Monday, August 04, 2014

How cellphone calling is going all Internet

Cisco revamps CCNP for IoT, other market transitions | 25G driving Ethernet switch market to $25B

Network World Cisco

Forward this to a Friend >>>


How cellphone calling is going all Internet
It isn't just wireline voice calls that are shifting to IP. Voice calls over wireless mobile phones are too, in a big way. Read More


WEBCAST: Cisco Systems

Evaluating Leading Breach Detection Systems
Today's constantly evolving advanced malware and Advanced Persistent Threats (APTs) can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to confront these advanced threats before, during and after attacks. Learn more >>

WEBCAST: Fortinet

What should I look for in a Next Generation Firewall?
With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different. John Pescatore of SANS Institute originally coined the phrase and now explains what he suggests enterprises look for when considering alternative NGFW solutions. Learn more >>

Cisco revamps CCNP for IoT, other market transitions
There’s no company in technology that’s taken advantage of market transitions more often than Cisco. In almost every presentation that CEO John Chambers gives, he opines about how catching market transitions at the right time has been the primary vehicle for Cisco’s growth over the past few decades. In fact, one of my key research principals is that significant share gain can only be achieved during moments of market transition. For example, had Cisco tried to enter the legacy PBX market, I’m not sure they would have had any success. However, they hit the shift to VoIP at the right time and now they’re the market leader in telephony.Catching market transitions has more to do with products, though. It’s about creating an ecosystem of support around the products. Cisco’s certification program is the best in the industry and has created an army of engineers that understand how to build networks “the Cisco way.” One of the staple certifications is the Cisco Certified Network Professional (CCNP), which is a stepping stone towards the highly coveted Cisco Certified Internetworking Engineer (CCIE).To read this article in full or to leave a comment, please click here Read More

25G driving Ethernet switch market to $25B
It's not here yet but it'll be a big seller when it is, says Dell'Oro Read More


WHITE PAPER: Riverbed Technology

How WAN Optimization Helps Enterprises Reduce Costs
If you wanted to break down innovation into a tidy equation, it might go something like this: Technology + Connectivity = Productivity. Productivity comes in two forms: user experience and infrastructure efficiency. Read Now

Why TCP/IP is on the way out
The now-aging TCP/IP protocol might not be around for much longer. That's if a bunch of researchers promoting network coding have their way. Read More

Anticipating Black Hat
RSA 2014 seems like ancient history and the 2015 event isn’t until next April.  No worries however, the industry is set to gather in the Las Vegas heat next week for cocktails, sushi bars, and oh yeah – Black Hat.Now Black Hat is an interesting blend of constituents consisting of government gum shoes, Sand Hill Rd. Merlot drinking VCs, cybersecurity business wonks, “beautiful mind” academics, and tattooed hackers – my kind of crowd!  As such, we aren’t likely to hear much about NIST frameworks, GRC, or CISO strategies.  Alternatively, I am looking forward to deep discussions on: Advanced malware tactics.  Some of my favorite cybersecurity researchers will be in town to describe what they are seeing “in the wild.”  These discussions are extremely informative and scary at the same time.  This is where industry analysts like me learn about the latest evasion techniques, man-in-the-browser attacks, and whether mobile malware will really impact enterprise organizations.  The anatomy of various security breaches.  Breaches at organizations like the New York Times, Nordstrom, Target, and the Wall Street Journal receive lots of media attention, but the actual details of attacks like these are far too technical for business publications or media outlets like CNN and Fox News.  These “kill chain” details are exactly what we industry insiders crave as they provide play-by-play commentary about the cybersecurity cat-and-mouse game we live in. Threat intelligence.  All of the leading infosec vendors (i.e. Blue Coat, Cisco, Check Point, HP, IBM, Juniper, McAfee, RSA, Symantec, Trend Micro, Webroot etc.) have been offering threat intelligence for years, yet threat intelligence will be one of the major highlights at Black Hat.  Why?  Because not all security and/or threat intelligence is created equally.  Newer players like BitSight, Crowdstrike, iSight Partners, Norse, RiskIQ, and Vorstack are slicing and dicing threat intelligence and customizing it for specific industries and use cases.  Other vendors like Fortinet and Palo Alto Networks are actively sharing threat intelligence and encouraging other security insiders to join.  Finally, there is a global hue and cry for intelligence sharing that includes industry standards (i.e. CybOX, STIX, TAXII, etc.) and even pending legislation.  All of these things should create an interesting discourse.  Big data security analytics.  This is an area I follow closely that is changing on a daily basis.  It’s also an interesting community of vendors.  Some (i.e. 21CT, ISC8, Leidos, Lockheed-Martin, Norse, Palantir, Raytheon, etc.), come from the post 9/11 “total information access” world, while others (Click Security, HP, IBM, Lancope, LogRhythm, RSA, etc.) are firmly rooted in the infosec industry.  I look forward to a lively discussion about geeky topics like algorithms, machine learning, and visual analytics.  Las Vegas is simultaneously one of the most fun and banal places on earth, but next week it will become a hotbed of cybersecurity intrigue, intelligence, and brainpower.  It’s likely to be 115 degrees in the shade, but I can’t wait to get there. To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: McAfee

The Significant Threat of Advanced Evasion Techniques
Advanced hacking methods, like advanced evasion techniques (AETs) have become more prevalent and harder to detect. Yet many network security vendors have downplayed the threat they pose as purely theoretical. Learn the false sense of security many IT professionals are under View Now

Black Hat shows its quirky side
The digital security exploits revealed at Black Hat are always impressive and hard to predict, so the bar is set pretty high for anyone hoping to grab attention at the show outside of the security briefings. That means vendors and individuals try hard to come up with ways they can stand out from the crowd. Here's a look at some of the noteworthy efforts from Black Hat 2013. Read More

Cisco ready to ship ACI controller
APIC slated to ship later this week; new switches, bundles here too. Read More


SLIDESHOWS

Black Hat 2014: How to crack just about everything

From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Why TCP/IP is on the way out

2. Linux will not become a gaming platform, it already is one

3. 20 cool things you can do with a Raspberry Pi

4. Some are twisting the facts in requests to be forgotten, Google says

5. Top 20 colleges for computer science majors, based on earning potential

6. The best cities for landing top pay for your tech skills

7. Black Hat 2014: How to crack just about everything

8. Federal court system warns of new e-mail jury scam

9. 10 disturbing attacks at Black Hat USA 2014

10. Half of surveyed US businesses shun SDNs


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment