Security spring cleaning time

Get rid of that stuff collecting dustImage by ThinkstockAs new security threats continue to emerge and security teams find themselves stuck in the cycle of piling on new products and policies each time they receive an alert notification, true functions of security programs get lost in the clutter. As melting snow and longer days promise that spring is right around the corner, take this time to start fresh and “spring clean” your security ecosystems. To help get you started, these infosec professionals provide guidelines for what to check off on a security spring-cleaning list.To read this article in full or to leave a comment, please click here

Understanding OpenStack: Capabilities & Challenges

In this episode of Network Matters with Ethan Banks, learn about the basics of OpenStack and why the open-source cloud platform has become so popular. Ethan explains exactly what OpenStack is, then dispels some of the myths around IT's expectations for OpenStack adoption.

Ethan is the co-host of the Future of Networking Summit at Interop Las Vegas. Learn more about the conference program or register for Interop, May 2-6 in Las Vegas.

Male computer programmers shown to be right up there with chefs, dentists on gender pay gap scale

Glassdoor Economic Research A deep dive into crowdsourced salary data from more than half a million employees shows that the gender pay gap is very real, and that male computer programmers make far more than their female counterparts.The Economic Research arm of online jobs marketplace Glassdoor has issued a report titled Demystifying the Gender Pay Gap that attempts to explain why males are making so much more than females across industries and countries. While the researchers have come up with explanations for much of the pay gap in the United States, about a third of the gap is unexplained and presumed to be due to factors such as intentional or unintentional bias as well differences in pay negotiations.To read this article in full or to leave a comment, please click here

Learn SDN And OpenFlow Fundamentals

If you're looking for a practical, hands-on, real world approach to learning and implementing SDN and OpenFlow, look no further. The video course Practical SDN and OpenFlow Fundamentals from GNS3 Academy offers a unique way to learn about and experiment with SDN with no risk -- using your own laptop along with free or demo software.

GNS3 Academy courses are low-cost, self-paced, work on any device, and access never expires. Plus, courses are updated monthly with new material to keep your skills current.

In this course, instructor and CCIE emeritus David Bombal demonstrates SDN and OpenFlow in detail, covering everything from the basic definition of SDN to capturing messages with Wireshark and even building your own SDN switch with Raspberry Pi.

Register for this course and you can delve into:

  • SDN architecture tiers
  • Controller configurations including OpenDaylight, ONOS, RYU, Floodlight and HP VAN
  • Overlays, underlays and APIs
  • How companies like Google, Facebook, and the NSA use SDN
  • How OpenFlow works
  • Configuring Mininet switches using Open vSwitch
  • Installing and configuring OpenDaylight
  • Traffic engineering

The first 10 Network Computing members to register receive the course FREE, so register now and enter the code NETWORKCOMPUTING.

This bag of tricks may help stop a Locky ransomware infection

A malware researcher has found a few tricks to stop one of the latest types of ransomware, called Locky, from infecting a computer without using any security programs.Ransomware is malware that encrypts a computer's files. Users are shown instructions for how to pay a fee to get the decryption key. The costs can range from a few hundreds dollars to thousands, payable to cybercriminals in bitcoin.Locky is a relative newcomer to the ransomware scene, which computer security researchers first saw over the last few months. It is primarily distributed through spam messages that try to trick people into opening attachments, such as fake invoices.To read this article in full or to leave a comment, please click here

The Syrian Electronic Army was careless with Gmail, Facebook

If you're a hacker, it's a good idea to stay away from Facebook and Gmail to communicate with your colleagues.Three men, who allegedly were part of a multi-year hacking campaign executed by the Syrian Electronic Army (SEA), left a long digital trail that didn't make them hard to identify, according to court documents.The U.S. Department of Justice unsealed charges on Tuesday against the men, who are accused of hacking companies and defacing websites.The SEA, which emerged around July 2011, claimed credit for prominent hacks that sought to support Syrian President Bashar al-Assad. The group targeted the White House, Harvard University, Reuters, the Associated Press, NASA and Microsoft, among others.To read this article in full or to leave a comment, please click here

