SECURITY Stories

Cisco’s David Goeckeler talks security, networking, software and SD-WAN outlook

Published on: 2018-06-18

David Goeckeler doesn’t wear all of the hats at Cisco but he certainly wears one of the biggest.Responsible for 20,000 engineers and $32 billion worth of the networking giant’s business, Goeckeler, executive vice president and general manager, masterminds Cisco's network and security strategy ...

Cisco’s David Goeckeler talks security, networking, software and SD-WAN outlook

Published on: 2018-06-18

David Goeckeler doesn’t wear all of the hats at Cisco but he certainly wears one of the biggest.Responsible for 20,000 engineers and $32 billion worth of the networking giant’s business, Goeckeler, executive vice president and general manager, masterminds Cisco's network and security strategy ...

F-Secure Buys MWR InfoSecurity

Published on: 2018-06-18

Finnish endpoint security company buys British security service provider in cash deal.

Australia may prevent Huawei from taking part in 5G deployments: report

Published on: 2018-06-18

The Chinese vendor invited Australian security agencies to meet with the firm R&D specialists to better understand its technology Chinese vendor Huawei may be prevented from taking part in the deployment of Australia’s 5G networks due to national security concerns, according to published ...

Cisco and NetApp Simplify the Delivery of Cloud Infrastructure and Industry-Specific Applications with New FlexPod Solutions

Published on: 2018-06-07

SUNNYVALE, Calif. - June 7, 2018 - Cisco (NASDAQ: CSCO) and NetApp (NASDAQ: NTAP) today announced new FlexPod® solutions. FlexPod combines Cisco UCS Integrated Infrastructure with NetApp® data services to help organizations accelerate application delivery and transition to a hybrid cloud with a ...

GDPR and its impact on the IoT

Published on: 2018-05-30

Well, May 25 came and went! Yep, General Data Protection Regulation (GDPR) day happened and we're still all here. How many of you received that last-minute email flurry from companies seeking consent to retain your data? I for one counted and deleted a fair few!

Mobile network synchronization at a crossroads

Published on: 2018-05-29

Posted by Nir Laufer on May 29, 2018 Today's mobile network operators face a more challenging set of decisions than ever before. For many years, frequency synchronization delivered by TDM-based technologies was sufficient for the timing demands of mobile networks.

What’s round the corner for network analytics in optical networking?

Published on: 2018-05-24

Right now, we're at the infancy in the development of a whole new layer of added business value. AI and especially deep learning have tremendous potential to improve network planning and operations. You can get dizzy thinking about how much data is collected and monitored each day in networks ...

Cisco Prepares Cable Operators for Multi-cloud World with New Cloud Native Broadband Router

Published on: 2018-06-05

SAN JOSE, Calif., June 5, 2018 - Cisco today unveiled the CiscoCloud-Native Broadband Router, offering cable operators a new approach to support core broadband routing functions and simplify network operations. A cloud- and IP-based cable network offers the potential to launch new services in a ...

SKBroadband Sets Speed Record in Korea with Its Gigabit Broadband Service Powered by Cisco

Published on: 2018-06-05

SAN JOSE, Calif., June 5, 2018 - SKBroadband, a leading cable operator in Korea (CEO: Lee Hyunghee) announced that it has succeeded in implementing DOCSIS 3.1 broadband technology to enhance its cable infrastructure to offer high-quality video, high-speed data and OTT services.

SDNs and NFV are complementary and core components of modernized networks

Published on: 2018-06-05

The terms software defined networking (SDN) and network functions virtualization (NFV) are often used interchangeably, which is incorrect. In a sense, the two are tied together as companies start using NFV as part of their SDN plans but that doesn't have to be the case.

SDNs and NFV are complementary and core components of modernized networks

Published on: 2018-06-05

The terms software defined networking (SDN) and network functions virtualization (NFV) are often used interchangeably, which is incorrect. In a sense, the two are tied together as companies start using NFV as part of their SDN plans but that doesn't have to be the case.

Windows Server 2019 embraces SDN

Published on: 2018-06-05

When Windows Server 2019 is released this fall, the updates will include features that enterprises can use to leverage software-defined networking (SDN).

Microsoft 365 Business Brings an IT Team to Smaller Businesses

Published on: 2018-04-03

Microsoft wants to bring the resources you'd normally get from a dedicated IT team to a software solution. You've probably heard of Office 365 - the Microsoft cash cow that is the main productivity tool for millions of users. But the technical needs of businesses require more complex solutions ...

