Security Sessions: The CSO’s role in active shooter planning

In the latest episode of Security Sessions, CSO Editor-in-chief Joan Goodchild speaks with Imad Mouline, CTO at Everbridge, about how involved CSOs need to be with planning for an active shooter or other emergency at their company. While many leave physical security to others in the company, the CSO can be key to determining communications plans for alerting employees.

Musing: Open Network Linux Expansion | Big Switch Networks, Inc.

Progress towards standardised switching hardware is moving along nicely. Big Switch is support 14 MORE platforms with its OpenNetworkLinux NOS and applications.

Support for 12 New Platforms

In addition to the Facebook boxes above, we’ve added support for the following new 1G, 10G, and 100G switch platforms:

  1. Celestica Redstone XP, Redstone XL, and Seastone
  2. Agema AGC7648
  3. Alpha Networks SNX-60×0-486F
  4. Dell S6100-ON, S6010-ON, S4048t-ON, Z9100-ON
  5. Accton AS4610 (ARM), AS5512 (Nephos), AS7512 (Cavium), AS7716 (Xeon)

Open Network Linux Expansion | Big Switch Networks, Inc. : http://www.bigswitch.com/blog/2016/11/21/open-network-linux-expansion

The post Musing: Open Network Linux Expansion | Big Switch Networks, Inc. appeared first on EtherealMind.

How to prevent a bad case of cloud buyer’s remorse

The trend is clear: The percentage of IT infrastructure and application workloads residing in enterprise data centers is expected to shrink from 59% today to 47% in two years, primarily the result of companies shifting resources to the public cloud, according to a survey recently released by data center provider Datalink.To read this article in full or to leave a comment, please click here(Insider Story)

RSAC Innovation Sandbox winners: One year later

With the annual RSA security conference just around the corner, we decided to touch base with the 10 companies selected as finalists in last year’s Innovation Sandbox competition and see how they’re making out. The RSA Conference had 88 submissions for Innovation Sandbox slots last year and the field was whittled down to Bastille Networks, Illusive Networks, Menlo Security, Phantom Cyber, Prevoty, ProtectWise, SafeBreach, Skyport, Vera and Versa Networks. In last year’s competition, each vendor pitched their product to a panel of judges, as well as a packed house of attendees at the Moscone Center in San Francisco. Phantom Networks was selected as the overall winner.To read this article in full or to leave a comment, please click here(Insider Story)

RSA Innovation Sandbox winners: One year later

With the annual RSA security conference just around the corner, we decided to touch base with the 10 companies selected as finalists in last year’s Innovation Sandbox competition and see how they’re making out.The RSA Conference had 88 submissions for Innovation Sandbox slots last year and the field was whittled down to Bastille Networks, Illusive Networks, Menlo Security, Phantom Cyber, Prevoty, ProtectWise, SafeBreach, Skyport, Vera and Versa Networks. In last year’s competition, each vendor pitched their product to a panel of judges, as well as a packed house of attendees at the Moscone Center in San Francisco. Phantom Networks was selected as the overall winner.To read this article in full or to leave a comment, please click here(Insider Story)

Google ordered by US court to produce emails stored abroad

Google has been ordered by a federal court in Pennsylvania to comply with search warrants and produce customer emails stored abroad, in a decision that is in sharp contrast to that of an appeals court in a similar case involving Microsoft.Magistrate Judge Thomas J. Rueter of the U.S. District Court for the Eastern District of Pennsylvania ruled Friday that the two warrants under the Stored Communications Act (SCA) for emails required by the government in two criminal investigations constituted neither a seizure nor a search of the targets' data in a foreign country.Transferring data electronically from a server in a foreign country to Google's data center in California does not amount to a seizure because “there is no meaningful interference with the account holder's possessory interest in the user data,” and Google’s algorithm in any case regularly transfers user data from one data center to another without the customer's knowledge, Judge Rueter wrote.To read this article in full or to leave a comment, please click here

