Search This Blog

Wednesday, September 03, 2014

Router malware: Fact or fiction?

VMWorld 2014: Winners and Losers | Witness the future: The 1955 Video Phone

Network World Cisco

Router malware: Fact or fiction?
Given that malicious software isn't always found locally on the machine itself, Ronald and Dylan Kaplan share how to pinpoint the characteristics of router malware Read More


WHITE PAPER: Red Hat

Modernize Your IT Infrastructure & Streamline Operations
Increasing line of business demands? Shrinking IT budget? See how Red Hat can help you meet growing. Read Now

: TIBCO Jaspersoft

The Cloud BI that IT and Developers Demand
Jaspersoft for AWS allows developers and IT professionals to easily and affordably build business intelligence solutions as well as embed visualizations and analytics inside applications. Pricing starts at <$1/hr in a pay-as-you-go model. Learn more

VMWorld 2014: Winners and Losers
VMWorld 2014 was a whirlwind. The conference last week attracted 22,000 attendees, more than 250 exhibitors and spread across all three buildings of the Moscone Center in downtown San Francisco over a five-day period. There was a lot of news at the show: From VMware announcing new products like EVO:RAIL, the hyper-converged infrastructure stack, to the company pledging support for OpenStack and containers in its software. Almost all of the vendors at the show had their own news, too -- it was hard to keep track of it all. +Also on NetworkWorld: VMware takes its best shot at cloud market +To read this article in full or to leave a comment, please click here Read More

Witness the future: The 1955 Video Phone
The National Archives blog recently featured a pretty cool clip showing one of the first “futuristic” video phones – manual rotary dial and all. According to the blog: “Demonstrated for the first time, the videophone, with two-way picture screens enabling the parties to see, as well as speak to, each other. As simple to operate as today’s dial tone. The videophone included a small screen so that women could ‘primp’ before placing their calls. A mirror would have been less costly and more effective.” +More on Network World: The IRS uses computers?! The horror!+To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: OPSWAT Inc.

Secure the Use of Portable Media in Critical Infrastructure
Securing critical infrastructure is crucial to ensuring that our current way of life is sustained. Our whitepaper provides insight into the development of strong security policies around the use of portable media, and how to effectively mitigate the threat from external sources. Learn more

Bypassing hardware firewalls in 20 seconds
Zoltan Balazs, aka @zh4ck and CTO at MRG Effitas, presented “Bypass firewalls, application whitelists, secure remote desktops under 20 seconds” at Def Con 22. The slides are now available (pdf), as well a tool to help bypass hardware firewalls.Pen testers, or black hats, sometimes come up against a firewall that blocks backdoor Command and Control (C&C) communications. The problem, according to Balazs, is that bad guys can sometimes get around this, but white hats sometimes cannot.To read this article in full or to leave a comment, please click here Read More

Network Security Challenges in the Enterprise
ESG recently published a new research report titled, Network Security Trends in the Era of Cloud and Mobile Computing (note:  I am an ESG employee).  In this project, ESG surveyed 397 IT security professionals working at enterprise organizations (i.e. more than 1,000 employees) and asked a multitude of questions about their current and future network security policies, practices, and technologies.Here is a list of the top 5 network security challenges at enterprise organizations: 39% of organizations say that, “IT initiatives are being adopted without the proper network security oversight or controls in place.”  Sound familiar?  I’ve had lots of CISOs tell me about this very problem, especially around mobile computing.  Sounds like an opportunity for Bradford Networks, Cisco, and ForeScout.  The Trusted Computing Group (TCG) may also have a play here. 31% of organizations say that, “network security policies and controls are not cohesive as they must be implemented across many different security and networking technologies.”  In other words, network security is addressed with network devices when it should be applied to network flows.  This leads to network complexity and many, many associated challenges.  28% of organizations say they are challenged by, “too many overlapping controls and processes tend to cause trouble.”  When the networking and security teams are subnetting, VLANing, firewalling, and applying ACLs to network devices, there’s bound to be a lot of redundancy and wasted resources.  I get the need for layered defenses, but there must be a better way to isolate network traffic.  SDN?  NFV?  Cisco ACI?  VMware NSX?  Something is needed. 27% of organizations say that the, “security staff is too busy responding to alerts/events and not enough time with training, planning, or network security strategy.”  This points to the global cybersecurity skills shortage that I’ve been screaming about for years (in other ESG research, 25% of organizations said that they have a “problematic shortage” of IT security skills).  With too much work and too little staff, CISOs need network security technologies that can help them work smarter, not harder. 26% of organizations are challenged by, “security policies that are too complex and can’t be enforced with the current network security processes and controls.”  Everyone talks about “contextual security” where network access is governed by user identity, device identity, location, time-of-day, etc.  The problem is that this requires central management, common data, data exchange, and technology integration.  Alas, these things haven’t happened yet in many enterprises. Summarizing this list presents a scary scenario.  While business units are doing their own IT projects, the security team is hampered by mismatched policies, tactical technologies, and an overburdened staff.  Not a very good recipe for success. To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Riverbed Technology

