Menlo Security Raises $25M for Its Isolation Platform
If you can't secure the endpoints, Menlo figures you might as well eliminate them.
If you can't secure the endpoints, Menlo figures you might as well eliminate them.
As cloud computing, big data and the deployment of mega-scale data centers accelerates, organizations need to continually recalibrate and evolve the network. This challenge has led to the development of new technologies and standards designed to increase and optimize network capacity, security and flexibility, all while keeping a lid on cost. Here are the top five trends as we see them:
* Rapid Adoption of 802.11ac. Tablets and smartphones are becoming ubiquitous in the workplace. As the number of mobile devices and the deployment of cloud-based enterprise services continues to scale at a dramatic rate, the keepers of the network must reconsider how they provision, secure and control enterprise computing resources and information access.
To read this article in full or to leave a comment, please click here
Back in February, I wrote a piece entitled “HP Buying Aruba?”. In that post, I provided some context around why I thought HP buying Aruba could end up being a bad idea. I also mentioned in that post that I hoped HP did right by Aruba’s customer base and didn’t put the corporate handcuffs on them.
After several months and many conversations with HP, Aruba, and my peers, I have a different take. I am not 100% ready to back off from my concerns though. The acquisition has closed. The deal is done. However, it is too early in the process to be certain of much of anything regarding the future state of Aruba, its products, and its ability to execute as they have in the past. Let’s just say I am about 75% headed in the opposite direction of my initial concerns.
This past week, I was fortunate enough to attend HP Discover in Las Vegas. HP paid for my travel and expenses for HP Discover. For that, I thank them and I can definitively tell you that I was not pressured into writing anything as a result of this trip. As luck would have it, Aruba Continue reading
As many of you have heard by now, Cisco has announced their new CCNA Cloud and CCNP Cloud certifications. These certifications are designed to be a focus-based around their “Internet of Things” (IoT) concept, which will also play into the “Internet of Everything” (IoE) transformation that we’ll see happening over the next several years. In addition to Cisco, so many other companies are participating in the IoT concept, at a minimum, the companies listed here.
As a quick summary, the IoT definition refers to the endpoints, devices, and networks that connect to the internet, whereas their IoE definition is more of a “tied in system” that brings networked devices, and endpoints (IoT) together into a much larger solution that will allow the ability to connect people, places, and things in a much more relevant and valuable way than ever imagined. IoE brings people, processes, data, and the connected devices together to form – essentially, in my own words “a connected world”.
For a visual explanation, check out this slideshow and video (which I love) developed by Cisco.
As I read into Cisco’s Continue reading
During the Cumulus Linux presentation Dinesh Dutt had at Data Center Fabrics webinar, someone asked an unexpected question: “Do you have In-Service Software Upgrade (ISSU) on Cumulus Linux” and we both went like “What? Why?”
Dinesh is an honest engineer and answered: “No, we don’t do it” with absolutely no hesitation, but we both kept wondering, “Why exactly would you want to do that?”
Read more ...Let’s say you’ve been offered a new job. $70k base salary, with up to $20k per year extra for on-call duties. Great! $90k! That’s $10k more than my salary now! Sign me up!
Wait a minute. Not so fast.
Years ago I received some good advice: Treat your on-call payment as a separate item. Don’t consider it as part of your base salary. This is because you need to be paid properly both for doing your job, and for the inconvenience of being on-call.
Evaluate the base salary for what it is: Your salary for doing your day-to-day job. Ignoring the on-call part, did they offer you enough money for the role? Is it a good match for your experience?
Separately decide if the on-call payment is enough to justify being on-call. Does it represent a fair payment for the extra work?
Why does this matter? A few reasons:
Presenter: Jeff Schutt - Cybersecurity Solutions Architect (Jeff works in Adv Services in the IoT team)
Full Title: An IoT Security Model & Architecture for Securing Cyber-Physical and IT-OT Converged Assets
Mix of IT/OT folks in the room.
Presenter: Konrad Reszka, IoT Vertical Solutions Group Engineering Lead
“Given a chance, how many people in this room would volunteer to be a meteorologist in San Diego? You'd never be wrong!”
How to Call REST APIs from a REST Client and Python
Presenter: Matt (didn't catch last name, sorry)
LightCyber Magna Active Breach Detection automatically detects active attackers by identifying the anomalous operational behaviors sourced from compromised hosts in your network. By focusing on actual attack behaviors, and not technical artifacts like signatures, Magna provides accurate breach indicators and eliminates excessive false positives.
The post PQ Show 51 – LightCyber Magna Active Breach Detection – Sponsored appeared first on Packet Pushers Podcast and was written by Ethan Banks.
The Cloonix development team released an update to Cloonix version 26 in May 2015. An important addition in version 26 is a greatly expanded and improved Cloonix user guide.
The new version also changes the user interface, adds a new LAN type, and eliminates the t2t device. It also includes updated guest virtual machines.
In Cloonix Version 26, the user interface eliminates the tool bar and makes all graph objects available via a right-click drop-down menu.
Right-click to access the virtual network object menu
Cloonix v26 KVM configuration window
The only change to the install procedure is a some new prerequisite software packages that must be installed to support compilation.
You can install pre-compiled binaries or compile Cloonix from source code. I prefer to compile it. The source code and the precompiled binaries are on the Cloonix Software page.
To compile the source code on Xubuntu 14.04, I followed the procedure documented in the Cloonix install documentation.
We will install Cloonix v26 in our Home directory. Download and unpack the source code.
How does Internet work - We know what is networking
This one is long. Do not be afraid though, I made it just to give you the fastest way to deploy functional dot1x to your company HQ without reading even more documentation and searching for those little timer default settings. I the article prior to this I showed you how to setup your environment with simple dot1x and make it as simple as possible. I will not repeat again the part about setting up Radius Clients on server side, everything else is here once again just more complex. Now is time for a more complex example that will make your implementation