 Drillisch confirms its intention to take part in Germany’s upcoming 5G spectrum auction in March.
Today's Tech Bytes, sponsored by Nubeva, dives into Nubeva Prisms, a public cloud packet broker that acquires, processes, and distributes packets for cloud or on-premises packet analysis tools.
The post Tech Bytes: Packet Visibility In Public Clouds With Nubeva Prisms (Sponsored) appeared first on Packet Pushers.
If you can only attend one conference this year – make it matter. DockerCon is the one-stop event for practitioners, contributors, maintainers, developers, and the container ecosystem to learn, network and innovate. And this year, we will continue to bring you all the things you love about DockerCon like Docker Pals, the Hallway Track and roundtables, and the sessions and content you wanted more of – including open source, transformational, and practical how-to talks. Take advantage of our lowest ticket price when you register by January 31, 2019. No codes required.

And in case you are still not convinced, here are a few more reasons you shouldn’t miss this year’s DockerCon
2. Think big. Docker containers and our container platform are being used everywhere for everything – from sending rockets to space to literally saving the earth from asteroids to keeping e-commerce running smoothly for black friday shoppers. Come to DockerCon and Continue reading
Today's Network Break examines a US Homeland Security advisory on DNS tampering, covers 400G switching news from Arrcus and Huawei, analyzes financial results from Intel and F5, and more. Plus stay tuned for a sponsored Tech Bytes conversation with Nubeva about its cloud packet broker.
The post Network Break 219: Beware DNS Tampering; Arrcus Tackles 400G Switches appeared first on Packet Pushers.

I do receive feedback that I express strong opinions. Some people even make that sound like a negative thing. In my networking career, my core value proposition was to develop a strong opinion to suggest, explain and justify spending millions of company dollars.
The post Strong Opinions, Loosely Held appeared first on EtherealMind.
Machine learning, arguably the most interesting and successful form of artificial intelligence, only worked because of the confluence of enormous amounts of data to train models and tremendous amounts of compute to chew on that data with many-layered statistical algorithms. …
What is The Next AI Platform? was written by Nicole Hemsoth at .