Magic Quadrant for Application Performance Monitoring
Application performance monitoring is a key focus of IT operations groups, with growing influence from development, quality assurance and line-of-business application owners. View Now>>

The DOE's Smart Grid snapshot
While the benefits of moving the current antiquated electric grid into the future are many, there are a number of challenges still dogging the effort.Chief among them is cybersecurity but getting the country’s utility community onboard without costing them an arm and a leg is another.Such issues were apparent in the Department of Energy’s recent report to Congress on the status of the smart grid effort.To read this article in full or to leave a comment, please click here Read More

Avaya and HP to sell combined portfolio of UC, contact center and infrastructure services
Avaya and HP Enterprise Services announced they have signed a multi-year agreement to offer a combined portfolio of Unified Communications-as-a-Service (UCaaS), Contact Center-as-a-Service, and infrastructure modernization services. The combined portfolio will support for mobile applications, software, and networking for unified communications and customer experience management.As part of the agreement, the HP ES Business Process Services organization will assume service delivery of a significant portion of Avaya Private Cloud Services, including a limited transfer of Avaya employees and contractors to HP; however, responsibility for sales contracts, service level agreements, and the overall client experience will remain with Avaya. In addition to the portfolio arrangement, HP will also use Avaya’s communication and collaboration products to help HP improve the efficiency and performance of its contact center operations.To read this article in full or to leave a comment, please click here Read More

IDG Contributor Network: Want Gigabit Internet? A fistful of cities can now give it to you
Gigabit Internet is the Holy Grail for residential Internet users right now. If you're wondering where to get your hands on it for the upcoming fall entertainment season, here's where you need to go. Read More

John Dillinger, Bonnie and Clyde escape the shredder as FBI finishes vast digital fingerprint/ID project
FBI The FBI said today it was getting close to completing a massive project that saw the agency convert more than 30 million records and 83 million fingerprint cards to the digital Next Generation Identification system it will use in the future. According to an FBI release, the conversion from manual to digital systems began more than two decades ago, when paper files outgrew the space at FBI Headquarters in Washington, D.C. They were shipped to West Virginia, where the FBI built a campus in Clarksburg in 1992 for its Criminal Justice Information Services (CJIS) Division and leased warehouse space in nearby Fairmont for the burgeoning files.To read this article in full or to leave a comment, please click here Read More


SLIDESHOWS

The new Microsoft under Satya Nadella

The Microsoft CEO has set new goals, taken some decisive actions, moved ahead with works already in progress and made Wall Street happy.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. iPhone 6 rumor rollup for the week ending Aug. 30

2. Internet of Overwhelming Things

3. Cisco has a big UCS launch coming

4. Huawei tells the truth: Windows Phone has failed, Tizen is dead

5. 10 Firefox add-ons for boosting productivity

6. Why hackers may be stealing your credit card numbers

7. PC vendors fear an Osborne Effect from Windows 9

8. Four smartphone OSs fighting for survival

9. Apple developing 12.9-inch iPad model for 2015 launch - Report

10. Want Gigabit Internet? A fistful of cities can now give it to you


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: