Organizations lack sufficient collect and compute resources to arrive at accurate conclusions about whether or not events observed are good or bad. That is to say, simply passing metadata to a SIEM will not, by itself, identify a breach. To make it worse, things one organization or business unit deems “bad”, may not be “bad” […] The post The Haystack Problem appeared first on Gigamon Blog.
Read MoreDell recently announced its intent to acquire EMC at approximately $33.15 a share, for a total transaction price of $67 billion. Upon first hearing of this deal, the ancient proverb, “fortune favors the bold,” immediately came to mind. This is a massive deal, and while some will say it is too risky, I would argue that the industry conditions have shifted to where it might be more risky for Dell and EMC not to make this move. The IT industry is in the midst of a massive upheaval. The merger makes both companies stronger than how they might have been apart.
Read MoreAnother week, another advancement in GigaSECURE Security Delivery Platform from Gigamon, the leader in the Traffic Visibility space! Previously, my colleague Johnnie discussed GigaSECURE solutions to ‘Secure the promise of SDDC Micro-Segmentation’. Now, we are excited to announce at VMworld Barcelona, new extensions to GigaSECURE, specifically GigaVUE-VM that will automate traffic visibility for securing the […] The post Automated Traffic Visibility for Software Defined Data Centers using VMware NSX Dynamic Service Insertion appeared first on Gigamon Blog.
Read MoreSo by now you have probably heard that Dell is planning on acquiring EMC, while leaving VMware as a publicly traded entity. Hot stuff indeed. This has big implications for the IT market as a whole, but Im most interested in how it sets up change for the big data, database, and analytics space. A few immediate opportunities and a risk are in store:
Read MoreWhile attending Splunk.conf 15, I sat in on an interesting presentation given by Christof Jungo, head of security architecture and engineering at Swisscom.
Read MoreMobile is Here....Are you Ready? Mobile data traffic is expected to grow at a CAGR of around 45 percent between 2013 and 2019, resulting in a 10-fold increase over that time span...learn more about how mobile traffic will impact your network in this new infographic. Copyright © 1996-2013 Juniper Networks, Inc. All rights reserved Update preferences
Read MoreDateline City: SUNNYVALE, Calif. SUNNYVALE, Calif.--(BUSINESS WIRE)--Juniper Networks (NYSE:JNPR), the industry leader in network innovation, today announced details regarding its upcoming participation at VMworld 2015 Europe, VMware’s annual regional user conference and exhibition, October 12-15 at the Fira Gran Via, Barcelona. Juniper Networks is a Gold Sponsor and will be located at exhibition booth G318. Language: English Contact: Juniper NetworksPenny Still, +44 1372 385 692pstill@juniper.net Ticker Slug: Ticker: JNPR Exchange: NYSE read more
Read MoreThere has been a lot of time and [electronic] ink expended of late in the build-up to, and eventual launch of, the Pure IPO yesterday. Most of the commentary has concentrated on the valuation and stock trading zone. As I write this, the stock price has floated down softly to around $15.50, off from the offering starting point of $17 per share. The financial press headlines contain plenty of words like disappointing and failed to impress. Moreover, they talk of the impact of this unicorn IPO on the appetite and enthusiasm for tech IPOs. In other words, its a very parochial Wall Street view. And frankly, thats where the focus is misplaced, at least from the storage and IT market perspective. Now, I am not here to suggest that the share price is irrelevant or that many people wouldnt have been happier to see a more robust start for PSTG shares. But theres a more significant set of considerations from a technology, industry and end-user perspective.
Read MoreGigamon Director of Service Provider Solutions Andy Huckridge recently spoke at the Telecom Council Innovation Meeting in Mountain View, CA. See how Gigamon solves the problem of the combination of decreasing ARPU/bit, exponentially increasing big data, and the limited ability of analytics tools to scale. For more information, read about the Triple Challenge of Network […] The post Service Provider Problems with Analytics Tools appeared first on Gigamon Blog.
