Critical Infrastructure: Stop Whistling Past the Cyber Graveyard

Published on: 2018-03-20

An open letter to former colleagues in Homeland Security, peers in private sector cybersecurity firms, those who own and operate critical systems, academics, and politicians.

The Case for Integrating Physical Security & Cybersecurity

Published on: 2018-03-20

Aggregating threat intel from external data sources is no longer enough. You must look inside and outside your traditional knowledge base for the best way to defend against attacks.

IT Operations and the Cloud Skills Gap

Published on: 2018-03-20

Enterprises jeopardize their automation efforts if they don't invest in developing their network and security teams' cloud skills.

IT Operations and the Cloud Skills Gap

Published on: 2018-03-20

Enterprises jeopardize their automation efforts if they don't invest in developing their network and security teams' cloud skills.

The aura of artificial intelligence

Published on: 2018-03-20

Artificial intelligence has found its way into virtually every corner of our lives. It's in our homes, in our cars and in our phones. It can be found across multiple industries including banking, agriculture, healthcare, transportation and telecommunications - to name only a few. And it's a ...

MPLS explained

Published on: 2018-03-16

The thing about MPLS is that it’s a technique, not a service — so it can deliver anything from IP VPNs to metro Ethernet. It's expensive, so with the advent of SD-WAN enterprises are trying to figure how to optimize its use vs. less expensive connections like the internet.Did you ever order ...

Did You Buy a Security Hole?

Published on: 2018-03-16

By Gary AudinCover your bases by thoroughly vetting your potential VoIP and UC providers.

Hyperscale DCI shifts into a higher gear

Published on: 2018-03-15

While optical DCI applications for disaster recovery and business continuity have been a well-established part of the DCI market for over 20 years, the past five years have seen a sharp rise in demand for optical connectivity to interconnect hyperscale data centers. In fact, a new market for ...

IDG Contributor Network: Software-defined everything

Published on: 2018-03-14

Digital transformation is ushering in what the organizers of this year’s Pacific Telecommunications Council’s (PTC) 2018 global conference called “a new decade of connections.” The global trends driving digital include greater technology use, urbanization, data sovereignty, cybersecurity and ...

Best HP Laptops for Business 2018

Published on: 2018-03-12

The best HP laptops for business offer solid security, durability and excellent designs. Check out our top-rated picks here.

Leveraging Windows Server 2016 for hyperconvergence

Published on: 2018-03-01

With the release of Microsoft Windows Server 2016 a couple years ago, Microsoft directly entered the hyperconverged infrastructure (HCI) platform space that has been served by organizations like Nutanix, Scale, Cisco, HP, Dell, and others - only Microsoft comes at it with a fully ...

Review: 6 slick open source routers

Published on: 2018-02-01

Hackers of the world, unite! You have nothing to lose but the lousy stock firmware your routers shipped with. Apart from smartphones, routers and wireless base stations are undoubtedly the most widely hacked and user-modded consumer devices.

CES 2018: The top 9 new products for the enterprise

Published on: 2018-01-12

Alexa on Windows 10 PCs at CES 2018Image by HPAt CES 2018 everyone was talking about – or talking to –’s Alexa digital assistant. It’s omnipresent – around the home and in phones, cars and, increasingly, offices. You’ll probably even find it in your next Windows 10 PC. It’s already in ...

4 resources to find free Cisco skills and certification labs

Published on: 2017-06-08

For network professionals looking to get the latest in training for new skills and certifications, there is no shortage of resources on the web, but how do you know which online offers are legitimate? + MORE AT NETWORK WORLD: Cisco certifications target business professionals eyeing software ...

Cisco rolls out Cisco Enterprise Agreement for software

Published on: 2017-05-31

Software is now dominating IT spending.My research shows that the combination of SaaS and on-premises software is now a $650 billion market that has seen a steady growth of 6 percent per annum over the past five years. Today, almost all areas of IT are sold at least partially as software, ...

