Microsoft unveils Windows 10 feature to stymie advanced hack attacks

Microsoft wants to help protect companies from hack attacks, and it's introducing a new Windows 10 feature soon to improve the operating system's security capabilities.Windows Defender Advanced Threat Protection is aimed at helping businesses deal with serious threats by using machine learning to protect Windows 10 devices. The feature builds a profile of how a computer behaves, and then alerts IT managers if it starts acting in a way that's indicative of a security breach. If the system detects an attack, it will provide administrators with recommended steps to remediate it.That's supposed to help IT managers sleep a bit better at night when facing threats powered by undisclosed "zero-day" vulnerabilities, along with social engineering attacks that take advantage of users making mistakes.To read this article in full or to leave a comment, please click here

Hot security products at RSA 2016

bugBlast Next-gen AppSec PlatformKey features – bugBlast correlates results from vulnerability testing tools with real-time threat intel for a single view of an application’s security; can massively scale to test mega-apps for software, Web and mobile. More info.To read this article in full or to leave a comment, please click here

Does your Wave2 AP need NBase-T?

Cisco recently launched the 2800 and 3800 series 802.11ac wave-2 access points. The 3800 Datasheet quotes a theoretical maximum throughput of 5.2Gbps when operating in Dual 5GHz radio mode (2 x 2.6Gbps). If you ran two cables to your AP you could use the second ethernet port to create a 2 x 1Gbps LAG. However there is still some debate about whether 2Gbps of throughput is sufficient for a single-radio Wave2 AP.
Some companies may not be willing to invest the time and expense to swap out their copper for fiber or run yet more copper to their APs. The NBase-T standard 802.3bz provides an alternative approach, promising speeds of 2.5Gbps or 5Gbps over Cat5e cabling over 100 Meter runs.

Peter Jones from Cisco is the chair of the NBase-T alliance and presented to us in Tech field day on the new 802.3bz standard and the technology behind it. Cisco terminology for NBase-T-like functionality is ‘MultiGigabit Ethernet’. Currently the Cisco Catalyst 2k, 3K, and 4K switching line have specific models or line cards which support a number of combined UPoE/MultiGig ports. The reason for new hardware is that new digital signal processors (DSPs) are required to achieve the 2.5Gbps Continue reading

Simplifying Deployment of Packet Broker

In my last blog, I have discussed how a software defined visibility network could open up exciting applications for mobile operators. In this post, I would like to touch upon some typical operational challenges faced by implementation engineers and network operations staff when deploying and supporting network packet brokers. Operators often have a high-level understanding... Read more →

Kubernetes with SaltStack revisited

I thought it would be a good idea to revisit my last Kubernetes build in which I was using Salt to automate the deployment.  The setup worked well at the time, but much has changed with Kubernetes since I initially wrote those state files.  That being said, I wanted to update them to make sure they worked with Kubernetes 1.0 and above.  You can find my Salt config for this build over at Github…

https://github.com/jonlangemak/saltstackv2

A couple of quick notes before we walk through how to use the repo…

-While I used the last version of this repo as a starting point, I’ve stripped this down to basics (AKA – Some of the auxiliary pods aren’t here (yet)).  I’ll be adding to this constantly and I do intend to add a lot more functionality to the defined state files.
-All of the Kubernetes related communication is unsecured.  That is – it’s all over HTTP.  I already started work on adding an option to do SSL if you so choose. 

That being said, let’s jump right into how to use this.  My lab looks like this…

image 
Here we have 3 Continue reading

Surveillence outfit Hacking Team may have released a new piece of OS X malware

Security researchers have identified a new piece of OS X malware that may come from Hacking Team, the controversial Italian company that sells surveillance software to governments.The malware is a "dropper," which is used to plant other software onto a computer. In this case, it appears intended to install Hacking Team's Remote Control System (RCS)."The dropper is using more or less the same techniques as older Hacking Team RCS samples, and its code is more or less the same," wrote Pedro Vilaca, an OS X security expert with SentinelOne, on his blog.To read this article in full or to leave a comment, please click here

Understand MTU and MRU – The Full Story

MTU or Maximum transmission unit is a topic that pops up every once in a while in different discussions. Although it’s a simple concept, it causes a lot of confusion specially for those who are new to the field. MTU typically becomes an issue of concern during network changes, like adding new vendors equipment or […]

Gmail for Work gets improved digital loss protection features

Google has expanded the digital loss protection features in Gmail for Work, to help ensure that employees don't share confidential information outside the company they work for. The service can now use optical character recognition on attachments, so administrators can ensure that employees aren't sharing mounds of confidential data in images (whether intentionally or not). That adds to existing features such as the ability to look inside common attachment types, including documents and spreadsheets. The OCR capabilities integrate with content detectors, so administrators can do things like prevent members of the accounting department from sending an email with a credit card number in it to someone outside the organization. It's a key feature for businesses worried about confidential information leaving the company, even if employees don't mean to do anything wrong.To read this article in full or to leave a comment, please click here

Midokura’s MEM 5.0 Adds Insight To Their Virtual Networks

Network automation is a nascent discipline with the annoying problem of having to deal with legacy network devices designed in a bygone era while at the same time keeping up with the requirements of modern compute infrastructure. I see Midokura's MEM as one reasonable answer to the divide found between networking and automation.

The post Midokura’s MEM 5.0 Adds Insight To Their Virtual Networks appeared first on Packet Pushers.

Midokura’s MEM 5.0 Adds Insight To Their Virtual Networks

Network automation is a nascent discipline with the annoying problem of having to deal with legacy network devices designed in a bygone era while at the same time keeping up with the requirements of modern compute infrastructure. I see Midokura's MEM as one reasonable answer to the divide found between networking and automation.

The post Midokura’s MEM 5.0 Adds Insight To Their Virtual Networks appeared first on Packet Pushers.

How to securely bridge on-premise and cloud-based storage services

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Cloud storage revenue is forecast to grow more than 28% annually to reach $65 billion in 2020.  The driving force is the substantial economies of scale that enable cloud-based solutions to deliver more cost-effective primary and backup storage than on-premises systems can ever hope to achieve.

Most IT departments quickly discover, however, that there are significant challenges involved in migrating and synchronizing many thousands or even millions of files from on-premise storage systems to what Gartner characterizes as Enterprise File Synchronization and Sharing (EFSS) services in the cloud. According to Gartner, “by 2019 75% of enterprises will have deployed multiple EFSS capabilities, and over 50% … will struggle with problems of data migration, up from 10% today.”

To read this article in full or to leave a comment, please click here

Musing: Why Oracle Bought Ravello ? Its the Network, Stupid

Takeaway: Ravello lets Oracle uses any underlying cloud but effectively hide that completely from the customer thus Oracle gets to “manage” any cloud, gives customers “any cloud” and yet maintain full control of the customer account by hiding the underlying services. But it was the networking features that really made Ravello unique. Oracle Scorned Its […]

The post Musing: Why Oracle Bought Ravello ? Its the Network, Stupid appeared first on EtherealMind.