Feds grab $39M worth of fake sports gear ahead of NFL Super Bowl 50

In its annual Super Bowl-timed crackdown on counterfeit sports gear – everything from fake hats to shirts-- the U.S. Immigration and Customs Enforcement (ICE) agency said it had seized nearly 450,000 phony items worth an estimated $39 million. In 2014 it grabbed 326,147 phony items worth more than $19.5 million – so the problem isn’t getting any smaller. +More on Network World: 26 of the craziest and scariest things the TSA has found on travelers+ The crackdown, known as Operation Team Player, began at the conclusion of last year’s Super Bowl, also resulted in 41 criminal arrests and 35 convictions, ICE stated.To read this article in full or to leave a comment, please click here

DHS EINSTEIN firewall fails to detect 94% of threats, doesn’t monitor web traffic

When you think “Einstein,” something along the lines of smart probably comes to mind. But the Department of Homeland Security's $6 billion EINSTEIN intrusion detection system is closer to dumb than smart, as the firewall fails to scan for 94% of common security vulnerabilities; it doesn’t even monitor web traffic for malicious content! That is supposed to be coming in 2016, with wireless network protection coming in 2018.The newest failings of EINSTEIN, aka the National Cybersecurity Protection System (NCPS), came after an audit and are highlighted in a harsh U.S. Government Accountability Office (GAO) report (pdf) which outlines a plethora of changes that need to be implemented.To read this article in full or to leave a comment, please click here

Star Trek’s USS Enterprise gets serious Smithsonian restoration

Few museums in the world can restore and preserve important historical items like the Smithsonian. So it comes as no surprise the level of detail and effort by the Smithsonian National Air and Space Museum on the conservation of the original TV studio model of Star Trek’s main attraction, the USS Enterprise. +More on Network World: 26 of the craziest and scariest things the TSA has found on travelers+ According to a recent post on its “Air and Space” blog, the museum detailed the meticulous work going into the refurbishing of the 11-ft model: “After a year of extensive research, conservation work on the original studio model of the USS Enterprise is now underway in the Museum’s spacedock. Our goal is to stabilize the model and return it to its appearance from August of 1967, during the filming of the episode The Trouble with Tribbles, which marked the last known modification of the ship during the production of Star Trek.”To read this article in full or to leave a comment, please click here

MPLS Design Case Study

MPLS Design – MPLS Design Case Studies are the useful resources to learn the design details of MPLS. You will be provided a brief information about the business and technical requirements. You can share your answer at the comment section below. Note: This is only one of the case studies in the DesignWorld. DesignWorld provides […]

The post MPLS Design Case Study appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

MPLS Design Case Study

MPLS Design – MPLS Design Case Studies are the useful resources to learn the design details of MPLS. You will be provided a brief information about the business and technical requirements. You can share your answer at the comment section below. Note: This is only one of the case studies in the DesignWorld. DesignWorld provides […]

The post MPLS Design Case Study appeared first on Orhanergun.

The Future State of Security Starts with Virtualization: VMware at the 2016 RSA Conference

It’s no secret that by transforming networking into a software industry, network virtualization has accelerated innovation. But what does virtualization mean for security more broadly? Can virtualization be a key weapon in the arsenal for improving IT security? If so, how?

Tom Corn, & Guido Appenzeller, VMware Inc.

Tom Corn, & Guido Appenzeller, VMware Inc.

Continue reading

Luna-tics rejoice! Alberto Luna goes back-to-back as Installer of the Year

I'm not quite sure if champion cabling installers have groupies, but if they did, 2016 Installer of the Year winner Alberta Luna's would have to be called the Luna-tics. Luna defended his title this week at the annual BICSI Winter conference in Orlando, topping a field of 15 competitors and taking home the $5,000 prize and extra big trophy. During an interview with me last week, Luna said the secret to his success has been relaxing, something he's learned to do through competing in the event four times now.To read this article in full or to leave a comment, please click here

Cybersecurity Industry News, 2/2016

Just five weeks into 2016 and it’s already been a busy year for the cybersecurity industry.  Here are just a few highlights so far:FireEye goes on a shopping spree. Ignoring Wall Street’s trepidation, FireEye continues to remain aggressive on the acquisition front by grabbing iSight Partners and Invotas.  With the addition of these two companies, FireEye can claim leadership in:  Threat intelligence.  FireEye/Mandiant was already strong in this area and with the addition of iSight, FireEye becomes the instant market leader.  FireEye already had a different view of threat intelligence, pivoting from cyber-adversaries (i.e. threat actors, TTPs, etc.) into the enterprise.  With this perspective, FireEye believes it can help customers anticipate attacks and become more proactive with prevention, detection, and response.  By adding iSight, FireEye attains a broader view of the threat landscape that can be integrated into its products and used to create a variety of threat intelligence services for enterprise and mid-market customers.  Oh, and let’s not forget that FireEye picks up a few hundred cybersecurity experts in the deal which is especially important given the acute global cybersecurity skills shortage.  This will certainly boost FireEye’s Continue reading

Serious flaws found in Netgear’s NMS300 network management system

Serious vulnerabilities in the Netgear NMS300 ProSafe network management system, an application used to discover, monitor and configure a wide range of network devices, can allow hackers to take control of the servers it's running on.The NMS300 can be installed on Windows XP, 7, 8, 10, as well as Windows Server 2003, 2008 and 2012. It allows network administrators to centrally manage network switches, routers, wireless access points, printers, network-attached storage systems, firewall appliances and other devices that support SNMP (Simple Network Management Protocol).The software is free for managing up to 200 devices and provides an easy-to-use Web graphical interface that can be accessed remotely.To read this article in full or to leave a comment, please click here

Serious flaws found in Netgear’s NMS300 network management system

Serious vulnerabilities in the Netgear NMS300 ProSafe network management system, an application used to discover, monitor and configure a wide range of network devices, can allow hackers to take control of the servers it's running on.The NMS300 can be installed on Windows XP, 7, 8, 10, as well as Windows Server 2003, 2008 and 2012. It allows network administrators to centrally manage network switches, routers, wireless access points, printers, network-attached storage systems, firewall appliances and other devices that support SNMP (Simple Network Management Protocol).The software is free for managing up to 200 devices and provides an easy-to-use Web graphical interface that can be accessed remotely.To read this article in full or to leave a comment, please click here

Dell is stepping in to protect the boot layer of PCs, tablets

Dell's business laptops and tablets will get an extra layer of protection from hackers with a new security tool being loaded into the company's portable computers.The new Dell security tool focuses on protecting the boot layer so PC hardware or software don't malfunction. It secures the low-level UEFI (Unified Extensible Firmware Interface), which sits in a protected layer above the OS. An attack on this firmware can compromise a system at boot time.Hacking the firmware can cause the OS and hardware components to malfunction. Hackers have shown increasingly sophisticated ways in which the UEFI -- which has replaced the conventional BIOS -- can be infected with malware. To read this article in full or to leave a comment, please click here

What did we learn about cybersecurity in 2015?

A data breach can be the biggest kind of crisis an IT leader will have to face. And when an incident occurs, it’s an emergency situation – typically an all-hands-on-deck moment.After the dust settles, however, it’s time to determine what lessons were learned from the experience. Your organization may have escaped 2015 without a data breach. But that’s no guarantee that hackers, cybercriminals and others won’t turn their attention to your business soon.2015 by the numbers According to the Identity Theft Resource Center (ITRC), organizations around the world suffered over 700 data breaches in 2015. The attacks covered every sector and records were lost in many sectors. For 2015, the ITRC reports the following findings:To read this article in full or to leave a comment, please click here