Hack the hackers: Eavesdrop for intel on emerging threats

In a sea of vulnerabilities clamoring for attention, it’s almost impossible to know which IT security issues to address first. Vendor advisories provide a tried-and-true means for keeping on top of known attack vectors. But there’s a more expedient option: Eavesdrop on attackers themselves. Given their increasingly large attack surfaces, most organizations tie their vulnerability management cycle to vendor announcements. But initial disclosure of security vulnerabilities doesn’t always come from vendors, and waiting for official announcements can put you days, or even weeks, behind attackers, who discuss and share tutorials within hours of a vulnerability becoming known.To read this article in full or to leave a comment, please click here(Insider Story)

Hack the hackers: Eavesdrop for intel on emerging threats

In a sea of vulnerabilities clamoring for attention, it’s almost impossible to know which IT security issues to address first. Vendor advisories provide a tried-and-true means for keeping on top of known attack vectors. But there’s a more expedient option: Eavesdrop on attackers themselves.To read this article in full or to leave a comment, please click here(Insider Story)

How to prevent data from leaving with a departing employee

I’ll take thisImage by ThinkstockIt may come as a surprise, but more likely than not, when employees leave a company they’re taking company data with them. While it’s not always out of malicious intent, the amount of unprotected company information that walks out the door can result in bigger losses in the future.To read this article in full or to leave a comment, please click here

Is open source a clear path to success for new grads?

It's the catch-22 every new college graduate faces when looking for his or her first job: You need experience or a portfolio of completed work to prove your competency to a potential employer, but it's hard to get that tangible proof of your skills without having had a job first.That's one of the major benefits of the open source world, says Heidi Ellis, professor and chair of Computer Science and Information Technology at Western New England University in Springfield, Mass.Ten years ago, as a visiting professor at Trinity College in Hartford, Conn., Ellis challenged her computer science students to use technology to solve some of the logistical and administrative problems than can hamper the effectiveness of humanitarian causes.To read this article in full or to leave a comment, please click here

The Case of the Failed IPv6 Ping – Part 2: The Solution

Put your detective hat on your head and your Network Detective badge on your lapel.   It is time to SOLVE for the Case of the Failed IPv6 Ping.

Review the Facts and Clues Again

Let’s review where we left off in our Part 1 of this case — “Case of the Failed IPv6 Ping – Part1: Facts and Clues“.  At the end of Part 1…..we were ON R1 and unable to ping the IPv6 address of our directly connected interface gig0/0/3, 2001:db8:14:1::1.

R1_only

As you recall the facts were as below. Interface up/up, OSPFv3 configured properly, proper IPv6 address configured on interface gig0/0/3.  Still, we cannot ping R1’s directly connected IPv6 address from anywhere including from R1 itself.

2nd_checkList_59523931

Totally confused.  Time to just stare at the list above, absorb the oddness, and think.

Wait one second!!!! “No valid route for destination” ???   Even the ping from R1 said that?

pingR1_2

That can’t be true“, I think to myself while I type show ipv6 route connected.

showipv6routeconnected

What the????….. Why don’t I have R1’s gig0/0/3 interface in the routing table? It is up/up and with the proper IPv6 address configured.  Now Continue reading

CCIE Security v5 Blueprint Update Announced

Finally, Cisco has made the official announcement on the upcoming changes for CCIE Security Version 5. Both the written exam and the lab exam will be changes go live starting 31st of January 2017, which gives you the usual 6 months window to pass the Version 4 exam, before the change to Version 5 occurs.  As opposed to the old blueprint, there are major changes in both the technical content and exam delivery format.

As expected, the new exam topics are inline with Cisco’s current Security product line with pretty much nothing missing. Yes, you got that right! Also, as expected, Cisco is trying to push the same exam delivery model for all CCIE tracks.

Blueprint Technical Topic Changes

We now have a Unified Exam Blueprint,  covering topics for both the written and lab exam, similar to the change that was introduced with CCIE Data Center Version 2. The Blueprint for Version 5 is divided into 6 sections, with the last one being relevant only for the written exam:

  • Perimeter Security and Intrusion Prevention
  • Advanced Threat Protection and Content Security
  • Secure Connectivity and Segmentation
  • Identity Management, Information Exchange and Access Control
  • Infrastructure Security, Virtualization and Automation
  • Evolving Technologies*

*Written Continue reading

Smart City Challenge: 7 proposals for the future of transportation

Self-driving vehicles, traffic lights that adjust based on vehicle flow, bike sharing and smart pavement that provides public Wi-Fi access—those are just a few of the ideas for making cities smarter. Not only have municipalities embraced the smart city concept—using technology to manage a city’s assets, improve the efficiency of services, reduce consumption of resources, reduce costs and improve the quality of life—but many are making it a reality. The U.S. Department of Transportation has joined in to help cities implement smart city ideas, and it is offering a $40 million grant to the winner of its Smart Cities Challenge. The prize will go to the city that has the best plan for integrating innovative technologies such as self-driving cars, connected vehicles and smart sensors into their transportation network.To read this article in full or to leave a comment, please click here

