April 2017: The month in hacks and breaches

April may not have been the busiest month for security breaches, but what it lacks in volume it made up for in variety. The month began loudly when a hacker set off all of Dallas’s 156 emergency tornado alarms for 90 minutes in the wee hours of the morning on the seventh.Then on April 10, London-based Wonga Group revealed that as many as a quarter-million bank accounts may have been compromised. They weren’t alone. On the seventeenth, InterContinental reported that customer data may have been taken at more than 1,000 of its hotels.To read this article in full or to leave a comment, please click here(Insider Story)

April 2017: The month in hacks and breaches

April may not have been the busiest month for security breaches, but what it lacks in volume it made up for in variety. The month began loudly when a hacker set off all of Dallas’s 156 emergency tornado alarms for 90 minutes in the wee hours of the morning on the seventh.To read this article in full or to leave a comment, please click here(Insider Story)

Why online etiquette matters — and why IT leaders should care

It seems that not a week goes by without social media hitting a new high — or, as United Airlines might attest, a new low. Whatever your perspective, there’s no denying that social networks and online connections can shape how we work, think and interact to a dramatic degree.High-tech analyst and consultant Scott Steinberg offers guidance on how to get along in this digital world with his new book, Netiquette Essentials: New Rules for Minding Your Manners in a Digital World, which was released in February. This is Steinberg’s seventh book about business or technology. Here he discusses why manners matter on social media, and why CIOs should care.To read this article in full or to leave a comment, please click here

Review: The 6 best JavaScript IDEs

JavaScript is used for many different kinds of applications today. Most often, JavaScript works with HTML5 and CSS to build web front ends. But JavaScript also helps build mobile applications, and it’s finding an important place on the back end in the form of Node.js servers. Fortunately, JavaScript development tools—both editors and IDEs—are rising to meet the new challenges.Application lifecycle management (ALM) integration in Visual Studio 2017 is very good. I would happily use Visual Studio 2017 as my IDE for JavaScript if I were working primarily on Windows-based computers on projects using Microsoft technologies, especially ones that included Azure deployments and those of enterprise scale.To read this article in full or to leave a comment, please click here(Insider Story)

Making sense of cybersecurity qualifications

IBM’s cybersecurity division has hired nearly 2,000 professionals to its security team since 2015. Leaders recognize that the skills needed to succeed don't always come in the form of a traditional degree, but “the sheer volume of new certifications being created does pose challenges,” says Diana Kelley, global executive security adviser.It’s a growing problem for many employers. Increasingly, hiring companies must sift through resumes that tout cybersecurity-related degrees, certificates, industry certifications, apprenticeship credentials, digital badges, micro master’s degrees, nanodegrees and other credentials – trying to determine what a candidate really knows and how those credentials fit together.To read this article in full or to leave a comment, please click here

False positives still cause threat alert fatigue

It is commonly referred to as information overload. An infosec professional throws out a wide net in hopes of stopping malware before it gets too deep into the network, but like a motion-sensor light, sometimes the alert catches a squirrel instead of a burglar.Rob Kerr, chief technology officer at Haystax Technology, cited the 2013 breach at Target, as an example in which thieves stole some 40 million Target credit cards by accessing data on point of sale (POS) systems. Target later revised that number to include theft of private data for 70 million customers.To read this article in full or to leave a comment, please click here

False positives still cause threat alert fatigue

It is commonly referred to as information overload. An infosec professional throws out a wide net in hopes of stopping malware before it gets too deep into the network, but like a motion-sensor light, sometimes the alert catches a squirrel instead of a burglar.Rob Kerr, chief technology officer at Haystax Technology, cited the 2013 breach at Target, as an example in which thieves stole some 40 million Target credit cards by accessing data on point of sale (POS) systems. Target later revised that number to include theft of private data for 70 million customers.To read this article in full or to leave a comment, please click here

IDG Contributor Network: A glimpse into the future of the IT organization

Welcome to ITSM and Beyond, a new blog inspired by honest conversations with CIOs and the fundamental way they have pursued transformative information technology and IT Service Management (ITSM) strategies.It must be human nature to attempt to be a prognosticator, since it seems we are constantly trying to predict the future. Sometimes it’s something simple and immediate, such as predicting tomorrow’s weather. Other times we look farther into the future, like trying to predict where our careers will take us. Regardless of what we are trying to predict, if we can do so accurately, then we will make good decisions and be successful in meeting our goals and objectives.To read this article in full or to leave a comment, please click here

IDG Contributor Network: A glimpse into the future of the IT organization

Welcome to ITSM and Beyond, a new blog inspired by honest conversations with CIOs and the fundamental way they have pursued transformative information technology and IT Service Management (ITSM) strategies.It must be human nature to attempt to be a prognosticator, since it seems we are constantly trying to predict the future. Sometimes it’s something simple and immediate, such as predicting tomorrow’s weather. Other times we look farther into the future, like trying to predict where our careers will take us. Regardless of what we are trying to predict, if we can do so accurately, then we will make good decisions and be successful in meeting our goals and objectives.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Engineering an entrepreneurial project management environment

