IDG Contributor Network: Zero-trust security adds necessary ingredients

Today's threat landscape consists of skilled, organized and well-funded bad actors. They have many goals including exfiltrating sensitive data for political or economic motives. To combat these multiple threats, the cybersecurity market is required to expand at an even greater rate.The IT leaders must evolve their security framework if they want to stay ahead of the cyber threats. The evolution in security we are witnessing has a tilt towards the Zero-Trust model and the software-defined perimeter (SDP), also called a “Black Cloud”. The principle of its design is based on the need-to-know model.The Zero-Trust model says that anyone attempting to access a resource must be authenticated and be authorized first. Users cannot connect to anything since unauthorized resources are invisible, left in the dark. For additional protection, the Zero-Trust model can be combined with machine learning (ML) to discover the risky user behavior. Besides, it can be applied for conditional access.To read this article in full, please click here

IDG Contributor Network: Zero-trust security adds necessary ingredients

Today's threat landscape consists of skilled, organized and well-funded bad actors. They have many goals including exfiltrating sensitive data for political or economic motives. To combat these multiple threats, the cybersecurity market is required to expand at an even greater rate.The IT leaders must evolve their security framework if they want to stay ahead of the cyber threats. The evolution in security we are witnessing has a tilt towards the Zero-Trust model and the software-defined perimeter (SDP), also called a “Black Cloud”. The principle of its design is based on the need-to-know model.The Zero-Trust model says that anyone attempting to access a resource must be authenticated and be authorized first. Users cannot connect to anything since unauthorized resources are invisible, left in the dark. For additional protection, the Zero-Trust model can be combined with machine learning (ML) to discover the risky user behavior. Besides, it can be applied for conditional access.To read this article in full, please click here

Network Discovery and Mapping

What is Network Discovery and Mapping? As networks are growing and getting more dynamic, mapping and documenting the devices that are connected to our network will be harder and much time consuming. I know paper work and the network documentation are the two tasks most network engineers, including myself hate, but these are necessary steps, …

The post Network Discovery and Mapping appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Network Discovery and Mapping

What is Network Discovery and Mapping? As networks are growing and getting more dynamic, mapping and documenting the devices that are connected to our network will be harder and much time consuming. I know paper work and the network documentation are the two tasks most network engineers, including myself hate, but these are necessary steps, …

The post Network Discovery and Mapping appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Network Discovery and Mapping

      What is Network Discovery and Mapping?   As networks are growing and getting more dynamic, mapping and documenting the devices that are connected to our network will be harder and much time consuming.     I know paper work and the network documentation are the two tasks most network engineers, including myself […]

The post Network Discovery and Mapping appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Stakeholder Workshop Held to Discuss Tajikistan IXP

The Internet Society in conjunction with the Open Society Institute Assistance Foundation – Tajikistan and the CAREN3 project organised an IXP workshop on 25 October 2018 at the Center of Written Heritage of the Tajik Academy of Sciences, in Dushanbe, Tajikistan. This followed on from a previous workshop held in 2017, and brought together nearly 30 stakeholders from local ISPs, civil society, and academia to discuss progress on the establishment of an Internet Exchange Point in Tajikistan.

I opened the workshop by summarising the IXP Environment Assessment report for Tajikistan that was commissioned by the Internet Society in 2017. This highlighted that Internet usage was below average for the region, and partly contributed to the low levels of economic growth in the country. The number of Internet users is estimated at between 15-40% of the population, Internet services are costly, and areas outside of the main cities do not have good access to broadband.

Internet uptake and use has been constrained by a variety of different factors, some of which are related to the geographic conditions (such as the landlocked mountainous nature of the country), and these have led to high prices for international capacity, high cost of services for the Continue reading

Dell EMC committed to networking, shares product and partnership plans

Dell EMC has one of the broadest networking portfolios in the industry. What’s unique about Dell EMC’s approach is that it's a mix of its own technology, as well as network partners. Also, it offers traditional hardware products and software-only products and supports white-box implementation. As an industry watcher, I’ve always been confused by the strategy of Dell EMC Networking. I know I’m not alone in this, as other network professionals I’ve talked to have echoed this sentiment.Recently, I had an opportunity to talk with Tom Burns, senior vice president and general manager of Dell EMC Networking and Solutions, about the company's networking portfolio and asked if he could clarify what is included in it.To read this article in full, please click here

DNS over HTTPS seeks to make internet use more private

Unauthorized interception of DNS traffic provides enough information to ascertain internet users’ thoughts, desires, hopes and dreams.  Not only is there concern for privacy from nearby nosey neighbors, but governments and corporations could use that information to learn about individuals’ internet behavior and use it to profile them and their organization for political purposes or target them with ads. To read this article in full, please click here(Insider Story)

Dell EMC committed to networking, shares product and partnership plans

Dell EMC has one of the broadest networking portfolios in the industry. What’s unique about Dell EMC’s approach is that it's a mix of its own technology, as well as network partners. Also, it offers traditional hardware products and software-only products and supports white-box implementation. As an industry watcher, I’ve always been confused by the strategy of Dell EMC Networking. I know I’m not alone in this, as other network professionals I’ve talked to have echoed this sentiment.Recently, I had an opportunity to talk with Tom Burns, senior vice president and general manager of Dell EMC Networking and Solutions, about the company's networking portfolio and asked if he could clarify what is included in it.To read this article in full, please click here

DNS over HTTPS seeks to make internet use more private

Unauthorized interception of DNS traffic provides enough information to ascertain internet users’ thoughts, desires, hopes and dreams.  Not only is there concern for privacy from nearby nosey neighbors, but governments and corporations could use that information to learn about individuals’ internet behavior and use it to profile them and their organization for political purposes or target them with ads. To read this article in full, please click here(Insider Story)

DNS over HTTPS seeks to make internet use more private

Unauthorized interception of DNS traffic provides enough information to ascertain internet users’ thoughts, desires, hopes and dreams.  Not only is there concern for privacy from nearby nosey neighbors, but governments and corporations could use that information to learn about individuals’ internet behavior and use it to profile them and their organization for political purposes or target them with ads. Efforts like the DNS Privacy Project aim to raise awareness of this issue and provide pointers to resources to help mitigate these threats.To read this article in full, please click here(Insider Story)

David Gee on Automated Workflows

David Gee is coming back to Building Network Automation Solutions online course – in early March 2019 he’ll talk about hygiene of network automation. Christoph Jaggi did an interview with him to learn more about the details of his talk, and they quickly diverted into an interesting area: automated workflows.

Automation is about automated workflows. What kind of workflows can be automated in IT and networking?

Workflows most often fall into categorizations of build, operations and remediation.

Read more ...