FBI leaves infamous “DB Cooper” crime mystery to the ages

I suppose it was inevitable after 45 years of intensive but mostly futile investigating the FBI this week said it pulled the plug on the Dan “DB” Cooper hijacking/ransom case. You may recall that in November 1971, between Seattle and Reno, Cooper parachuted out of the back of an airliner he'd hijacked with a bag filled with $200,000 in stolen cash. He's never been found, though some of the stolen money was recovered. +More on Network World: FBI wants fresh set of eyes on DB Cooper mystery: Yours+ According to the FBI, the agency learned of the crime in-flight and opened an extensive investigation that lasted 45. Calling it NORJAK, for Northwest hijacking, the FBI interviewed hundreds of people, tracked leads across the nation, and scoured the aircraft for evidence. By the five-year anniversary of the hijacking, the agency had considered more than 800 suspects and eliminated all but two dozen from consideration. Over years the case has mostly grown cold.To read this article in full or to leave a comment, please click here

The CCIE Routing And Switching Written Exam Needs To Be Fixed

CCIERouting_and_Switching_UseLogoWR

I’m having a great time at Cisco Live this year talking to networking professionals about the state of things. Most are optimistic about where their jobs are going to fit in with networking and software and the new way of doing things. But there is an undercurrent of dissatisfaction with one of the most fundamental pieces of network training in the world. The discontent is palpable. From what I’ve heard around Las Vegas this week, it’s time to fix the CCIE Written Exam.

Whadda Ya Know?!?

The CCIE written is the bellwether of network training. It’s a chance for network engineers that use Cisco gear to prove they have what it takes to complete a difficult regimen of training to connect networks of impressive size. It’s also a rite of passage to show others that you know how to study, prep, and complete a difficult practical examination without losing your cool. But all that hard work starts with a written test.

The CCIE written has always been a tough test. It’s the only barrier to entry to the CCIE lab. Because the CCIE has never had prerequisites and likely never will due to long standing tradition, the only thing standing Continue reading

Microsoft launches new Skype for Linux and Chrome

Linux and Chromebook users now have new versions of Skype to play with.Microsoft launched an alpha version of a new client for Linux on Wednesday, in a push to get users of the open-source operating system to make video calls and send messages with Skype.There was a Linux client available for the service previously, but this launch is a move by the company to get users of the operating system on the latest version of Skype. Users will get a new interface, emoticons, and a file-sharing interface.Chrome users will be able to use web.skype.com to make calls from Google's web browser and desktop operating system starting Wednesday, too. Like the Linux client, the new Chrome client is still in alpha, so there are likely to be bugs, along with missing features.  To read this article in full or to leave a comment, please click here

Docker Datacenter @ DockerCon 2016: Image security, Engine 1.12 and Burning Man…

Interested in learning more about our plans for Docker in the Enterprise and getting involved in an upcoming Docker Datacenter beta? Let’s take a deeper look. On the second day of DockerCon, the keynote used different situations to discuss enterprise use of Docker. Our CEO Ben Golub broke down several fallacies in IT, CTO Keith Fulton of ADP painted a delicious picture of microservices as chicken nuggets, and Lily and I… well, we averted a massive security disaster and got our costumes ready for Burning Man.

Aside from shiny sequined jackets (not my normal wardrobe, I promise) and Ben’s enthusiastic “business guy” cameo, we presented a prototype of the next version of Docker Datacenter, our commercial solution for running containers-as-a-service (CaaS) in an on-premises or public cloud enterprise environment. Docker Datacenter is an integrated CaaS platform to securely ship, orchestrate and manage Dockerized apps and system resources. The sneak peek during the keynote shows a prototype UI and features. Some of the things you saw may change as we get to launch but what’s important are the capabilities we are bringing to the enterprise platform.

In the keynote presentation we demonstrated these enterprise use cases:

Microsoft launches ‘Surface as a Service’ lease program

Microsoft has announced a new enterprise program called "Surface as a Service," which is a nifty way of saying businesses can lease Surface devices that come with subscriptions to Office 365, Dynamics Azure and Windows 10.The company said this will allow customers to keep their hardware more current and up to date, since enterprises are not known for being bleeding edge when it comes to new hardware adoption.+ Also on Network World: Surface Books get major driver updates +Microsoft also expanded its list of Surface partners to include two IT heavyweights: IBM and Booz Allen Hamilton. Both firms sign on as Surface solution integrators. Microsoft already had secured HP and Dell, two companies it effectively competes with by selling Surface, as resellers last fall.To read this article in full or to leave a comment, please click here

Shlomo Kramer: a security investor looking for smart entrepreneurs to disrupt markets

Shlomo Kramer Recently, endpoint-protection startup LightCyber announced a second round of funding - $20 million – including an investment from an individual investor with an impressive track record backing successful security startups: Shlomo Kramer.Kramer, who is Israeli, has a long-term relationship with the company’s CEO Gonen Fink, who worked with him for years at Check Point Software where Kramer was one of the founders.To read this article in full or to leave a comment, please click here

Shlomo Kramer: a security investor looking for smart entrepreneurs to disrupt markets

Shlomo Kramer Recently, endpoint-protection startup LightCyber announced a second round of funding - $20 million – including an investment from an individual investor with an impressive track record backing successful security startups: Shlomo Kramer.Kramer, who is Israeli, has a long-term relationship with the company’s CEO Gonen Fink, who worked with him for years at Check Point Software where Kramer was one of the founders.To read this article in full or to leave a comment, please click here

