Networking Jobs Beta

City: - Country:

* We couldn't fetch your location, please try again later!

Error retrieving jobs at this moment


As Tech Drives the Business, So Do CISOs

Published on: 2018-09-19

The tasks topping the CISO's to-do list are slowly shifting, as their core priorities transition from primarily technical expertise to securing business applications and processes. It's the key takeaway from a new report, conducted by Enterprise Strategy Group (ESG) and commissioned by Spirent, ...

Mirai Hackers' Sentence Includes No Jail Time

Published on: 2018-09-19

Three men charged with creating and managing the Mirai botnet have pleaded guilty to conspiracy to violate the Computer Fraud & Abuse Act and have been sentenced to a five-year period of probation and 2,500 hours of community service.

WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication

Published on: 2018-09-19

New standards offer protection against hacking, credential theft, phishing attacks, and hope for the end of an era of passwords as a security construct. The Internet began without an identity layer and has suffered since with a password retrofit, but new open, standards-based innovations for ...

Kong Crushes API Orchestration Challenges

Published on: 2018-09-19

Kong released the 1.0 version of its core open source platform API gateway that tackles the delicate task of managing the flow of information between an organization and various methods of deploying modern microservices. The platform, which was previously known as its "Community Edition" and now ...

Nuage Networks SD-WAN 2.0 Brings Connectivity Beyond Branches

Published on: 2018-09-19

Nokia's Nuage Networks today launched the newest release of its virtualized network services (VNS) platform, which it named SD-WAN 2.0. The service extends connectivity beyond just branches to also connect private data centers, Software-as-a-Service (SaaS) providers, and public clouds.

Verizon to manage, streamline SAP’s global network

Published on: 2018-09-19

Verizon chosen by SAP to manage, streamline the company's global network Verizon is expanding its role in SAP's global network, with a new agreement to consolidate, streamline and manage the company's worldwide network infrastructure. SAP has historically relied on an in-house team to handle its ...

FBI: Phishing Attacks Aim to Swap Payroll Information

Published on: 2018-09-19

The FBI's Internet Crime Complaint Center (IC3) reports a wave of social engineering attacks aiming to steal employees' login credentials so they can break into online payroll accounts. Attackers send their targets phishing emails designed to capture login credentials, the IC3 states.

5 Steps to Success for New CISOs

Published on: 2018-09-19

There are two fundamental truths for anyone working in security. The first is that there is an increasingly sophisticated threat landscape, making it impossible to be 100% secure. The second is that humans are human, and mistakes will be made, but potential errors have increasing impacts.

Skype for Business Server 2019: Head in the Clouds

Published on: 2018-09-19

Kevin Kieller | September 19, 2018 | Important decisions ahead if you're using Skype for Business 2015 Over the past nine years, many large organizations have successfully replaced traditional PBXs with the Microsoft unified communications platform, initially entitled Office Communications ...

IDG Contributor Network: Zero Trust Networking (ZTN): don’t trust anything

Published on: 2018-09-18

John Kindervag, a former analyst from Forrester Research, was the first to introduce the Zero-Trust model back in 2010. The focus then was more on the application layer. However, once I heard that Sorell Slaymaker from Techvision Research was pushing the topic at the network level, I couldn't ...

Closing the NFV management gap

Published on: 2018-09-18

Our upgraded Ensemble NFV suite hit the market last week. It includes several key enhancements focused on enabling service providers to roll out software-based, cloud-native solutions at scale. The new release is based on our wealth of virtualization experience ...

IDG Contributor Network: Beware the networking industrial complex

Published on: 2018-09-13

There is a status quo in the networking industry that is the enemy of innovation. The major hardware equipment makers collectively benefit by propagating the many layers of equipment and protocols. This "deep state" that exists within our innovation economy must be defeated to unleash the next ...

Cisco: How AI and machine learning are going to change your network

Published on: 2018-09-13

Cisco and others are betting heavily that Artificial Intelligence and machine learning will play an enormous part in future networks and data centers. How far and what roles those technologies play in the future may be the biggest questions but the stakes are clearly in the ground.