Read MoreSignature Update #2543 247 new signatures:HIGHHTTP: Typo3 CMS SanitizeLocalUrl Cross-Site ScriptingMEDIUMHTTP: Static HTTP Server ini File Parsing Buffer Overflow1HIGHHTTP: Novell ZENworks Mobile Management Cross-Site ScriptingMEDIUMHTTP: Integard Home and Pro Password Remote Version Check1MEDIUMHTTP: VLC HTTPD Connection Header Format String1HIGHHTTP: Ignite Realtime Openfire group-summary.jsp Cross-Site ScriptingMEDIUMHTTP: ntop Basic Authorization Denial of Service1MEDIUMHTTP: PHPWiki CVE-2014-5519 Ploticus Arbitratu Code Execution1MEDIUMHTTP: Sun Java System Web Server JSP Source Code Disclosure1MEDIUMHTTP: ESTsoft ALZip MIM File Processing Buffer Overflow1MEDIUMHTTP: Maxthon History Cross Site Scripting1MEDIUMHTTP: Digium Asterisk Management Interface HTTP Digest Authentication Stack Buffer Overflow1MEDIUMHTTP: Adobe Flash Player Privilege Escalation1MEDIUMHTTP:Multiple Product XML External Entity Injection1MEDIUMHTTP: Wordpress W3 Total Cache Plugin Remote Code Execution1MEDIUMHTTP: Microsoft ASP.NET Post Request Parameters Handling Denial of Service1MEDIUMHTTP: Suspicious WIPER/SHAMOON Infected File Download1MEDIUMHTTP: XnView mbm File Parsing Buffer Overflow1MEDIUMHTTP: Microsoft Telnet Protocol Handler Insecure Loading1MEDIUMHTTP: Inout Article Base Ultimate Cross Site Request Forgery1MEDIUMHTTP: Sysax Multi Server Function Buffer Overflow1MEDIUMHTTP: Alt-N WebAdmin USER Buffer Overflow1MEDIUMHTTP: Ruby Gem Multiple Wrappers Command Injection1MEDIUMHTTP: Adobe RoboHelp Server SQL Injection Vulnerability1MEDIUMHTTP: Multiple Web Browsers Window Injection1MEDIUMHTTP: Microsoft .NET Framework Heap Corruption1MEDIUMHTTP: Localhost Host Header in Trans-Internet Request1MEDIUMHTTP: Microsoft Windows Folder GUID Code Execution1MEDIUMHTTP: Apple CUPS SGI Image Format Decoding imagetops Filter Buffer Overflow1MEDIUMHTTP: Ruby on Rails XML Parameter Parsing Remote Code Execution1MEDIUMHTTP: Easy LAN Folder Share .reg FIle Parsing Buffer Overflow1MEDIUMHTTP: Ruby on Rails JSON YAML Parsing Remote Code Execution1MEDIUMHTTP: Oracle Exploit Kit Angler Java1MEDIUMHTTP: Microsoft .NET Framework XAML Browser Applications Stack Corruption1MEDIUMHTTP: XAMPP Request Forgery Attempt1MEDIUMHTTP: HP LaserJet Pro Printers Remote Information Disclosure1MEDIUMHTTP: GD Graphics Library PNG Buffer Overflow1MEDIUMHTTP: Wordpress FGallery Plugin Malicious File Hosting1MEDIUMHTTP: UltraVNC VNCLog Buffer Overflow1MEDIUMHTTP: WireLurker Serial Number Upload Detected1MEDIUMHTTP: ManageEngine Multiple Products FailOverHelperServlet copyfile Information Disclosure1MEDIUMHTTP: Attachmate Reflection FTP Client ActiveX CE1MEDIUMHTTP: ContentKeeper Web Appliance benetool Remote Command Execution1HIGHDNS: ISC BIND openpgpkey Denial of ServiceMEDIUMHTTP: Apple QuickTime JPEG Atom Buffer Overflow 2MEDIUMHTTP: Apple QuickTime JPEG Atom Buffer Overflow 3HIGHHTTP: Microsoft Publisher PLC Objects Remote Code Execution 1HIGHHTTP: Microsoft Publisher PLC Objects Remote Code Execution 2HIGHHTTP: Microsoft Publisher PLC Objects Remote Code Execution 3MEDIUMHTTP: Invalid ANI Block Size Parameter in Stream (2)2MEDIUMHTTP: Invalid ANI Block Size Parameter in Stream (2)3HIGHHTTP: Adobe Flash Player null Reference Memory Corruption1HIGHHTTP: Microsoft PowerPoint 0xFB1 Parsing Buffer Overflow1HIGHHTTP: Adobe Flash Player null Reference Memory Corruption2HIGHHTTP: Adobe Flash Player null Reference Memory Corruption3HIGHHTTP: Microsoft PowerPoint 0xFB1 Parsing Buffer Overflow2HIGHHTTP: Microsoft PowerPoint 0xFB1 Parsing Buffer Overflow3MEDIUMHTTP: Google Chrome HTTP Response Handling Memory Corruption 2MEDIUMHTTP: Google Chrome HTTP Response Handling Memory Corruption 3HIGHHTTP: Microsoft Office OneNote 2010 Buffer Size Validation2HIGHHTTP: Avira Management Console Server HTTP Header Processing Heap Buffer OverflowHIGHDNS: ISC BIND DNSSEC Key Parsing Buffer Denial of ServiceHIGHHTTP: DHTML Object Handling Race Condition1HIGHHTTP: KingView KChartXY.ocx Unsafe ActiveX Control1MEDIUMHTTP: Microsoft IE MHTMLFile NULL De
Read MoreI recently read the book Machines of Loving Grace: The Quest for Common Ground Between Humans and Robots by John Markoff, a technology and science reporter at the New York Times. This is a good book that goes over the history of the development of automation in the 1950s and 1960s, and takes you to the current day where new robotic developments from Apple (Siri) and Google (driverless cars) put us in the another age of rapid change.
Read MoreIt’s a Team Effort: Developing a Culture of Cybersecurity in the Workplace Cyber threats today are evolving, becoming more sophisticated and making it critical for organizations to educate, implement and encourage employees to follow cyber best practices. In a recent RAND Corporation report, sponsored by Juniper Networks, it was projected that the cost to businesses in managing cybersecurity risk is set to increase 38 percent over the next 10 years. Copyright © 1996-2013 Juniper Networks, Inc. All rights reserved Update preferences
Read More