Review: 6 slick open source routers

Published on: 2018-02-01

Hackers of the world, unite! You have nothing to lose but the lousy stock firmware your routers shipped with. Apart from smartphones, routers and wireless base stations are undoubtedly the most widely hacked and user-modded consumer devices.

CES 2018: The top 9 new products for the enterprise

Published on: 2018-01-12

Alexa on Windows 10 PCs at CES 2018Image by HPAt CES 2018 everyone was talking about – or talking to – Amazon.com’s Alexa digital assistant. It’s omnipresent – around the home and in phones, cars and, increasingly, offices. You’ll probably even find it in your next Windows 10 PC. It’s already in ...

How to use blockchain: Following an asset through its lifecycle to learn more

Published on: 2017-05-15

This contributed piece has been edited and approved by Network World editorsPossession is nine-tenths of the law, right? But thanks to blockchain, this old adage may no longer be a viable way to settle property disputes.Artists and enterprises alike have long struggled to prove ownership of ...

Thinking About a Cyber Career? Just Jump In

Published on: 2018-06-18

If you care about cyber security and you’re willing to work hard, we need you. Yes, YOU.

Network monitoring is dead… What now?

Published on: 2018-06-13

Guest Post: While it appears there is a learning curve prior to adoption, TLSv1.3 should be strongly considered to improve the security of web sessions.

Measuring routing (in)security

Published on: 2018-06-12

Guest Post: What is the scale of routing vulnerability attacks and how does it evolve over time?

Introducing WPA3

Published on: 2018-02-13

Ruckus releases an article with more detail about the recently announced WPA3 from Wi-FI Alliance. One thing that is quite relieving when this new technology introduced is that "all devices supporting WPA3 will continue to work with WPA2 devices" as stated by the Wi-Fi Alliance.

The Top 5 Fastest Growing Jobs In The IT Sector

Published on: 2018-06-06

There's no easy path to success in the IT sector, but there are certainly ways to increase your chances of having a rewarding career. One of the ways is knowing which fields in IT have the most potential for future growth.

Extending Policy Control with NSX SD-WAN by VeloCloud

Published on: 2018-05-30

The holy grail of policy control is consistent, secure, end-to-end control. That means identifying users or end devices at the point they connect to the network, assigning policy, and enforcing that policy through to the end target.

Cisco 1000 Series ISR Naming

Published on: 2018-05-28

The Naming Convention for the 1000 Series ISR Product IDs The Cisco 1000 Series Integrated Services Routers (ISRs) are the latest addition to fixed ISR routing portfolio which combines WAN, comprehensive security, wired and wireless access in a single, high-performance platform. The ISR 1000 ...

Getting Talented

Published on: 2018-05-24

The Information Technology team’s job is never done – it just keeps getting bigger. This blog is about the challenges in finding suitable staff and skills, and some options addressing those challenges. IT once consisted of combined networking and security, with some servers, but now networking ...

Configuring SSL for gRPC on Junos

Published on: 2018-05-23

This is a short article on creating a self-signed root certificate which can be used to self-sign certificates for the purposes of treating our telemetry and instrumentation exploration with the security love it deserves. I also cover configuration of mutual SSL for ...

NANOG 73 Hackathon

Published on: 2017-11-29

Sunday, June 24, 2018 REGISTRATION FOR THE NANOG 73 HACKATHON IS OPEN Welcome to the NANOG 73 Hackathon brought to you by NANOG and host sponsor Do you love preventing disruption and chaos in your network? Always wondered what it would feel like to wear the “White Hat”? Want to show off your ...

Security: Mitigating Spectre on Older Intel CPUs

Published on: 2018-04-01

I suspect all of my readers are well aware of the Spectre exploit affecting, among others, Intel CPUs going back many years. Intel for their part, after a few missteps, have issued microcode updates for [...] If you liked this post, please do click through to the source at Security: Mitigating ...

WPA2 is no more secure

Published on: 2017-10-17

WPA2 (Wi-Fi Protected Access 2) is a network security technology commonly used on Wi-Fi wireless networks. It’s an upgrade from the original WPA technology, which was designed as a replacement for the older and much less secure WEP. WPA2 is used on all certified Wi-Fi hardware since 2006 and is ...

Clos Fabrics AKA Spine & Leaf Architecture

Published on: 2016-03-26

Let's start the series with discussion of CLOS Fabrics AKA Spine & Leaf Architectures.Now CLOS design is not fundamentally new, but most of the Network Engineers were not talking about it till recent times (Well...this is true to an extent). So as Network Engineer should you really care ?Well ...