Quantum-safe communication deployment strategies

Published on: 2018-09-12

In the first part of my interview with Jörg-Peter Elbers, SVP of advanced technology at ADVA, we discussed quantum-safe communication and what it means for the future of networking security. In the second part, we look at implementation strategies for post-quantum cryptography and ...

Bossies 2017: The Best of Open Source Software Awards

Published on: 2017-09-27

Open source software isn't what it used to be. The term used to conjure images of the lone developer, working into the night and through weekends, banging out line after line of code to scratch a personal itch or realize a personal vision.

Cisco Reports Fourth Quarter and Fiscal Year 2018 Earnings

Published on: 2018-08-15

Revenue: $12.8 billion ▪ Increase of 6% year over year ▪ Recurring revenue was 32% of total revenue, up 1 point year over year Earnings per Share: GAAP: $0.81; Non-GAAP: $0.70 ▪ Non-GAAP EPS increased 15% year over year Revenue: $49.3 billion; increase of 3% year over year Earnings per

The potential of quantum-safe communications

Published on: 2018-09-03

Quantum technology provides valuable and highly effective tools in a variety of areas, including security. Recently, I discussed quantum-safe communications with Jörg-Peter Elbers, ADVA's SVP of advanced technology. Here's an edited transcript of the first part of our conversation. Carl ...

VMware has edge, AI, blockchain ambitions

Published on: 2018-08-30

Fully baked products weren't the only technologies on display at the VMworld conference in Las Vegas this week; VMware previewed three in-the-works projects related to edge computing, artificial intelligence and enterprise blockchain. The first is Project Dimension, which aims to deliver the ...

Cisco Meraki amps up throughput, Wi-Fi to SD-WAN family

Published on: 2018-08-29

Getting wide-area network links up and securely running quickly with minimal IT irritation has always been Cisco Meraki's strong suite. Equipping customers tasked with securely supporting more cloud applications and mobile devices with ever more throughput and the latest connectivity options are ...

Analysts: SD-WAN 5-year annual growth rate tops 40%

Published on: 2018-08-23

Whether users are looking to stabilize cloud-connected resources, better manage remote networks or simply upgrade a timeworn wide area environment, software-defined-WAN (SD-WAN) technologies are what's on the purchasing menu. The proof lies in the fact that this segment of the networking market ...

Network Architect Jobs Evolve

Published on: 2018-08-22

Network technology is evolving at breakneck speed, and a rapidly growing number of organizations are searching for network architects to help them add and upgrade services. The situation is complicated by the fact that many network architects who were on top of their game just a few years ago ...

Network Architect Jobs Evolve

Published on: 2018-08-22

Network technology is evolving at breakneck speed, and a rapidly growing number of organizations are searching for network architects to help them add and upgrade services. The situation is complicated by the fact that many network architects who were on top of their game just a few years ago ...

IDG Contributor Network: Networks for a yottabyte world

Published on: 2018-08-07

The rate at which telecom networks are growing and changing is nothing short of fantastic. It's always risky to embrace a new paradigm, but for network carriers and customers, the risks of waiting could be greater. Network function virtualization (NFV) and software defined networks (SDN) ...

How SD-WAN will make the cloud much, much bigger

Published on: 2018-07-23

Though I no longer actively participate in it as a pioneering player in the networking space I have always kept a watchful eye on the market and I am seeing yet another disruptive force known as SD-WAN (Software-Defined Wide-Area Networking) finally gaining momentum. For starters, SD-WAN is an ...

Microsoft 365 Business Brings an IT Team to Smaller Businesses

Published on: 2018-04-03

Microsoft wants to bring the resources you'd normally get from a dedicated IT team to a software solution. You've probably heard of Office 365 - the Microsoft cash cow that is the main productivity tool for millions of users. But the technical needs of businesses require more complex solutions ...

