A Call for Open Cybersecurity Middleware
  • Published in

While attending Splunk.conf 15, I sat in on an interesting presentation given by Christof Jungo, head of security architecture and engineering at Swisscom.

Read More
Mobile is Here....Are you Ready?
  • Published in

Mobile is Here....Are you Ready? Mobile data traffic is expected to grow at a CAGR of around 45 percent between 2013 and 2019, resulting in a 10-fold increase over that time span...learn more about how mobile traffic will impact your network in this new infographic. Copyright © 1996-2013 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences                    

Read More
Media Advisory: Juniper Networks Demonstrates Latest VMware Integrations for Simplified Network Security and Automation at VMworld 2015 Europe
  • Published in

Dateline City: SUNNYVALE, Calif. SUNNYVALE, Calif.--(BUSINESS WIRE)--Juniper Networks (NYSE:JNPR), the industry leader in network innovation, today announced details regarding its upcoming participation at VMworld 2015 Europe, VMware’s annual regional user conference and exhibition, October 12-15 at the Fira Gran Via, Barcelona. Juniper Networks is a Gold Sponsor and will be located at exhibition booth G318. Language: English Contact: Juniper NetworksPenny Still, +44 1372 385 692pstill@juniper.net Ticker Slug: Ticker: JNPR Exchange: NYSE read more                    

Read More
Can A Pure Storage Company Make It Big?
  • Published in

There has been a lot of time and [electronic] ink expended of late in the build-up to, and eventual launch of, the Pure IPO yesterday. Most of the commentary has concentrated on the valuation and stock trading zone. As I write this, the stock price has floated down softly to around $15.50, off from the offering starting point of $17 per share. The financial press headlines contain plenty of words like disappointing and failed to impress. Moreover, they talk of the impact of this unicorn IPO on the appetite and enthusiasm for tech IPOs. In other words, its a very parochial Wall Street view. And frankly, thats where the focus is misplaced, at least from the storage and IT market perspective. Now, I am not here to suggest that the share price is irrelevant or that many people wouldnt have been happier to see a more robust start for PSTG shares. But theres a more significant set of considerations from a technology, industry and end-user perspective.

Read More
Service Provider Problems with Analytics Tools

Gigamon Director of Service Provider Solutions Andy Huckridge recently spoke at the Telecom Council Innovation Meeting in Mountain View, CA. See how Gigamon solves the problem of the combination of decreasing ARPU/bit, exponentially increasing big data, and the limited ability of analytics tools to scale. For more information, read about the Triple Challenge of Network […] The post Service Provider Problems with Analytics Tools appeared first on Gigamon Blog.