Include the why

whyI recently stumbled upon an interesting speech from 1984 by Charlie Munger of Bershire Hathaway fame. Charlie is Warren Buffet’s right-hand-man, and a straight talking genius in his own right. It’s a fairly long speech and Charlie has a few very interesting things to say, but one particular section on ‘explaining the why’ really struck home.
Here’s a brief quote:

….if you always tell people why, they’ll understand it better, they’ll consider it more important, and they’ll be more likely to comply. Even if they don’t understand your reason, they’ll be more likely to comply.
So there’s an iron rule that just as you want to start getting worldly wisdom by asking why, why, why, in communicating with other people about everything, you want to include why, why, why. Even if it’s obvious, it’s wise to stick in the why.

The ‘why’ is notably absent from most conversations in our high-tech sphere. I’ve wasted countless hours interpreting solutions to ill-defined or undefined problems. I’m guilty of writing many ‘why-less’ documents and emails also. Upon reflection, I can recognise the folly of not explaining the problem at hand before launching into the solution.
When I drop the reasoning and background and Continue reading

Startup Sigfox wins over a carrier as new radios battle for the future of IoT

Altice, a network operator active in the U.S. and across Europe, is betting on French company Sigfox to expand its machine-to-machine business even as it tests LTE-M, a narrowband version of the 4G standard slimmed down for the Internet of Things. One technology it won't touch, though, is LoRa, the fledgling standard backed by a number of mobile operators, including Orange and Bouygues Telecom, the main rivals of Altice's French subsidiary, SFR. Machine-to-machine communications already constitute a significant market for Altice, which connects 5 million machines or objects via its cellular networks and has 2,600 enterprise clients in this field, company executives said Tuesday.To read this article in full or to leave a comment, please click here

Starting a Blog on Open Software/Hardware + Networking

Today I’m jumping into water to start writing about some area where I have some half-decent background: the intersection of Open Software/Hardware and Networking.

Why?

You see, I’m a software guy. The pragmatical Linux/OpenSource fanboy kind. What that means? I have a formal degree on Computer Science, and wrote Linux drivers and software for embedded systems for 8 years. But I’m also a pragmatical guy: I know how to write kernel drivers, but I use a Mac laptop every day because I like things to work. For the last 4 years I have been learning a big from networking at Hewlett Packard Enterprise, where I have worked on networking (SDN, ASICs), and more recently on the OpenSwitch project.

Continue reading

What People Get Wrong About Microsoft SONiC

Howdy. In my previous post, I mentioned doing a deep dive of SONiC, the recent software release from Microsoft. So without further delay, Software for Open Networking in the Cloud, or SONiC. What It Ain’t I’m sure y’all might have read this FAQ, but just in case, I’ll hit the main points: SONiC is not […]

The post What People Get Wrong About Microsoft SONiC appeared first on Packet Pushers.

What People Get Wrong About Microsoft SONiC

Howdy. In my previous post, I mentioned doing a deep dive of SONiC, the recent software release from Microsoft. So without further delay, Software for Open Networking in the Cloud, or SONiC. What It Ain’t I’m sure y’all might have read this FAQ, but just in case, I’ll hit the main points: SONiC is not […]

The post What People Get Wrong About Microsoft SONiC appeared first on Packet Pushers.

FBI grows “Cyber Most Wanted” list with Syrian Electronic Army members

The FBI today added two members of a Syrian hacker group to its Cyber Most Wanted list offering a reward of up to $100,000 each for information that leads to their arrest.+More on Network World: The FBI this week warned carmakers and owners that they need to pay much closer attention to automotive cybersecurity+According to the FBI, the new cybercriminals Amad Umar Agha22, known online as “The Pro,” and Firas Dardar,27, known online as “The Shadow,” engaged in a multi-year conspiracy that began in 2011 to collect usernames and passwords that gave them the ability to deface websites, redirect domains to sites controlled by the conspirators, steal e-mail, and hijack social media accounts. To obtain the login information they spear-phishing, where they tricked people who had privileged access to their organizations’ websites and social media channels into volunteering sensitive information by posing as a legitimate entity.To read this article in full or to leave a comment, please click here