Review: 6 slick open source routers

Published on: 2018-02-01

Hackers of the world, unite! You have nothing to lose but the lousy stock firmware your routers shipped with. Apart from smartphones, routers and wireless base stations are undoubtedly the most widely hacked and user-modded consumer devices.

CES 2018: The top 9 new products for the enterprise

Published on: 2018-01-12

Alexa on Windows 10 PCs at CES 2018Image by HPAt CES 2018 everyone was talking about – or talking to –’s Alexa digital assistant. It’s omnipresent – around the home and in phones, cars and, increasingly, offices. You’ll probably even find it in your next Windows 10 PC. It’s already in ...

How to use blockchain: Following an asset through its lifecycle to learn more

Published on: 2017-05-15

This contributed piece has been edited and approved by Network World editorsPossession is nine-tenths of the law, right? But thanks to blockchain, this old adage may no longer be a viable way to settle property disputes.Artists and enterprises alike have long struggled to prove ownership of ...

Miercom Verifies Performance of Cisco Branch Office Routers vs. Huawei and HPE

Published on: 2018-09-19

Enterprise Networks The digital disruption The next generation of networking has arrived. Driven by the growth in devices connecting to multiple networks and clouds, large and small enterprises alike demand secure, software-defined networks. Finding the right platform that offers high ...

Automated Policy & Segmentation Violation Alerting with Stealthwatch Cloud

Published on: 2018-09-19

Stealthwatch Cloud is best known for network behavioral anomaly detection and entity modeling, but the level network visibility value it provides far exceeds these two capabilities. The underlying traffic dataset provides an incredibly accurate recording for every network conversation that has ...

We’ve Added a New Cisco CCNA Certification Course To Our Library!

Published on: 2018-09-19

Tune into Gabe Rivas's most recent course release, Network Foundation Protection: Management Plane, the second in a series of eight CCNA security courses. Network Foundation Protection is a security framework that provides with strategies to protect three functional areas of a device: Management ...

How Alliances Strengthen Your Cybersecurity Defenses

Published on: 2018-09-19

When we started the Cisco Security Technology Alliance (CSTA) a few years ago, we didn't envisage it growing into such a large ecosystem of technology spanning the breadth of our Cisco Security portfolio in such a short span of time. But security is most effective when it works as an integrated ...

Securing New Application Architectures in the Cloud: Understanding the Developer Mindset

Published on: 2018-09-17

Adrian Cockcroft The cloud is changing the way developers are building applications. Traditional and well-understood application design principles, where monolithic application code was optimized for and dependent on underlying infrastructure, are giving way to micro-services that are designed ...

Xbash Combines Botnet, Ransomware, Coinmining in Worm that Targets Linux and Windows

Published on: 2018-09-17

Unit 42 researchers have found a new malware family that is targeting Linux and Microsoft Windows servers. We can tie this malware, which we have named Xbash, to the Iron Group, a threat actor group known for previous ransomware attacks. Xbash has ransomware and coinmining capabilities.

News of the Week: September 15, 2018

Published on: 2018-09-15

Did you miss any of this week's Palo Alto Networks action? Don't worry - we've rounded up our top news and views right here: Upcoming Events Take a look at upcoming events around the world. Don't forget to register through our events calendar. Your move to the cloud, secured.

Persistent DNS connections for reliability and performance

Published on: 2018-09-19

For decades, the Domain Name System (DNS) has been based on a connectionless semantic: a client sends its query as a single User Datagram Protocol (UDP), and it receives a single UDP datagram with the response. This very simple communication model, along with efficient caching and clear ...

Defining the Edge: An Essential Part of 5G Transformation

Published on: 2018-09-17

Do you remember the early days of shopping online? I'm not talking about the crippling fear that you might send your credit card number into a digital abyss and you'd end up with zero product at your doorstep. I'm talking more about the fact that everyone seemed perfectly fine with shipments ...