Samsung to acquire US cloud services firm Joyent

Samsung Electronics is acquiring U.S. cloud services company Joyent as it builds its services business around mobile devices and the Internet of Things.The financial details of the transaction were not disclosed. Joyent will operate as a standalone subsidiary under the new dispensation and continue providing cloud infrastructure and software services to its customers.Samsung said Thursday the acquisition would give the smartphone maker access to its own cloud platform to support it in the areas of mobile, IoT and cloud-based software and services.The South Korean company said it had evaluated a number of providers of public and private cloud infrastructure but zeroed in on Joyent in San Francisco as it saw “an experienced management team with deep domain expertise and a robust cloud technology validated by some of the largest Fortune 500 customers.”To read this article in full or to leave a comment, please click here

Microsoft’s Project Bletchley will let companies add middleware to blockchains

Microsoft is extending blockchain technology with a new set of tools designed to make it possible to build a new ecosystem of enterprise applications on top of it.On Wednesday, the company unveiled Project Bletchley, its term for a pair of tools to expand the potential uses of blockchains. It plans to get more utility out of the distributed ledger technology by using the new secure middleware.The first tool, known as "Cryptlets," is a set of services that let companies bring in data from outside a blockchain system without breaking the security of that system. Cryptlets can be written in any programming language and run within a secure, trusted container.To read this article in full or to leave a comment, please click here

Random Notes From My Third CPOC

I know it's cliche and I know I'm biased because I have an @cisco.com email address, but I've truthfully never seen anything like CPOC before. And the customer's I've worked with at CPOC haven't either. It's extremely gratifying to take something you built “on paper” and prove that it works; to take it to the next level and work those final kinks out that the paper design just didn't account for.

If you want more information about CPOC, get in touch with me or leave a comment below. Or ask your Cisco SE (and if they don't know, have them get in touch with me).

Anyways, on to the point of this post. When I was building the topology for the customer, I kept notes about random things I ran into that I wanted to remember later or those “oh duh!” moments that I probably should've known the answer to but had forgotten or overlooked at the time. This post is just a tidy-up of those notes, in no particular order.

Configuring Linux Policy Routing using Ansible

In this post, I’m going to talk about using Ansible to configure policy routing on Linux. If you’re not familiar with Linux policy routing, have a look at this post, and also review this post for one potential use case (I’m sure there are a number of other quite valuable use cases).

As you may recall from the policy routing introductory post, there are three steps involved in configuring policy routing:

  1. You must define the new routing table in /etc/iproute2/rt_tables
  2. You must add routes to the new routing tables
  3. You must define rules for when the new routing table is consulted

All three of these tasks can be handled via Ansible.

To address step #1, you can use Ansible’s “lineinfile” module to add a reference to the new routing table in /etc/iproute2/rt_tables. For example, consider this Ansible task:

- lineinfile: dest=/etc/iproute2/rt_tables line="200 eth1"

This snippet of Ansible code would add the line “200 eth1” to the end of the etc/iproute2/rt_tables file (if the line does not already exist). This takes care of task #1.

For tasks #2 and #3, you can use a Jinja2 template. Because the creation of the policy routing rule and the routing table entries can Continue reading

Hacker claims credit for DNC breach, posts files online

A hacker claiming responsibility for the recent data breach of the Democractic National Committee apparently has posted the stolen files online.The hacker, who goes by the name Guccifer 2.0, leaked the files on Wednesday following a breach of DNC computers that has been blamed on Russian hackers.  The posted files include a 231-page dossier containing opposition research on presumptive Republican presidential nominee Donald Trump. They also include documents concerning expected Democratic nominee Hillary Clinton’s election strategy, items on U.S. foreign policy, and donor lists.To read this article in full or to leave a comment, please click here

Hacker claims credit for DNC breach, posts files online

A hacker claiming responsibility for the recent data breach of the Democractic National Committee apparently has posted the stolen files online.The hacker, who goes by the name Guccifer 2.0, leaked the files on Wednesday following a breach of DNC computers that has been blamed on Russian hackers.  The posted files include a 231-page dossier containing opposition research on presumptive Republican presidential nominee Donald Trump. They also include documents concerning expected Democratic nominee Hillary Clinton’s election strategy, items on U.S. foreign policy, and donor lists.To read this article in full or to leave a comment, please click here

Companies pay out billions to fake-CEO email scams

Email scammers, often pretending to be CEOs, have duped businesses into giving away at least $3.1 billion, according to new data from the FBI.The email schemes, which trick companies into wiring funds to the hacker, continue to bedevil companies across the world, the FBI warned in a posting on Tuesday.The amount of money they've tried to steal has grown by 1,300 percent since January 2015, it said.In the U.S. alone, victims have lost $960 million to the schemes over approximately the past three years, FBI figures show. That figure reaches $3.1 billion when global data from international law enforcement and financial groups is included. The number of victims: 22,143.To read this article in full or to leave a comment, please click here

Companies pay out billions to fake-CEO email scams

Email scammers, often pretending to be CEOs, have duped businesses into giving away at least $3.1 billion, according to new data from the FBI.The email schemes, which trick companies into wiring funds to the hacker, continue to bedevil companies across the world, the FBI warned in a posting on Tuesday.The amount of money they've tried to steal has grown by 1,300 percent since January 2015, it said.In the U.S. alone, victims have lost $960 million to the schemes over approximately the past three years, FBI figures show. That figure reaches $3.1 billion when global data from international law enforcement and financial groups is included. The number of victims: 22,143.To read this article in full or to leave a comment, please click here