Office 365: Exchange Hybrid issue with Windows Security of Outlook 2016

Published on: 2018-03-28

Outlook prompts for password when accessing migrated Exchange Online resource. The on-premise mailbox has been migrated to Exchange Online and the user opening the calendar to see free/busy and planned meetings is sitting on-premise Exchange server. Windows Security – Microsoft Outlook ...

ISE BYOD for CCNP Security Now Available!

Published on: 2017-11-10

We’re happy to announce another Pluralsight course has been released. In this course we touch on BYOD configurations for CCNP Security candidates. This completes the series for SISAS. You can find the course at Pluralsight.com. This also marks 20 courses in the Pluralsight library. More to come!  

ISE Profiler Services for CCNP Security (300-208) SISAS Published

Published on: 2017-07-03

Hi Everyone,   Happy to announce that ISE Profiler Services for CCNP Security (300-208) SISAS has published. Check it out over at Pluralsight.com. In this course we dig though profiling services and how to apply policy based on how devices are profiled. This course is for anyone working on the ...

ISE Posture Services for CCNP Security (300-208) SISAS Published

Published on: 2017-05-31

Happy to announce that ISE Posture Services for CCNP Security (300-208) SISAS has published. Check it out over at Pluralsight.com. In this course we dig though posture services and how to provision clients, posture clients, and apply policy. This course is for anyone working on the CCNP ...

New Pluralsight Course Published

Published on: 2017-04-18

Hi Everyone. I’m happy to announce that another Pluralsight course has been published. This one is specific to the SISAS certification and covers various aspects of Guest Access. In the course we cover how to setup WebAuth and then transition into Guest Access with a Sponsor Portal. You can ...

Taking the CCIE Lab in RTP

Published on: 2016-07-29

Cisco's campus in Research Triangle Park, North Carolina, is one of only two places in the United States where candidates can complete a CCIE lab exam (the other being in San Jose, California). People fly in from all over the eastern US and beyond to spend a day taking the exam. Lots of folks ...

WPA2 KRACK Vulnerability, Getting Information

Published on: 2017-10-16

*** This page is being updated regularly. Please check back periodically. ***I'm sure everyone who does anything with networking or Wi-Fi has heard about the announced WPA2 KRACK vulnerability. I won't go into depth with my opinion on it. I'd just like to start a collection of useful information ...

Seeing Tetration in action – NFD16

Published on: 2017-10-06

One of the highlights of Network Field Day 16 was a Cisco Tetration presentation by Tim Garner. Launched by Cisco last June, Tetration is a heavy lifting, data crunching platform that soaks up telemetry on all your network packets, uses machine learning algorithms on that data, and produces ...

What Drives Change in Enterprise IT

Published on: 2017-08-30

This week I am in Las Vegas attending Future:NET, a two-day conference on the Future of, well, Networking. The conference is aptly named :)The Packet Pushers asked me to join a moderated panel with the topic “Can we Accelerate Change in The Enterprise?” This spurred me to think: Why does the ...

A Confluence of Divergent Interests - Interop ITX 2017

Published on: 2017-03-30

You can find me Wednesday May 17th discussing "You can read more about my love of yoga over on my other blog I'm inordinately excited to announce that I will be speaking at Interop ITX 2017 Wireless Security Gotchas to Avoid" and leading morning yoga classes (poolside) Wednesday and Thursday ...

Cisco | Cisco IOS router to Meraki Appliance | site-to-site VPN with Zone based Firewalling

Published on: 2017-01-18

Lately I'm busy to configure Cisco IOS routers in combination with Remote offices where we place Meraki Appliances (like the MX64, MX65 or the Z1) When we do this we create also a VPN connection (site to site). In this setup the Main office has a Cisco IOS router.

SourceFire & AMP showing up on CCNP: Security

Published on: 2016-09-22

Looks like the SITCS Exam, that is part of the CCNP: Security exam is going from v1.0 to v1.5. SITCS is the exam oriented around 'Implementing Cisco Threat Control Soluation'. Now, it only makes sense as the original version of this exam was more geared towards Cisco IPS & CX which has since ...

Cisco ASA presents self-signed cert in certain SSL negotiations – CSCuu02848 / CSCuw02001

Published on: 2015-11-12

Just kind of a shout-out to those running ASA's, be careful when you upgrade to v9.4+ or v9.5+, and beyond. In v9.4+ when the ASA attempts to negotiate an SSL connection it will attempt to use an ECDSA Cipher as part of TLS v1.2 if the client supports Elliptic Curve ciphers.

© 2016 www.fusioneer.net.All rights reserved.