Cisco: Secure IoT networks, not the devices

Published on: 2017-05-23

With networking pros unable to trust the security of Internet of Things devices, Cisco says they should focus on implementing network-based security protections that limit the blast radius of IoT security breaches.This week Cisco unveiled a new package named IoT Threat Defense at the company’s ...

How to use blockchain: Following an asset through its lifecycle to learn more

Published on: 2017-05-15

This contributed piece has been edited and approved by Network World editorsPossession is nine-tenths of the law, right? But thanks to blockchain, this old adage may no longer be a viable way to settle property disputes.Artists and enterprises alike have long struggled to prove ownership of ...

Talking through that busted bracket, how defense can help shore it up.

Published on: 2018-03-20

Is it possible we can learn lessons about Financial Services security by watching NCAA Basketball? We sure can!

Solar Secures Infrastructure with Cisco DNA

Published on: 2018-03-20

Improve infrastructure security? Or improve infrastructure management? Why not both? These were the questions on the minds of the team at #CiscoDNA

Juniper Networks Joins the Cyber Threat Alliance

Published on: 2018-03-20

Juniper Networks Joins the Cyber Threat Alliance The necessity for strong cybersecurity has reached a critical high. As we’ve all seen over the past few years, attacks are getting stronger, hackers are getting wiser and organizations and individuals are struggling to keep up with the rapidly ...

We’ve Added a New CCIE Security Course to Our Video Library!

Published on: 2018-03-16

This course is part of INE’s CCIE Security v5 Technology Series. This series consists of several modules focused on many different aspects of the Group Encrypted Transport VPN (GETVPN) technology, such as operations, configuration, and redundancy. The course covers all important and ...

Securing a multicloud architecture

Published on: 2018-03-14

Securing a multicloud architecture As I’ve written in my previous blog ‘Crossing Tax: Multiplying Complexity in Multicloud’, the future for enterprises is multicloud. And for the promise of multicloud to be true, it requires that end-to-end solutions be largely invisible to users, without ...

Datanauts 125: Security Gamification & Training New Talent

Published on: 2018-03-14

Is security gamification a useful tool for training security talent, or just a gimmick? The Datanauts dive in to explore this issue. Our guest is Evan Dornbush. The post Datanauts 125: Security Gamification & Training New Talent appeared first on Packet Pushers.

Check Out Our Newest Addition to The INE Library: OSCP Security Technology Course

Published on: 2018-03-13

The OSCP Security Technology course is for those interested in learning advanced ethical hacking and penetration testing. This course is designed to prepare students to for the Penetration Testing with Kali (PWK) course offered by Offensive Security. The PWK course is a prerequisite to the ...

AIDS Resource Center of Wisconsin Simplifies Management and Maximizes Resources with Plexxi HCN

Published on: 2018-03-01

I have a particular soft spot for this Plexxi customer. They are a welcome reminder about the power of good and human kindness. The AIDS Research Center of Wisconsin (ARCW) is home to the ARCW Medical Center, which is Wisconsin's largest and fastest growing HIV healthcare system.

ISE BYOD for CCNP Security Now Available!

Published on: 2017-11-10

We’re happy to announce another Pluralsight course has been released. In this course we touch on BYOD configurations for CCNP Security candidates. This completes the series for SISAS. You can find the course at This also marks 20 courses in the Pluralsight library. More to come!  

ISE Profiler Services for CCNP Security (300-208) SISAS Published

Published on: 2017-07-03

Hi Everyone,   Happy to announce that ISE Profiler Services for CCNP Security (300-208) SISAS has published. Check it out over at In this course we dig though profiling services and how to apply policy based on how devices are profiled. This course is for anyone working on the ...

ISE Posture Services for CCNP Security (300-208) SISAS Published

Published on: 2017-05-31

Happy to announce that ISE Posture Services for CCNP Security (300-208) SISAS has published. Check it out over at In this course we dig though posture services and how to provision clients, posture clients, and apply policy. This course is for anyone working on the CCNP ...

