Top tips for finding the right cybersecurity products

Having trouble finding the right security products for your business? You’re not the only one.Today’s market is filled with hundreds of vendors and plenty of marketing hype. But figuring out which solutions are worthwhile can be a challenge, especially for businesses with little experience in cybersecurity.  So we asked actual buyers of enterprise security products for tips, and here’s what they said.  Damian Finol, security technical program manager at a major internet firm Businesses have to do their research. That means looking at customer recommendations instead of relying on what vendors say. Testing the security products in house is also highly advised.To read this article in full or to leave a comment, please click here

The pitfalls of cybersecurity shopping: hype and shoddy products

There's a growing threat on the cybersecurity scene that could drain millions from unsuspecting businesses and leave them vulnerable to hacking threats.It isn’t a new strain of ransomware. It’s the cybersecurity industry itself.It's ironic, but the products vendors sell, and the marketing they use, sometimes leave buyers misinformed and less secure, according to several business directors who actually buy the tech.   “There’s definitely a lot of vaporware,” said Damian Finol, an IT security manager at a major internet company. “There are definitely products that have really exaggerated claims about what they actually do.”For some vendors, it's more about the sale than about security, IT executives say. To close a deal, bad vendors tend to overpromise features that they claim will be added down the line but never materialize. That makes a buyer's job harder.To read this article in full or to leave a comment, please click here

25 geek-inspired gifts for Mother’s Day

To mom, with loveImage by Ultimate Ears, Looking Glass Design, ThinkGeek, Vik Muniz and MoMA StoreIf you're looking for Mother’s Day gift ideas that are less about gadgets and more about stellar product design, this is the collection for you. The tech quotient is low, but the design bar is high. The creators are artists, craftspeople and industrial designers – and their inspiration comes from science, technology, engineering and math.To read this article in full or to leave a comment, please click here

Learning Python: Week2 (Printing, Numbers, and Lists) -Part 5

As discussed in post  ( https://crazyrouters.wordpress.com/2017/02/25/learning-python-kirk-byers-python-course/  ) , i will be sharing the my learning on weekly basis as course continues. This will not only motivate me but also help others who are in phase of learning python 3. This post will focus on Exercise 4. ################# Exercise 4 ############# IV. You have the following […]

Promoting Digital Accessibility in Sri Lanka

Starting December 2015, the Internet Society Asia-Pacific (ISOC APAC) Bureau in collaboration with local stakeholders including government, industry and the civil society, has led a series of endeavours to help further digital accessibility in Pakistan.

Building on the success of our work in Pakistan, and in an effort to replicate the learnings in other parts of the Asia-Pacific, we recently held a workshop on digital accessibility in Colombo, Sri Lanka, hosted by the ISOC Sri Lanka chapter.

Mr. Naveed Haq

Arista infringed on two original Cisco patents, ITC finds

The legal ping-pong battle between Cisco and Arista Thursday found Cisco on the winning side as In the International Trade Commission ruled that Arista switches infringe on two core Cisco patents that the company says are key technologies in its network switching pantheon.+More on Network World: Arista gets important win over Cisco in patent battle+Mark Chandler, senior vice president, General Counsel and Secretary of Cisco wrote in a blog post of the Commission’s specific ruling that Arista was:To read this article in full or to leave a comment, please click here

Arista infringed on two original Cisco patents, ITC finds

The legal ping-pong battle between Cisco and Arista Thursday found Cisco on the winning side as In the International Trade Commission ruled that Arista switches infringe on two core Cisco patents that the company says are key technologies in its network switching pantheon.+More on Network World: Arista gets important win over Cisco in patent battle+Mark Chandler, senior vice president, General Counsel and Secretary of Cisco wrote in a blog post of the Commission’s specific ruling that Arista was:To read this article in full or to leave a comment, please click here

Arista infringed on two original Cisco patents, ITC finds

The legal ping-pong battle between Cisco and Arista Thursday found Cisco on the winning side as In the International Trade Commission ruled that Arista switches infringe on two core Cisco patents that the company says are key technologies in its network switching pantheon.+More on Network World: Arista gets important win over Cisco in patent battle+Mark Chandler, senior vice president, General Counsel and Secretary of Cisco wrote in a blog post of the Commission’s specific ruling that Arista was:To read this article in full or to leave a comment, please click here

Trade commission finds Arista infringed on two original Cisco patents

The legal ping-pong battle between Cisco and Arista Thursday found Cisco on the winning side as In the International Trade Commission ruled that Arista switches infringe on two core Cisco patents that the company says are key technologies in its network switching pantheon.+More on Network World: Arista gets important win over Cisco in patent battle+Mark Chandler, senior vice president, General Counsel and Secretary of Cisco wrote in a blog post of the Commission’s specific ruling that Arista was:To read this article in full or to leave a comment, please click here

Trade commission finds Arista infringed on two original Cisco patents

The legal ping-pong battle between Cisco and Arista Thursday found Cisco on the winning side as In the International Trade Commission ruled that Arista switches infringe on two core Cisco patents that the company says are key technologies in its network switching pantheon.+More on Network World: Arista gets important win over Cisco in patent battle+Mark Chandler, senior vice president, General Counsel and Secretary of Cisco wrote in a blog post of the Commission’s specific ruling that Arista was:To read this article in full or to leave a comment, please click here

CCIE Renewed Again – Exam 400-101 v5.1

It came around again: CCIE renewal. Last time I renewed, I wasn’t sure if I should do it again. But I gave in, passed the CCIE R&S Written Exam, and moved one step closer to Emeritus. Turns out it wasn’t that bad, and I should not have put it off for so long.

