Please Sponsor Me: Abseil the Spinnaker Tower

Original content from Roger's CCIE Blog Tracking the journey towards getting the ultimate Cisco Certification. The Routing & Switching Lab Exam
If you are a regular visitor to this site or a new one and have learnt anything from it and would like to give something back now is your chance. Please donate whatever you can to support me via the link below. https://www.justgiving.com/Roger-Perkin I will be doing a sponsored Abseil of the Spinnaker Tower in... [Read More]

Post taken from CCIE Blog

Original post Please Sponsor Me: Abseil the Spinnaker Tower

Interview of Everything: Cisco CEO Chambers on white boxes, SDN, leadership and the cloud

Little did we know that our interview with John Chambers at Cisco’s Texas Data Center Day in April might be our last with him as the company’s CEO. As we learned this week, he’ll hand the reins to Chuck Robbins in July, though will remain the company’s chairman and become its executive chairman as well. He’ll also hand Robbins the challenge of making Cisco the No.1 IT company by forging ahead with its data center, cloud and Internet of Everything initiatives. Chambers discussed those topics and more with IDG Enterprise VP and Chief Content Officer John Gallant.To read this article in full or to leave a comment, please click here

Interview of Everything: Cisco CEO Chambers on white boxes, SDN, leadership and the cloud

Little did we know that our interview with John Chambers at Cisco’s Texas Data Center Day in April might be our last with him as the company’s CEO. As we learned this week, he’ll hand the reins to Chuck Robbins in July, though will remain the company’s chairman and become its executive chairman as well. He’ll also hand Robbins the challenge of making Cisco the No.1 IT company by forging ahead with its data center, cloud and Internet of Everything initiatives. Chambers discussed those topics and more with IDG Enterprise VP and Chief Content Officer John Gallant.To read this article in full or to leave a comment, please click here

Interview of Everything: Cisco CEO Chambers on white boxes, SDN, leadership and the cloud

Little did we know that our interview with John Chambers at Cisco’s Texas Data Center Day in April might be our last with him as the company’s CEO. As we learned this week, he’ll hand the reins to Chuck Robbins in July, though will remain the company’s chairman and become its executive chairman as well. He’ll also hand Robbins the challenge of making Cisco the No.1 IT company by forging ahead with its data center, cloud and Internet of Everything initiatives. Chambers discussed those topics and more with IDG Enterprise VP and Chief Content Officer John Gallant.To read this article in full or to leave a comment, please click here

Cybercriminals borrow from APT playbook in attack against PoS vendors

Cybercriminals are increasingly copying cyberespionage groups in using targeted attacks against their victims instead of large-scale, indiscriminate infection campaigns.This change in tactics has been observed among those who launch attacks, as well as those who create and sell attack tools on the underground market.A recent example of such behavior was seen in a cybercriminal attack against vendors of point-of-sale systems that researchers from RSA documented last week.The attackers sent emails to specific vendors impersonating small businesses such as restaurants. This technique, known as spear-phishing, is typically associated with advanced persistent threats (APTs)—highly targeted, customized attacks whose goal is usually long-term cyberespionage.To read this article in full or to leave a comment, please click here

Using VMware NSX, Log Insight, and vRealize Orchestator to Improve Security

This post was written by Hadar Freehling, Security & Compliance Systems Engineer Specialist at VMware. The post originally appeared here on the dfudsecurity blog

***

There is a lot of power in having security controls in software.  This is what I tell my customer, not just because I work for VMware. Why is that? The reason I find it so powerful is that I can now automate a lot of the security actions that use to be very manual. No more opening tickets to get a SPAN setup on the switch. No more waiting for a firewall change window to lock down a port. Not only that, I have visibility into the VM, like what apps are running and who started them, and what’s on the wire. I can protect different assets with different policies, and these polices can be dynamic.

With the help of my good friend John Dias (vRealize Orchestrator master), we created the follow video to show some of the potential of having everything in software.