Weekly Show 407: Delivering Applications In Multi-Cloud Environments With Avi Networks (Sponsored)

Published on: 2018-09-14

Running applications in a multi-cloud environment presents serious networking challenges. On today's sponsored Weekly Show, we talk with Avi Networks about how its software-based ADC and load balancer can help customers working in multi-cloud environments ensure application delivery, provide ...

A Matter of Perspective

Published on: 2018-09-14

Have you ever taken the opportunity to think about something from a completely different perspective? Or seen someone experience something you have seen through new eyes? It's not easy for sure. But it is a very enlightening experience that can help you understand why people sometimes see things ...

BiB 055: Meta Networks Brings SD-Perimeter To Talari’s SD-WAN

Published on: 2018-09-13

Podcast: Download | Embed The following text is a transcript of the audio you can listen to in your podcatcher or the web player. Welcome to Briefings In Brief, an audio digest of IT news and information from the Packet Pushers, including vendor briefings, industry research, and commentary.

PQ 155: Forecasting Network Evolution At VMworld’s Future:Net 2018

Published on: 2018-09-13

Podcast: Download | Embed Today's Priority Queue was recorded live in August 2018 at the Future:Net conference at VMworld 2018. Greg Ferro and Ethan Banks interview Bruce Davie, VMware's VP and Guido Appenzeller, VMware's CTO, Cloud and Networking.

Is Change at Odds with Automation

Published on: 2018-09-13

This blog contains some thoughts about automation. Coding and automation have become trendy. Whenever that happens, I feel the need to understand the pros and cons. So, what are some pros and cons around coding and automation? Coding, automation, and even ITIL share the attributes of requiring ...

Merci beaucoup Nouméa!

Published on: 2018-09-13

Thanks to everyone who attended APNIC 46 in Nouméa. We hope you enjoyed the conference and found it a valuable experience. There were: Over 300 attendees - 198 of them first time attendees - from 46 economies with 92 Member organizations represented. Five days of workshops covering information ...

Nouméa hosts a data-driven FIRST TC

Published on: 2018-09-13

We've heard that data is the new oil, gold or , but it's what you do with data that determines its true value. If they didn't know it already, attendees at the Noumea 2018 Forum of Incident Response and Security Teams Technical Colloquium ( FIRST TC) were shown a myriad of ways that data can be ...

Starting a new series: AWS ABC’s

Published on: 2018-09-11

I'd be lying if I said that since starting my new job at Amazon Web Services (AWS), I wasn't looking forward to writing about all the new things I was going to learn. Obviously there's the technology and services that make up the platform itself.

Complexity and Network Automation

Published on: 2018-09-10

This is the first blog in a series that will dive into the details around a modern approach to network automation. Network automation of complex configurations is much, much harder than automation of simple configurations. What makes a configuration complex and what is required in an automation ...

European Bank Simplifies and Secures its Business Operations with Juniper Networks

Published on: 2018-09-10

SUNNYVALE, Calif., Sept. 10, 2018 (GLOBE NEWSWIRE) -- Juniper Networks (NYSE: JNPR), an industry leader in automated, scalable and secure networks, today announced that Banca di San Marino SpA has selected Juniper Networks' unified cybersecurity platform, powered by Software-Defined Secure Net...

Neat Cisco Nexus Features You Might Have Missed

Published on: 2018-09-06

Since Cisco produces a lot of nifty new features, the title might suggest this is going to be a LONG blog. Far from it! As I write, it's Summer, and I suspect most readers have better things to do than read long blogs. Brevity for the win!

Attacking Wireshark

Published on: 2018-09-03

Every once in a while there is some news about Wireshark being vulnerable to being attacked/exploited/pwned, meaning that there is a way to craft frames/packets in a pcap/pcapng file to make Wireshark crash and (if done right) execute malicious code. So let's take a look at what that means and ...

Networking in the Cloud – Different but the Same

Published on: 2018-09-01

Networking in the cloud is impressive. Building redundant internet access is as easy as attaching an internet gateway (IGW) to your VPC. In an on-premises network we would have to build VLANs, subnets, IGPs, possibly HSRP and BGP etc. This

Security: Mitigating Spectre on Older Intel CPUs

Published on: 2018-04-01

I suspect all of my readers are well aware of the Spectre exploit affecting, among others, Intel CPUs going back many years. Intel for their part, after a few missteps, have issued microcode updates for more recent CPUs. But for those of us with computers running older CPUs, the solutions are ...

Improving Network Management Tools

Published on: 2018-08-23

Here we are, it's Summer, it must be time for another rant (ahem, "carefully reasoned polemic") about Network Management (NM). What should NM tools do for us? How might they help? Let's explore that a little... Have you ever had to sit through a boring network management product training?

Automation Learning Charter

Published on: 2018-08-15

The world changes. The hit novel " Who moved my cheese? " written twenty years ago, has sold over 25 million copies to help with people experiencing change. For those who work with networking technology, we're experiencing seismic activity in the world of change and new continents are forming ...

PCAP Split and Merge

Published on: 2018-07-31

Sometimes it also happens during network troubleshooting engagements, but it is also common for analysis jobs regarding network forensics: dealing with huge number of packets, sometimes millions or more. Two typical situations may have you scratch your head: either you have one huge file ...

Introducing WPA3

Published on: 2018-02-13

Ruckus releases an article with more detail about the recently announced WPA3 from Wi-FI Alliance. One thing that is quite relieving when this new technology introduced is that "all devices supporting WPA3 will continue to work with WPA2 devices" as stated by the Wi-Fi Alliance.

DMVPN Phase 3: a complete guide

Published on: 2018-07-16

In a previous article, I explained what is and how it works DMVPN technology. In this article you see how to configure DMVPN phase3. This phase allows spokes to build a spoke-to-spoke tunnel and to overcomes the phase2 restriction using NHRP traffic indication messages from the hub to signal to ...

Most Important Skills in Networking

Published on: 2018-04-08

It's easy to get blinded these days by all the talk about cloud, SDN and automation leading both new and existing people in networking to make decisions in their career which may not be the best ones long term. I've

Understanding Cisco DMVPN

Published on: 2018-06-26

In an old post, dated 2011, I explained various types of VPN technologies. In seven years several things have changed: SHA1 is deprecated, des and 3des are no more used for security issues, but some VPN technologies are still used with protocols more secure (SHA256, AES, ...).

GORUCK Custom Land Navigation Heavy AAR

Published on: 2018-06-20

GORUCK Custom Land Navigation Heavy AAR - Class 259Where to even start with this event? It has been in the works for a long time and the day finally arrived Saturday 6/16/18.  A bit of background on this event. First and foremost, it is a Heavy which means 24ish hours, lots of miles and hard ...

NANOG 73 Hackathon

Published on: 2017-11-29

Sunday, June 24, 2018 REGISTRATION FOR THE NANOG 73 HACKATHON IS OPEN Welcome to the NANOG 73 Hackathon brought to you by NANOG and host sponsor Do you love preventing disruption and chaos in your network? Always wondered what it would feel like to wear the “White Hat”? Want to show off your ...

Clos Fabrics AKA Spine & Leaf Architecture

Published on: 2016-03-26

Let's start the series with discussion of CLOS Fabrics AKA Spine & Leaf Architectures.Now CLOS design is not fundamentally new, but most of the Network Engineers were not talking about it till recent times (Well...this is true to an extent). So as Network Engineer should you really care ?Well ...

Office 365: Exchange Hybrid issue with Windows Security of Outlook 2016

Published on: 2018-03-28

Outlook prompts for password when accessing migrated Exchange Online resource. The on-premise mailbox has been migrated to Exchange Online and the user opening the calendar to see free/busy and planned meetings is sitting on-premise Exchange server. Windows Security – Microsoft Outlook ...

ISE BYOD for CCNP Security Now Available!