Cisco flexes its security muscle at Cisco Live

This week in Las Vegas, Cisco is hosting 28,000 of its best customers at Cisco Live, it’s annual, global user event. It’s hot in Vegas in July, which is fitting, as Cisco’s security business has been red hot of late. This is in stark contrast to the company’s position in security just a few years ago when many Cisco watchers questioned if it was serious about security. Over the years, Cisco has mastered the art of using market transitions to capture share, and it appears it is well on its way to doing so in the security market. The market transition that’s changing security is digital transformation. Earlier this year, I wrote a post highlighting the new rules of security in the digital era.To read this article in full or to leave a comment, please click here

Microsoft fixes critical vulnerabilities in IE, Edge, Office, and Windows print services

Microsoft's new batch of security patches fixes 47 vulnerabilities across its products, including in Internet Explorer, Edge, Office, Windows and the .NET Framework.The patches, released Tuesday, are arranged in 11 security bulletins, 10 of which are for Microsoft products. The remaining patch covers Adobe Flash Player, which is bundled with Internet Explorer in Windows 8.1, Windows Server 2012, Windows RT 8.1, Windows Server 2012 R2 and Windows 10.Six security bulletins, including the Flash Player one, are rated critical and primarily cover remote code execution vulnerabilities that could lead to a complete system compromise.To read this article in full or to leave a comment, please click here

Microsoft fixes critical vulnerabilities in IE, Edge, Office, and Windows print services

Microsoft's new batch of security patches fixes 47 vulnerabilities across its products, including in Internet Explorer, Edge, Office, Windows and the .NET Framework.The patches, released Tuesday, are arranged in 11 security bulletins, 10 of which are for Microsoft products. The remaining patch covers Adobe Flash Player, which is bundled with Internet Explorer in Windows 8.1, Windows Server 2012, Windows RT 8.1, Windows Server 2012 R2 and Windows 10.Six security bulletins, including the Flash Player one, are rated critical and primarily cover remote code execution vulnerabilities that could lead to a complete system compromise.To read this article in full or to leave a comment, please click here

Bay Dynamics lands another $23 million to speed expansion

Security-analytics firm Bay Dynamics has pulled down $23 million more in venture funding to help the company speed up its international expansion and execution of its action plan to reach customers and differentiate itself from competitors.The Series B financing is led by Carrick Capital Partners and includes Series A investor Comcast Ventures.The company claims hundreds of customers including some of the Fortune 50.Bay Dynamics’ Risk Fabric ranks the riskiest users, devices, applications and other network entities, according to a report by Gartner on User and Entity Behavior Analytics, the category in which it places Bay Dynamics. The platform can discover insider threats as well as data theft, and can analyze likely attack surfaces in customer networks, Gartner says.To read this article in full or to leave a comment, please click here

Bay Dynamics lands another $23 million to speed expansion

Security-analytics firm Bay Dynamics has pulled down $23 million more in venture funding to help the company speed up its international expansion and execution of its action plan to reach customers and differentiate itself from competitors.The Series B financing is led by Carrick Capital Partners and includes Series A investor Comcast Ventures.The company claims hundreds of customers including some of the Fortune 50.Bay Dynamics’ Risk Fabric ranks the riskiest users, devices, applications and other network entities, according to a report by Gartner on User and Entity Behavior Analytics, the category in which it places Bay Dynamics. The platform can discover insider threats as well as data theft, and can analyze likely attack surfaces in customer networks, Gartner says.To read this article in full or to leave a comment, please click here

Who’s got the best cloud latency?

For some applications, the public cloud is only as good as the slowest connection to it. Latency of cloud providers – the amount of time it takes for a cloud-based service to respond to a user’s request – is one of many critical factors that customers consider when choosing a cloud provider and monitoring their workloads. So which cloud provider has the best latency? +MORE AT NETWORK WORLD: Who’s right behind Amazon in IaaS cloud revenue? Not Microsoft | 4 Tips for buying cloud management software +To read this article in full or to leave a comment, please click here

Core Network Architecture in 3G Mobile Networks

Core Network Architecture in 3G Mobile Networks – Most of the Mobile Broadband Networks worldwide are currently delivering Data Services based on 3G & 4G Technologies. Although 4G/LTE is widely deployed globally but still there are countries and operators running 2G/3G with relatively convenient Data rates to the market demands. In this article, I am […]

The post Core Network Architecture in 3G Mobile Networks appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Review: Promisec goes the extra step to secure PCs

In the past year we've seen an influx of endpoint detection and response (EDR) tools that promise to bring order, through greater visibility, to the wild west of endpoints within a large organization. The scenario is all too common: IT security usually doesn't know all of the hardware and software assets that need to be protected, yet has to protect them. Even as we struggle to put security controls in place for prevention, we know that many of these endpoints are already compromised by active threats that need to be detected, assessed, quarantined, and remediated.To read this article in full or to leave a comment, please click here(Insider Story)

Review: Promisec goes the extra step to secure PCs

In the past year we've seen an influx of endpoint detection and response (EDR) tools that promise to bring order, through greater visibility, to the wild west of endpoints within a large organization. The scenario is all too common: IT security usually doesn't know all of the hardware and software assets that need to be protected, yet has to protect them. Even as we struggle to put security controls in place for prevention, we know that many of these endpoints are already compromised by active threats that need to be detected, assessed, quarantined, and remediated.EDR tools are built for detection and response (hence the category name), and most leave it at that. Promisec adds sophisticated remediation to Promisec Endpoint Manager (PEM), which is precisely why I was interested in getting a close look at the product. Like other EDR products, PEM can scan endpoints on a schedule to detect anomalies or abnormalities and verify that security controls -- such as required applications, patches, settings, and so on -- are in place. Unlike other products in the category, PEM can also launch scripts on the endpoints to take corrective action.To read this article in full or to leave a Continue reading