Google ordered by US court to produce emails stored abroad

Google has been ordered by a federal court in Pennsylvania to comply with search warrants and produce customer emails stored abroad, in a decision that is in sharp contrast to that of an appeals court in a similar case involving Microsoft.Magistrate Judge Thomas J. Rueter of the U.S. District Court for the Eastern District of Pennsylvania ruled Friday that the two warrants under the Stored Communications Act (SCA) for emails required by the government in two criminal investigations constituted neither a seizure nor a search of the targets' data in a foreign country.Transferring data electronically from a server in a foreign country to Google's data center in California does not amount to a seizure because “there is no meaningful interference with the account holder's possessory interest in the user data,” and Google’s algorithm in any case regularly transfers user data from one data center to another without the customer's knowledge, Judge Rueter wrote.To read this article in full or to leave a comment, please click here

New products of the week 2.6.17

New products of the weekImage by FortinetOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Red Armor NSE7000Image by corsaTo read this article in full or to leave a comment, please click here

New products of the week 2.6.17

New products of the weekImage by FortinetOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Red Armor NSE7000Image by corsaTo read this article in full or to leave a comment, please click here

S. Korea plans to tighten battery regulations post Note7 crisis

In the wake of the Note7 debacle, South Korea is introducing new tests and regulations to ensure battery and smartphone safety, the Ministry of Trade, Industry and Energy said.The new measures will include requiring manufacturers to certify the safety of lithium-ion batteries based on new technologies in the process of production.The announcement Monday by MOTIE also agrees with the analysis by Samsung Electronics and some experts on the cause of the overheating and even explosions of some Galaxy Note7 smartphones.Samsung, backed by experts from Exponent, TUV Rheinland and UL, said in January that the overheating of some Note7 phones was likely caused by the faulty design and manufacturing of batteries by two suppliers, rather than by the design of the smartphone itself.To read this article in full or to leave a comment, please click here

Lenovo’s Yoga A12 Android 2-in-1 has futuristic touch panel keyboard

Lenovo is ditching the hard keyboard for a cool new touch one on its new Yoga A12 2-in-1, which can be an Android tablet or a laptop. But for those seeking the latest and greatest hardware, there's a disappointment. It runs on an old chip from Intel, which has rolled back its development of Android, raising questions on the frequency of OS updates. The highlight of Yoga A12 is the versatile touch panel that can be a smartphone-like virtual keyboard. It's a feature adapted from the Yoga Book, which was introduced last year. The Yoga A12 has a 12.2-inch touchscreen, and a back-lit input touch panel replaces the hard keyboard. Lenovo said the virtual keyboard provides a user experience similar to on-screen ones on smartphones and tablets.To read this article in full or to leave a comment, please click here

Non-Interactive SSH use case with Python

Sometimes the best way to learn to do something useful with a scripting language is with a starting point and a real world use case. While I don’t consider myself a Python expert, I can usually figure out how to put things together and get a task accomplished. For this article I challenged myself to create a simple script that performs the following:

  • Open a file for a list of devices and credentials
  • Log in to each device in the file using the credentials found
  • Remove the current NTP server (1.1.1.1)
  • Add a new NTP server (2.2.2.2)
  • Save the configuration

I am sharing the script below as an example. Note this Python file uses paramiko. Therefore that library needs to be installed (MAC users – sudo pip install paramiko)

NTPChange.py

import paramiko

####devices.txt format
#### username,password,host
#### username,password,host

qbfile = open("devices.txt", "r")

for aline in qbfile:
    values = aline.split(",")
    myuser = values[0]
    mypass = values[1]
    myhost = values[2].rstrip()
    ssh = paramiko.SSHClient()
    ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
    ssh.connect(myhost, username=myuser, password=mypass)
    channel = ssh.invoke_shell()
    stdin = channel.makefile('wb')
    stdout = channel.makefile('rb')
    stdin.write('''
    conf t
    no ntp server  Continue reading

Fighting CLI cowboys with Napalm – An Introduction

A lot of people who aren’t familiar with Napalm tend to laugh nervously when you suggest they use it in their network. The name Napalm is partly based on getting that perfect acronym and partly a desire to incinerate the old way of doing things and move to network automation. This article is about explaining what Napalm is and what lies behind the acronym.

Continue reading