Read More
Signature Update #2543

Signature Update #2543 247 new signatures:HIGHHTTP: Typo3 CMS SanitizeLocalUrl Cross-Site ScriptingMEDIUMHTTP: Static HTTP Server ini File Parsing Buffer Overflow1HIGHHTTP: Novell ZENworks Mobile Management Cross-Site ScriptingMEDIUMHTTP: Integard Home and Pro Password Remote Version Check1MEDIUMHTTP: VLC HTTPD Connection Header Format String1HIGHHTTP: Ignite Realtime Openfire group-summary.jsp Cross-Site ScriptingMEDIUMHTTP: ntop Basic Authorization Denial of Service1MEDIUMHTTP: PHPWiki CVE-2014-5519 Ploticus Arbitratu Code Execution1MEDIUMHTTP: Sun Java System Web Server JSP Source Code Disclosure1MEDIUMHTTP: ESTsoft ALZip MIM File Processing Buffer Overflow1MEDIUMHTTP: Maxthon History Cross Site Scripting1MEDIUMHTTP: Digium Asterisk Management Interface HTTP Digest Authentication Stack Buffer Overflow1MEDIUMHTTP: Adobe Flash Player Privilege Escalation1MEDIUMHTTP:Multiple Product XML External Entity Injection1MEDIUMHTTP: Wordpress W3 Total Cache Plugin Remote Code Execution1MEDIUMHTTP: Microsoft ASP.NET Post Request Parameters Handling Denial of Service1MEDIUMHTTP: Suspicious WIPER/SHAMOON Infected File Download1MEDIUMHTTP: XnView mbm File Parsing Buffer Overflow1MEDIUMHTTP: Microsoft Telnet Protocol Handler Insecure Loading1MEDIUMHTTP: Inout Article Base Ultimate Cross Site Request Forgery1MEDIUMHTTP: Sysax Multi Server Function Buffer Overflow1MEDIUMHTTP: Alt-N WebAdmin USER Buffer Overflow1MEDIUMHTTP: Ruby Gem Multiple Wrappers Command Injection1MEDIUMHTTP: Adobe RoboHelp Server SQL Injection Vulnerability1MEDIUMHTTP: Multiple Web Browsers Window Injection1MEDIUMHTTP: Microsoft .NET Framework Heap Corruption1MEDIUMHTTP: Localhost Host Header in Trans-Internet Request1MEDIUMHTTP: Microsoft Windows Folder GUID Code Execution1MEDIUMHTTP: Apple CUPS SGI Image Format Decoding imagetops Filter Buffer Overflow1MEDIUMHTTP: Ruby on Rails XML Parameter Parsing Remote Code Execution1MEDIUMHTTP: Easy LAN Folder Share .reg FIle Parsing Buffer Overflow1MEDIUMHTTP: Ruby on Rails JSON YAML Parsing Remote Code Execution1MEDIUMHTTP: Oracle Exploit Kit Angler Java1MEDIUMHTTP: Microsoft .NET Framework XAML Browser Applications Stack Corruption1MEDIUMHTTP: XAMPP Request Forgery Attempt1MEDIUMHTTP: HP LaserJet Pro Printers Remote Information Disclosure1MEDIUMHTTP: GD Graphics Library PNG Buffer Overflow1MEDIUMHTTP: Wordpress FGallery Plugin Malicious File Hosting1MEDIUMHTTP: UltraVNC VNCLog Buffer Overflow1MEDIUMHTTP: WireLurker Serial Number Upload Detected1MEDIUMHTTP: ManageEngine Multiple Products FailOverHelperServlet copyfile Information Disclosure1MEDIUMHTTP: Attachmate Reflection FTP Client ActiveX CE1MEDIUMHTTP: ContentKeeper Web Appliance benetool Remote Command Execution1HIGHDNS: ISC BIND openpgpkey Denial of ServiceMEDIUMHTTP: Apple QuickTime JPEG Atom Buffer Overflow 2MEDIUMHTTP: Apple QuickTime JPEG Atom Buffer Overflow 3HIGHHTTP: Microsoft Publisher PLC Objects Remote Code Execution 1HIGHHTTP: Microsoft Publisher PLC Objects Remote Code Execution 2HIGHHTTP: Microsoft Publisher PLC Objects Remote Code Execution 3MEDIUMHTTP: Invalid ANI Block Size Parameter in Stream (2)2MEDIUMHTTP: Invalid ANI Block Size Parameter in Stream (2)3HIGHHTTP: Adobe Flash Player null Reference Memory Corruption1HIGHHTTP: Microsoft PowerPoint 0xFB1 Parsing Buffer Overflow1HIGHHTTP: Adobe Flash Player null Reference Memory Corruption2HIGHHTTP: Adobe Flash Player null Reference Memory Corruption3HIGHHTTP: Microsoft PowerPoint 0xFB1 Parsing Buffer Overflow2HIGHHTTP: Microsoft PowerPoint 0xFB1 Parsing Buffer Overflow3MEDIUMHTTP: Google Chrome HTTP Response Handling Memory Corruption 2MEDIUMHTTP: Google Chrome HTTP Response Handling Memory Corruption 3HIGHHTTP: Microsoft Office OneNote 2010 Buffer Size Validation2HIGHHTTP: Avira Management Console Server HTTP Header Processing Heap Buffer OverflowHIGHDNS: ISC BIND DNSSEC Key Parsing Buffer Denial of ServiceHIGHHTTP: DHTML Object Handling Race Condition1HIGHHTTP: KingView KChartXY.ocx Unsafe ActiveX Control1MEDIUMHTTP: Microsoft IE MHTMLFile NULL De

Read More
Networking: Intelligence Augmentation vs. Artificial Intelligence

I recently read the book Machines of Loving Grace: The Quest for Common Ground Between Humans and Robots by John Markoff, a technology and science reporter at the New York Times. This is a good book that goes over the history of the development of automation in the 1950s and 1960s, and takes you to the current day where new robotic developments from Apple (Siri) and Google (driverless cars) put us in the another age of rapid change.