New Pluralsight Course Published

Published on: 2017-04-18

Hi Everyone. I’m happy to announce that another Pluralsight course has been published. This one is specific to the SISAS certification and covers various aspects of Guest Access. In the course we cover how to setup WebAuth and then transition into Guest Access with a Sponsor Portal. You can ...

Taking the CCIE Lab in RTP

Published on: 2016-07-29

Cisco's campus in Research Triangle Park, North Carolina, is one of only two places in the United States where candidates can complete a CCIE lab exam (the other being in San Jose, California). People fly in from all over the eastern US and beyond to spend a day taking the exam. Lots of folks ...

CCNA – Cybersecurity Scholarship

Published on: 2017-10-20

In this post I am going to review CCNA – Cybersecurity certification & Scholarship program Cisco is offering. I was …Continue reading →

WPA2 is no more secure

Published on: 2017-10-17

WPA2 (Wi-Fi Protected Access 2) is a network security technology commonly used on Wi-Fi wireless networks. It’s an upgrade from the original WPA technology, which was designed as a replacement for the older and much less secure WEP. WPA2 is used on all certified Wi-Fi hardware since 2006 and is ...

WPA2 KRACK Vulnerability, Getting Information

Published on: 2017-10-16

*** This page is being updated regularly. Please check back periodically. ***I'm sure everyone who does anything with networking or Wi-Fi has heard about the announced WPA2 KRACK vulnerability. I won't go into depth with my opinion on it. I'd just like to start a collection of useful information ...

Seeing Tetration in action – NFD16

Published on: 2017-10-06

One of the highlights of Network Field Day 16 was a Cisco Tetration presentation by Tim Garner. Launched by Cisco last June, Tetration is a heavy lifting, data crunching platform that soaks up telemetry on all your network packets, uses machine learning algorithms on that data, and produces ...

What Drives Change in Enterprise IT

Published on: 2017-08-30

This week I am in Las Vegas attending Future:NET, a two-day conference on the Future of, well, Networking. The conference is aptly named :)The Packet Pushers asked me to join a moderated panel with the topic “Can we Accelerate Change in The Enterprise?” This spurred me to think: Why does the ...

A Confluence of Divergent Interests - Interop ITX 2017

Published on: 2017-03-30

You can find me Wednesday May 17th discussing "You can read more about my love of yoga over on my other blog I'm inordinately excited to announce that I will be speaking at Interop ITX 2017 Wireless Security Gotchas to Avoid" and leading morning yoga classes (poolside) Wednesday and Thursday ...

Cisco | Cisco IOS router to Meraki Appliance | site-to-site VPN with Zone based Firewalling

Published on: 2017-01-18

Lately I'm busy to configure Cisco IOS routers in combination with Remote offices where we place Meraki Appliances (like the MX64, MX65 or the Z1) When we do this we create also a VPN connection (site to site). In this setup the Main office has a Cisco IOS router.

SourceFire & AMP showing up on CCNP: Security

Published on: 2016-09-22

Looks like the SITCS Exam, that is part of the CCNP: Security exam is going from v1.0 to v1.5. SITCS is the exam oriented around 'Implementing Cisco Threat Control Soluation'. Now, it only makes sense as the original version of this exam was more geared towards Cisco IPS & CX which has since ...

Cisco ASA presents self-signed cert in certain SSL negotiations – CSCuu02848 / CSCuw02001

Published on: 2015-11-12

Just kind of a shout-out to those running ASA's, be careful when you upgrade to v9.4+ or v9.5+, and beyond. In v9.4+ when the ASA attempts to negotiate an SSL connection it will attempt to use an ECDSA Cipher as part of TLS v1.2 if the client supports Elliptic Curve ciphers.

© 2016 rights reserved.