Network World - Networking Nuggets and Security SnippetsThink of a modern enterprise data center. There are likely hundreds of physical servers hosting thousands of VMs. Individual systems are connected via 10gbE links that likely feed 40gb cores. Local data centers connect over DWDM, remote data centers use MPLS, and cloud data centers chat amongst each other over high-speed VPNs.
Network World - Networking Nuggets and Security SnippetsRemember the "Think Different" advertising campaign from Apple? It ran from 1997 to 2000 and featured bigger-than-life personalities like Buckminster Fuller, Martin Luther King, and Pablo Picasso.
The "Think Different" ads coincided with Steve Jobs's return to Apple and exemplify his somewhat contrarian and analytical mindset. In a PBS interview, Jobs offered this philosophical insight about...
Network World - Networking Nuggets and Security SnippetsI know there have been a substantial number of articles on the end of Windows XP and its implications, but I couldn't resist chiming in. Hey, maybe I was destined to do so since I was one of a few thousand people at the Windows 95 introduction in Redmond (back in the summer of 1995 of course). Here are my thoughts on this transition, I'll try to take a bit of a different angle on the topic. Read...
Network World - Networking Nuggets and Security SnippetsWhen BYOD was coming to fruition a few years ago, it had a sudden and deep impact on IT risk. Why? Many CISOs I spoke with at the time said it was purely a matter of scale. All of a sudden, large enterprises had thousands of additional devices on their networks and they struggled to figure out what these devices were doing and how these activities impacted organizational risk.
Network World - Networking Nuggets and Security SnippetsI wrote a blog last week about new integrated anti-malware technology last week in response to Palo Alto Network's acquisition of Cyvera. In fact, this integrated technology model isn't limited to anti-malware but is becoming the new reality across the cybersecurity life cycle of risk management, incident prevention, incident detection, and incident response.
Network World - Networking Nuggets and Security SnippetsWhile the calendar still indicates that we are in Q1 2014, the security industry continues as a nexus of M&A activity. The year started with FireEye grabbing Mandiant, and proceeded to Bit9's merger with Carbon Black, and yesterday's announcement that Palo Alto's intent to acquire Cyvera.
Network World - Networking Nuggets and Security Snippets&As you've probably noted by now, Symantec just announced that CEO Steve Bennett is out and is being replaced by board member Michael Brown on a temporary basis. The board will now conduct a search for a permanent CEO.
Network World - Networking Nuggets and Security SnippetsLast year, ESG published a research report titled, Advanced Malware Detection and Protection Trends, based upon a survey of 315 security professionals working at enterprise organizations (i.e. more than 1,000 employees). In one question, ESG asked security professionals whether they agreed or disagreed with the following statement: "Commercial host-based security software (i.e. AV) is more or...
Sign up now »
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.