Here is the scenario of the workflow.  You are a security person and want to stop all server admins and users from launching a putty session once they have RDPed into a server Continue reading

The Upload: Your tech news briefing for Tuesday, May 5

Chambers steps down as Cisco CEO, Robbins gets the jobIt’s finally time for the changing of the guard at Cisco, after many months of rumors that John Chambers, CEO for 20 years, was planning his retirement. His surprise replacement is senior VP of worldwide operations Chuck Robbins, who wasn’t highlighted in a succession plan a few years ago. Chambers will move into the role of executive chairman on July 26 when Robbins takes over.EU’s new digital strategy could target US tech vendorsTo read this article in full or to leave a comment, please click here

The Upload: Your tech news briefing for Tuesday, May 5

Chambers steps down as Cisco CEO, Robbins gets the jobIt’s finally time for the changing of the guard at Cisco, after many months of rumors that John Chambers, CEO for 20 years, was planning his retirement. His surprise replacement is senior VP of worldwide operations Chuck Robbins, who wasn’t highlighted in a succession plan a few years ago. Chambers will move into the role of executive chairman on July 26 when Robbins takes over.EU’s new digital strategy could target US tech vendorsTo read this article in full or to leave a comment, please click here

The Upload: Your tech news briefing for Tuesday, May 5

Chambers steps down as Cisco CEO, Robbins gets the jobIt’s finally time for the changing of the guard at Cisco, after many months of rumors that John Chambers, CEO for 20 years, was planning his retirement. His surprise replacement is senior VP of worldwide operations Chuck Robbins, who wasn’t highlighted in a succession plan a few years ago. Chambers will move into the role of executive chairman on July 26 when Robbins takes over.EU’s new digital strategy could target US tech vendorsTo read this article in full or to leave a comment, please click here

Dinesh Dutt from Cumulus Networks on Data Center Fabrics Webinar

Occasionally I’d invite a vendor speaker (usually working for an interesting startup) to present in my Data Center Fabrics webinar series. Dan Backman from Plexxi was talking about affinity networking in 2013, and in the May 2015 update session we’ll have Dinesh Dutt from Cumulus Networks talking about their software platform, architectures you can build with whitebox (or britebox) switches running Cumulus Linux, exciting network automation options, and cool new features they’re constantly adding to their software.

How Apple has made me feel really happy and really guilty at the same time

I’m feeling guilty; let me tell you why ... I hate having to stop using a piece of equipment because of designed-in obsolescence but, sometimes, there’s no choice. Consider products such as many of the available Bluetooth headsets; once the internal, non-replaceable battery fails they can only be thrown away. But those are as nothing to the top end Apple products which are designed for a life span of three years.I ran into the planned obsolescence issue recently with a 27-inch Apple iMac I purchased just over four years ago. It was a mid-2010 model  and I loved it until OS X Yosemite appeared. I’d given the new OS a few weeks before upgrading to see if anything  was going to be a problem for me but I didn't find anything major so I went ahead.To read this article in full or to leave a comment, please click here

Netflix open-sources security incident management tool

Netflix has released under an open-source license an internal tool it developed to manage a deluge of security alerts and incidents.Called FIDO (Fully Integrated Defense Operation), the tool is designed to research, score and categorize threats in order to speed up handling of the most urgent ones.Netflix started developing FIDO four years ago after finding it took from a few days to more than a week to resolve issues that were entered into its help-desk ticketing system, the company wrote in a blog post Monday.It was a largely manual and labor intensive process. “As attacks increase in number and diversity, there is an increasing array of detection systems deployed and generating even more alerts for security teams to investigate,” it said.To read this article in full or to leave a comment, please click here

Netflix open-sources security incident management tool

Netflix has released under an open-source license an internal tool it developed to manage a deluge of security alerts and incidents.Called FIDO (Fully Integrated Defense Operation), the tool is designed to research, score and categorize threats in order to speed up handling of the most urgent ones.MORE: New Cisco CEO: Meet the Real Chuck RobbinsNetflix started developing FIDO four years ago after finding it took from a few days to more than a week to resolve issues that were entered into its help-desk ticketing system, the company wrote in a blog post Monday.To read this article in full or to leave a comment, please click here