Published on: 2017-11-10

We’re happy to announce another Pluralsight course has been released. In this course we touch on BYOD configurations for CCNP Security candidates. This completes the series for SISAS. You can find the course at This also marks 20 courses in the Pluralsight library. More to come!  

ISE Profiler Services for CCNP Security (300-208) SISAS Published

Published on: 2017-07-03

Hi Everyone,   Happy to announce that ISE Profiler Services for CCNP Security (300-208) SISAS has published. Check it out over at In this course we dig though profiling services and how to apply policy based on how devices are profiled. This course is for anyone working on the ...

ISE Posture Services for CCNP Security (300-208) SISAS Published

Published on: 2017-05-31

Happy to announce that ISE Posture Services for CCNP Security (300-208) SISAS has published. Check it out over at In this course we dig though posture services and how to provision clients, posture clients, and apply policy. This course is for anyone working on the CCNP ...

New Pluralsight Course Published

Published on: 2017-04-18

Hi Everyone. I’m happy to announce that another Pluralsight course has been published. This one is specific to the SISAS certification and covers various aspects of Guest Access. In the course we cover how to setup WebAuth and then transition into Guest Access with a Sponsor Portal. You can ...

Taking the CCIE Lab in RTP

Published on: 2016-07-29

Cisco's campus in Research Triangle Park, North Carolina, is one of only two places in the United States where candidates can complete a CCIE lab exam (the other being in San Jose, California). People fly in from all over the eastern US and beyond to spend a day taking the exam. Lots of folks ...

WPA2 KRACK Vulnerability, Getting Information

Published on: 2017-10-16

*** This page is being updated regularly. Please check back periodically. ***I'm sure everyone who does anything with networking or Wi-Fi has heard about the announced WPA2 KRACK vulnerability. I won't go into depth with my opinion on it. I'd just like to start a collection of useful information ...

Seeing Tetration in action – NFD16

Published on: 2017-10-06

One of the highlights of Network Field Day 16 was a Cisco Tetration presentation by Tim Garner. Launched by Cisco last June, Tetration is a heavy lifting, data crunching platform that soaks up telemetry on all your network packets, uses machine learning algorithms on that data, and produces ...

What Drives Change in Enterprise IT

Published on: 2017-08-30

This week I am in Las Vegas attending Future:NET, a two-day conference on the Future of, well, Networking. The conference is aptly named :)The Packet Pushers asked me to join a moderated panel with the topic “Can we Accelerate Change in The Enterprise?” This spurred me to think: Why does the ...

A Confluence of Divergent Interests - Interop ITX 2017

Published on: 2017-03-30

You can find me Wednesday May 17th discussing "You can read more about my love of yoga over on my other blog I'm inordinately excited to announce that I will be speaking at Interop ITX 2017 Wireless Security Gotchas to Avoid" and leading morning yoga classes (poolside) Wednesday and Thursday ...

Cisco | Cisco IOS router to Meraki Appliance | site-to-site VPN with Zone based Firewalling

Published on: 2017-01-18

Lately I'm busy to configure Cisco IOS routers in combination with Remote offices where we place Meraki Appliances (like the MX64, MX65 or the Z1) When we do this we create also a VPN connection (site to site). In this setup the Main office has a Cisco IOS router.

SourceFire & AMP showing up on CCNP: Security

Published on: 2016-09-22

Looks like the SITCS Exam, that is part of the CCNP: Security exam is going from v1.0 to v1.5. SITCS is the exam oriented around 'Implementing Cisco Threat Control Soluation'. Now, it only makes sense as the original version of this exam was more geared towards Cisco IPS & CX which has since ...

Cisco ASA presents self-signed cert in certain SSL negotiations – CSCuu02848 / CSCuw02001

Published on: 2015-11-12

Just kind of a shout-out to those running ASA's, be careful when you upgrade to v9.4+ or v9.5+, and beyond. In v9.4+ when the ASA attempts to negotiate an SSL connection it will attempt to use an ECDSA Cipher as part of TLS v1.2 if the client supports Elliptic Curve ciphers.

© 2016 rights reserved.