Read More
It’s a Team Effort: Developing a Culture of Cybersecurity in the Workplace

It’s a Team Effort: Developing a Culture of Cybersecurity in the Workplace Cyber threats today are evolving, becoming more sophisticated and making it critical for organizations to educate, implement and encourage employees to follow cyber best practices. In a recent RAND Corporation report, sponsored by Juniper Networks, it was projected that the cost to businesses in managing cybersecurity risk is set to increase 38 percent over the next 10 years. Copyright © 1996-2013 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences                    

Read More
Junos 14.1 FIPS 140-2 Certification is Most Comprehensive Certification Yet

Junos 14.1 FIPS 140-2 Certification is Most Comprehensive Certification Yet I am pleased to report that the National Institute of Standards and Technology (NIST) has issued a Federal Information Processing Standard (FIPS) 140-2 Certification of the following Juniper Networks devices with Junos 14.1R4 software.   EX9204, EX9208, EX9216 M7i, M10i, M120, M320 MX240, MX480, MX960, MX2010, MX2020 PTX3000, PTX5000 T640, T1600, T4000   The FIPS certification is #2451.   This is a first time FIPS certification for the EX9200 and the PTX devices and a recertification for the M, MX, and T-series devices.  This is Juniper Network’s 56th FIPS certification and this is the most comprehensive single FIPS certification completed to date.   FIPS Certification continues to be challenging as NIST requirements evolve including the deprecation of cryptographic algorithms that were once approved and increased focus on important cryptography elements like maintaining sufficient entropy and using strong deterministic random bit generators (DRBG).   Copyright © 1996-2013 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences                    

Read More
U.S. Critical Infrastructure Continue to Make Risky IT Bets

When the term “critical infrastructure” is mentioned in conversation, thoughts immediately turn to things like electrical power plants, oil and gas pipelines, food, water, etc. You know, the foundational services of modern life that we all take for granted. These are the same industries that former Defense Secretary Leon Panetta was referring to when he warned of the possibility of a “cyber-Pearl Harbor” back in 2012.  Panetta stated:

Read More
IBM Gets Clever(safe) to Broaden Cloud Offerings

Yesterday IBM announced its intent to acquire Cleversafe, a Chicago-based object storage vendor. This is a great move for IBM and certainly fills some gaps in the portfolio for the cloud business. Thats because object storage is likely the next big storage technology wave that will house the massive amounts of unstructured data we are generating today, and the even more massive amounts we will be generating in the future.

Read More
Amazon AWS and Rackspace - A Cloud Hole-in-one?

Francis Ouimet had Eddy Lowery, Tiger Woods had Steve Williams, Jordan Spieth has Michael Greller, and now AWS users have…Rackspace?  Behind every golf phenom is a silent partner. That even keel caddy that brings the right blend of wit, wisdom and instinctual insight and advice to help propel his or her wunderkind to the top of the leader board. Like these unsung heroes of the fairway, Rackspace too is now bringing caddy-like concierge services to bear to help businesses leverage AWS for grand slam success in the cloud.

Read More

Videos

Jurg van Vliet, CEO of Aknostic, discusses the emergence of regional clouds within Europe, based on open source software and Kubernetes in particular, as an alternative to the large public cloud offerings. Trial projects are in progress to demonstrate the economic, environmental and societal benefits that such regional clouds can provide.
n this video, we talk to RED Engineering at Data Centre Transformation 2023.
Stephane Cardot, Director of Pre-Sales EMEA at Quantum, describes the problems with legacy NAS systems, explains how the company’s Myriad storage solution has been designed to address them, and also shares updates on the latest version of the Unified Surveillance Platform, as well as some future plans.
David Protzmann, NinjaOne’s Senior Director of Marketing EMEA, explains how the company’s Unified IT platform provided major benefits to customer Focus IT Managed Services, before detailing the technology solutions and comprehensive support programme that NinjaOne provides all of its MSP customers.

News

New collaboration delivers improved performance for private cellular networks in hard-to-reach locations.
78% of businesses aim to solve customer data problems.
Telehouse has officially opened its first Thai data centre at the prime location of Rama 9 in Bangkok with an investment of US$74 million or about THB 2.5 billion, aiming to create the connectivity ecosystem and becoming the first purpose-built data centre to achieve 100% power supply by renewable energy in Thailand.
Software leader for IT service providers also announced new partnerships, product integrations and security services at its annual security conference.