There is a recurring theme at Black Hat every year: security researchers come together and show the world how to hack into systems and things. This year was no exception. The sheer size of the cyber-attack surface becomes more daunting by the day. Networks now connect data centers and on-premise hardware to private and public […]
Earlier this year, Forrester conducted research into the data center networking market. In the report titled The Forrester Wave™: Hardware Platforms for Software-Defined Networking, Q1 2018, lead research analyst Andre Kindness looked at a number of criteria split across current offerings, strategy, and market presence.
As SD-WAN adoption matures and moves from “peak of inflated expectation” to “slope of enlightenment”, a question that I hear and many technologist ponder over is whether SD-WAN is the new MPLS. If you asked this question to a distinguished engineer they would violently disagree at a technical level comparing the difference from an OSI […]
Windows has been a target of hackers for a long time. The reason is simple: it is the OS with the largest deployment footprint around the world. Hackers discover vulnerabilities in Windows OS software as well as the various software that support Windows OS. Exploits as well as exploit mitigation techniques have evolved over the years.
The industry is at a crossroads. And this isn’t just hyperbole – we as an industry have some decisions to make around what we stand for – as engineers, operators, and architects, and frankly, the people that (sometimes literally) keep the lights on. It’s time to have some real talk.
When first publicly announced on May 23, the threat dubbed VPNFilter was thought to only infect some brands of home routers and Network Attached Storage devices. While it was known that the list of router brands was probably not complete, little did we know that the malware has the ability to infect the very computers sitting behind […]
VPNfilter is a campaign to compromise small office and home routers as well as Network Attached Storage devices from several popular manufacturers. According to a Cisco Talos blog, there are upward of 500,000 infected devices already and the list may not be exhaustive.
Crypto ransomware seems to be a never-ending threat in today’s cyber world. It’s comparable to the “Kaiju” in the 2013 Hollywood blockbuster, Pacific Rim. One crypto ransomware dies and another is born that has more evolved features. The second half of 2017 witnessed back-to-back outbreaks of Wannacry, Petya, NotPetya and BadRadbbit ransomware.
On May 25th, 2018, the General Data Protection Regulation (GDPR) becomes enforceable under law in the European Union (EU). It fundamentally changes how businesses (and the public sector) must handle information relating to their customers, giving greater protection to individuals and harmonizing the laws for data-handling across the EU. So, if this is an EU law then, […]