Black Hat 2018: Securing the Expanding Cyberattack Landscape

There is a recurring theme at Black Hat every year: security researchers come together and show the world how to hack into systems and things. This year was no exception. The sheer size of the cyber-attack surface becomes more daunting by the day. Networks now connect data centers and on-premise hardware to private and public […]

Read more

Resources Outline the New Essentials for Data Center Design

Earlier this year, Forrester conducted research into the data center networking market. In the report titled The Forrester Wave™: Hardware Platforms for Software-Defined Networking, Q1 2018, lead research analyst Andre Kindness looked at a number of criteria split across current offerings, strategy, and market presence.

Read more

Is SD-WAN the new MPLS?

As SD-WAN adoption matures and moves from “peak of inflated expectation” to “slope of enlightenment”, a question that I hear and many technologist ponder over is whether SD-WAN is the new MPLS. If you asked this question to a distinguished engineer they would violently disagree at a technical level comparing the difference from an OSI […]

Read more

Windows Exploitation and AntiExploitation Evolution

Windows has been a target of hackers for a long time. The reason is simple: it is the OS with the largest deployment footprint around the world. Hackers discover vulnerabilities in Windows OS software as well as the various software that support Windows OS. Exploits as well as exploit mitigation techniques have evolved over the years.

Read more

The Network Reliability Engineer’s Manifesto

The industry is at a crossroads. And this isn’t just hyperbole – we as an industry have some decisions to make around what we stand for – as engineers, operators, and architects, and frankly, the people that (sometimes literally) keep the lights on. It’s time to have some real talk.

Read more

VPNFilter: a global threat beyond routers

When first publicly announced on May 23, the threat dubbed VPNFilter was thought to only infect some brands of home routers and Network Attached Storage devices. While it was known that the list of router brands was probably not complete, little did we know that the malware has the ability to infect the very computers sitting behind […]

Read more

Practical tips for preventing Ransomware

Crypto ransomware seems to be a never-ending threat in today’s cyber world. It’s comparable to the “Kaiju” in the 2013 Hollywood blockbuster, Pacific Rim. One crypto ransomware dies and another is born that has more evolved features. The second half of 2017 witnessed back-to-back outbreaks of Wannacry, Petya, NotPetya and BadRadbbit ransomware.

Read more

GDPR Considerations for Companies Outside the European Union

On May 25th, 2018, the General Data Protection Regulation (GDPR) becomes enforceable under law in the European Union (EU). It fundamentally changes how businesses (and the public sector) must handle information relating to their customers, giving greater protection to individuals and harmonizing the laws for data-handling across the EU. So, if this is an EU law then, […]

Read more