Dell partners with NEC to deliver mature and robust SDN solutions to Dell customers.
It used to be that a data breach was a singular event that caused massive shock and concern. Today, data breaches happen regularly and, while still shocking in scope, are starting to dull the senses. Credit card numbers, security clearances, and even illicit dating profiles have been harvested, coallated, and provided for everyone to expose. It seems to be an insurmountable problem. But why?
Data is a tantalizing thing. Collecting it makes life easier for customers and providers as well. Having your ordering history allows Amazon to suggest products you might like to buy. Having your address on file allows the pizza place to pull it up without you needing to read your address again. Creating a user account on a site lets you set preferences. All of this leads to a custom experience and lets us feel special and unique.
But, data is just like that slice of cheesecake you think you want for dessert. It looks so delicious and tempting. But you know it’s bad for you. It has calories and sugar and very little nutritional value. In the same manner, all that data you collect is a time bomb waiting to be exposed. The more Continue reading
The post Worth Listening: Data Center Migration appeared first on 'net work.
The post Worth Reading: Inside the Social Network Data Center appeared first on 'net work.
Gigamon tries its hand at the security market.
The first thing, when one is being worried as to whether one will have to have an operation or whether one is a literary failure, is to assume absolutely mercilessly that the worst is true, and to ask What Then? If it turns out in the end that the worst is not true, so much the better; but for the meantime the question must be resolutely put out of mind. Otherwise your thoughts merely go round and round a wearisome circle , now hopeful, now despondent, now hopeful again—that way madness lies.
" C.S. Lewis —My Business Case for SD-WAN blog post received numerous comments pointing out the potential pitfalls of hybrid WAN, including reduced security, unreliable Internet services and denial-of-service attacks.
While all those comments are perfectly valid, I still think hybrid WAN (whether implemented with traditional technologies or SD-WAN products) makes perfect sense.
Read more ...UrlZone is a banking trojan that appeared in 2009. Searching its name or one of its aliases (Bebloh or Shiotob) reveals a good deal of press from that time period along with a few technical analyses in 2009 [1] [2], 2012 [3], and 2013 [4]. Despite having a reputation of evolution, there doesn’t seem to be very many recent updates on this malware family though. Is UrlZone still a threat and if so, how has it changed?
To explore that, this post takes a look at a recent UrlZone malware sample to see if it is still an active threat. It then gives an update on the command and control (C2) communications as they have changed since being previously documented. These are then put together in some proof of concept code that downloads and decrypts the webinject configuration file (the bread and butter of any banker malware) to see what financial institutions are being targeted.
Sample
The sample analyzed for this post has an MD5 of:
01fd0f1ad59ad5403c9507bfb625fe0c
For the “stop using md5 now” converts, it has the following SHA256:
39bbde33922cd6366d7c2a252c4aadd4dfd7405d5271e3652940a7494b885e88
The sample’s compilation date is 2015-06-12 12:01:03. This date seems legit as Continue reading
HP IMC 7.1 E0303P13 does not support configuration backups for Brocade MLX & VDX devices. But they do have an extensible model, so it’s easy to add support. Here’s how to do it, and how to fix the Brocade ICX support.
Here’s the steps to add support for MLX & VDX devices to HP IMC:
Going into a bit more detail:
This GitHub repository maintains a set of 3rd-party developed adapters for HP IMC. You can download individual files, create a local copy of the repo using Git, or just download a zip file containing all current scripts from here.
On the IMC server, adapters are stored at (IMC)/server/conf/adapters/ICC. You’ll see directories for all supported vendors there:
[root@imc ~]# cd /opt/iMC/server/conf/adapters/ICC [root@imc ICC]# ls 3Com Alcatel-Lucent Aruba Networks Avocent Cabletron Dell Enterasys F5 Fortigate H3C Hillstone IBM Continue reading