Renewal Cycle

Cisco certifications below Expert level have a 3-year renewal cycle. You can renew your CCNA or CCNP certifications at any time by sitting an exam at the same level. Your 3-year cycle restarts from the day you pass that exam.

CCIE is a little different. A CCIE certification remains valid for two years from your lab date. You can sit any CCIE-level written exam to renew your CCIE certification. At that point your validity date gets extended for another two years – note that it is another two years based upon your lab date, not the date you passed your most recent re-cert exam.

If you don’t pass a written exam during the two-year period, your status goes to “Suspended.” You then have another 12 months to pass the exam, or you completely lose your CCIE status.

My renewal date was last Continue reading

Cisco Live US 2017 – Saturday Adventure

For the last couple years, on the Saturday before Cisco Live US kicks off, we like to go and do something in the host city.  Nothing big.  Nothing fancy.  Just something we aren’t going to be able to do once the conference gets going.  In San Diego, we went to the zoo.  Last year, we went to the National Atomic Testing Museum.  This year, we’re going to the National Museum of Organized Crime and Law Enforcement…aka, the Mob Museum.

It’s Vegas.  This placed used to be full of mobsters doing some unsavory things.  I like to think it’s a bit more legit these days, but it’ll be fun to see how the mob and the law danced around back in the day.  It’s in the old historic post office and courthouse a couple block off Fremont Street and is complete with full courtroom and the wall where the Saint Valentine’s Day Massacre occurred. I should be a good time assuming we make it past the police lineup.

All are invited.  If you want to join us, drop me a message on Twitter.  We’ll probably meet for lunch then head over there in the early afternoon.  Or head over there for lunch. Continue reading

BBR TCP

TCP is the workhorse of the Internet Protocol suite. It's the protocol that tries to take a unreliable datagram service and transform it into a reliable data stream. But that's not all. We also want it to operate efficiently over all types of network paths from bits to gigabits per second. Google has recently announced a new form of TCP control algorithm, called BBR, and in this article I'll take a closer look at BBR and what it is trying to achieve.

Technology Short Take #82

Welcome to Technology Short Take #82! This issue is a bit behind schedule; I’ve been pretty heads-down on some projects. That work will come to fruition in a couple weeks, so I should be able to come up for some air soon. In the meantime, here’s a few links and articles for your reading pleasure.

Networking

  • Kristian Larsson shows how to validate data using YANG. Practical examples like this have really helped me better understand YANG and its relationship to structured data you might exchange with a device or service.
  • There’s lots of talk about applying test-driven development (TDD) principles in various automation contexts, but I like the fact that Ajay Chenampara provides some practical examples in his blog post on applying TDD in network automation using Ansible.
  • Matt Oswalt talks about how the combination of NAPALM and StackStorm enables some interesting results, including the ability to verify configuration consistency. StackStorm isn’t something I’ve had the opportunity to learn/use at all, but it’s on my (ever-growing) list of things to check out.
  • Aaron Conole provides an overview of using the ovs-dpctl command to “program” the Open vSwitch (OVS) kernel module. It’s a bit geeky, but does provide some insight into Continue reading

Google Docs phishing attack underscores OAuth security risks

Google has stopped Wednesday’s clever email phishing scheme, but the attack may very well make a comeback.One security researcher has already managed to replicate it, even as Google is trying to protect users from such attacks.“It looks exactly like the original spoof,” said Matt Austin, director of security research at Contrast Security.The phishing scheme -- which may have circulated to 1 million Gmail users -- is particularly effective because it fooled users with a dummy app that looked like Google Docs.To read this article in full or to leave a comment, please click here

Google Docs phishing attack underscores OAuth security risks

Google has stopped Wednesday’s clever email phishing scheme, but the attack may very well make a comeback.One security researcher has already managed to replicate it, even as Google is trying to protect users from such attacks.“It looks exactly like the original spoof,” said Matt Austin, director of security research at Contrast Security.The phishing scheme -- which may have circulated to 1 million Gmail users -- is particularly effective because it fooled users with a dummy app that looked like Google Docs.To read this article in full or to leave a comment, please click here

Snake cyberespionage malware is ready to bite Mac users

A sophisticated Russian cyberespionage group is readying attacks against Mac users and has recently ported its Windows backdoor program to macOS.The group, known in the security industry as Snake, Turla or Uroburos, has been active since at least 2007 and has been responsible for some of the most complex cyberespionage attacks. It targets government entities, intelligence agencies, embassies, military organizations, research and academic institutions and large corporations."Compared to other prolific attackers with alleged ties to Russia, such as APT28 (Fancy Bear) and APT29 (Cozy Bear), Snake’s code is significantly more sophisticated, it’s infrastructure more complex and targets more carefully selected," researchers from Dutch cybsersecurity firm Fox-IT said in a blog post Wednesday.To read this article in full or to leave a comment, please click here

Snake cyberespionage malware is ready to bite Mac users

A sophisticated Russian cyberespionage group is readying attacks against Mac users and has recently ported its Windows backdoor program to macOS.The group, known in the security industry as Snake, Turla or Uroburos, has been active since at least 2007 and has been responsible for some of the most complex cyberespionage attacks. It targets government entities, intelligence agencies, embassies, military organizations, research and academic institutions and large corporations."Compared to other prolific attackers with alleged ties to Russia, such as APT28 (Fancy Bear) and APT29 (Cozy Bear), Snake’s code is significantly more sophisticated, it’s infrastructure more complex and targets more carefully selected," researchers from Dutch cybsersecurity firm Fox-IT said in a blog post Wednesday.To read this article in full or to leave a comment, please click here