Sally Beauty investigates possible second card breach

Sally Beauty Holdings said it is investigating another possible payment card breach, about a year after it reported a similar cyberattack.The retail chain, which runs nearly 2,800 stores in the U.S., said it has received reports of ”unusual activity” involving payment cards used at some of its stores during the last week of April. Law enforcement has been contacted, the company said Monday.It did not say if the second incident is related to last year’s attack. “Until this investigation is completed, it is difficult to determine with certainty the scope or nature of any potential incident,” it said.To read this article in full or to leave a comment, please click here

Rombertik malware destroys computers if detected

A new type of malware resorts to crippling a computer if it is detected during security checks, a particularly catastrophic blow to its victims.The malware, nicknamed Rombertik by Cisco Systems, is designed to intercept any plain text entered into a browser window. It is being spread through spam and phishing messages, according to Cisco’s Talos Group blog on Monday.Rombertik goes through several checks once it is up and running on a Windows computer to see if it has been detected.That behavior is not unusual for some types of malware, but Rombertik “is unique in that it actively attempts to destroy the computer if it detects certain attributes associated with malware analysis,” wrote Ben Baker and Alex Chiu of the Talos Group.To read this article in full or to leave a comment, please click here

VCE’s VxRack systems want to be Vblocks for the next generation

EMC’s VCE division wants to take the engineered systems approach it’s honed with its Vblocks into next-generation mobile and cloud applications.On Monday, it introduced the VCE VxRack System, a hyperconverged platform designed to scale out to thousands of racks of computing and storage capacity. Where Vblocks are designed to run traditional business applications like ERP (enterprise resource planning), VxRack is built for a new era.The Vblock coverged architecture has been a success among customers looking to run traditional mission-critical enterprise applications. It was the founding product of VCE, which was formed in 2009 as a joint venture among VMware, Cisco Systems and EMC, and it remains VCE’s flagship, the company;s CEO Praveen Akkiraju said on Monday at EMC World, where the VxRack System was announced.To read this article in full or to leave a comment, please click here

Microsoft picks security for the enterprise win

Microsoft is betting that good security support will be key to keeping its enterprise customers from straying to rivals.At the kickoff of the company’s Ignite conference for IT professionals, Microsoft executives unveiled a number of advanced security services, and took jabs at competitor Google for not being as mindful of security.“Google takes no responsibility to update their customers’ devices, leaving end-users and businesses increasingly exposed every day they use their Android devices,” said Terry Myerson, Microsoft’s executive vice president of operating systems. “Google just ships a big pile of code, and then leaves you exposed with no commitments.”To read this article in full or to leave a comment, please click here

Google buys Timeful to boost its apps’ time management skills

Google has acquired startup Timeful, whose iOS app uses machine learning to help people plan their days.People link Timeful to their calendars and then enter tasks, projects, events and hobbies into the app. For example, a user can tell Timeful he likes to jog four days a week, wants to finish painting a room by the end of the month and has a work presentation due on Friday.Timeful’s algorithm will use this information to create a schedule tailored to a person’s needs and preferences. The more information that is entered into Timeful and the more people use the app, the better it becomes at learning users’ activity patterns, schedules and habits.To read this article in full or to leave a comment, please click here

Google buys Timeful to boost its apps’ time management skills

Google has acquired startup Timeful, whose iOS app uses machine learning to help people plan their days.People link Timeful to their calendars and then enter tasks, projects, events and hobbies into the app. For example, a user can tell Timeful he likes to jog four days a week, wants to finish painting a room by the end of the month and has a work presentation due on Friday.Timeful’s algorithm will use this information to create a schedule tailored to a person’s needs and preferences. The more information that is entered into Timeful and the more people use the app, the better it becomes at learning users’ activity patterns, schedules and habits.To read this article in full or to leave a comment, please click here