To consistently deliver business outcomes in a dynamic digital landscape where priorities, scope and urgency are in constant flux, IT teams need a project management workforce that can rapidly adapt to change. In response, many have made concentrated efforts to identify, attract and develop Entrepreneurial project managers. These Entrepreneurs are nearly twice as effective at delivering business outcomes than their low-performing peers because they possess a set of critical skills, including judgment, stakeholder partnership and learning agility.To read this article in full or to leave a comment, please click here

Off The Cuff – Cisco Acquiring Viptela

In this Off The Cuff episode of Network Collective, we talk about all aspects of Cisco’s announcement of their intent to acquire Viptela’s SD-WAN product.  Who wins in this deal?  What happens to Cisco’s existing SD-WAN product line?  What happens to the rest of the SD-WAN market?  Keith Townsend and Tom Hollingsworth join the Network Collective hosts in breaking down what this means for all involved.

 

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/


Keith Townsend
Guest
Tom Hollingsworth
Guest
Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host
Phil Gervasi
Co-Host

Audio Only Podcast Feed:

The post Off The Cuff – Cisco Acquiring Viptela appeared first on Network Collective.

Off The Cuff – Cisco Acquiring Viptela

In this Off The Cuff episode of Network Collective, we talk about all aspects of Cisco’s announcement of their intent to acquire Viptela’s SD-WAN product.  Who wins in this deal?  What happens to Cisco’s existing SD-WAN product line?  What happens to the rest of the SD-WAN market?  Keith Townsend and Tom Hollingsworth join the Network Collective hosts in breaking down what this means for all involved.

 

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/


Keith Townsend
Guest
Tom Hollingsworth
Guest
Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host
Phil Gervasi
Co-Host

Audio Only Podcast Feed:

The post Off The Cuff – Cisco Acquiring Viptela appeared first on Network Collective.

Docker Enterprise Edition Lights a New Spark of Innovation within MetLife

MetLife, the global provider of insurance, annuities, and employee benefit programs, will be celebrating it’s 150th birthday next year. Survival and success in their space depends on being agile and able to respond to changing market requirements. During the Day 2 General Session at DockerCon 2017, MetLife shared how they’re inspiring new innovation in their organization with Docker Enterprise Edition (EE).

Information Management is Core to MetLife

MetLife offers auto, home, dental, life, disability, vision, and health insurance to over 100 million customers across 50 countries. Their business relies on information – about policyholders, risk assessments, financial and market data, etc. Aaron Ades, AVP of Solutions Engineering at MetLife offers that they’ve been in the information management business for 150 years and have accumulated over 400 systems of record – some apps are over 30 years old.

Docker customers

The challenge for MetLife is that they still have a lot of legacy technology that they must work with. Aaron shared that there is still code running today that was first written in 1982, but they still need to deliver a modern experience on top of those legacy systems.

To hear more about how MetLife is staying ahead of their competition using Docker, Continue reading

Juniper Control Plane Protection

How Does Internet Work - We know what is networking

I already wrote about Control Plane Protection in one of my previous posts focused on Cisco device configuration. Here we will make the same thing on Juniper device, I was using Juniper SRX300 and Juniper SRX1500 devices in my lab. CoPP ?? Control Plane Protection (CoPP) is a method of protecting processor unit, running services on your network device, against excessive flooding. Excessive flooding of traffic aimed towards your router/firewall processor, being that valid or malicious, is always undesirable and can also be dangerous. A network device, which starts the receive more control traffic that his processor can process, will

Juniper Control Plane Protection

Learning Python: Week2 (Printing, Numbers, and Lists) -Part 3

As discussed in last post,  ( https://crazyrouters.wordpress.com/2017/02/25/learning-python-kirk-byers-python-course/  ) , i will be sharing the my learning on weekly basis as course continues. This will not only motivate me but also help others who are in phase of learning python 3. Here we are going to discuss the Exercise 2 . Here is the Exercise 2 […]

Kubernetes Networking 101 – Ingress resources

I called my last post ‘basic’ external access into the cluster because I didn’t get a chance to talk about the ingress object.  Ingress resources are interesting in that they allow you to use one object to load balance to different back-end objects.  This could be handy for several reasons and allows you a more fine-grained means to load balance traffic.  Let’s take a look at an example of using the Nginx ingress controller in our Kubernetes cluster.

To demonstrate this we’re going to continue using the same lab that we used in previous posts but for the sake of level setting we’re going to start by clearing the slate.  Let’s delete all of the objects in the cluster and then we’ll start by build them from scratch so you can see every step of the way how we setup and use the ingress.

kubectl delete deployments --all
kubectl delete pods --all
kubectl delete services --all

Since this will kill our net-test pod, let’s start that again…

kubectl run net-test --image=jonlangemak/net_tools

Recall that we used this pod as a testing endpoint so we could simulate traffic originating from a pod so it’s worth keeping around.

Alright – now that we Continue reading