article thumbnail

IDG Contributor Network: The new branch office SD-WAN model

Network World

Wrapping up an SD-WAN workshop session with a client last week, I reflected on how rapidly the branch office WAN connectivity and management model is changing. Some great opportunities are emerging for enterprise IT teams that can materially impact how the network is designed, paid for and managed. Here are some thoughts: 1.

WAN 64
article thumbnail

Guidance Software Federal Summit 6 March 2014

CTOvision

The summit features presentations, panel discussions, and workshops on up-to-the-minute trends and issues faced by those in charge of sharing, analyzing, and defending government data through Enterprise Forensics, E-Discovery and Cybersecurity in the U.S. He received a promotion to lieutenant general on March 25, 2011. Cyber Security'

Software 257
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Hacker Mind Podcast: Cyber Ranges

ForAllSecure

I met up again with him a few years later when I went to a writer's workshop -- but that’s another story. Anyway, what if there was a way to simulate attacks on your networks. A red team would be the enemy and they’d study your network and try to exploit any weaknesses. Yeah, there’s red teams.

Banking 40
article thumbnail

Technology Short Take #32

Scott Lowe

I try to keep the information linked to data center technologies like networking, storage, virtualization, and the like, but occasionally other items slip through. Networking. Ranga Maddipudi ( @vCloudNetSec on Twitter) has put together two blog posts on vCloud Networking and Security’s App Firewall ( part 1 and part 2 ).

Vmware 109
article thumbnail

4 tips to improve employee experiences while maintaining security and governance

CIO Business Intelligence

That’s the question we posed to the CIO Experts Network, a community of IT professionals, industry analysts, and other influencers. As more individuals use browser-based apps to get their work done, IT leaders need to provide seamless access to corporate apps and tools while minimizing security risks. Here are their top tips.

article thumbnail

The Hacker Mind Podcast: Beyond MITRE ATT&CK

ForAllSecure

And so think about what a bad guy could do in your network for half a year plus, right, that's, that's not a good feeling and so we start up the research project to try to say okay well what can we do to defend against the adversary once right. Rather than -- I need a firewall -- maybe ATT&CK suggests a specific type of firewall.

Tools 40
article thumbnail

The Hacker Mind Podcast: The Gentle Art of Lockpicking

ForAllSecure

To start, challenges, and workshop tables. Within infosec, where so many challenges that are intangible -- like configuring network or firewalls. So these informal sessions were always part of the hacker culture, but it was really fella named Kai and his friend doc and some other people from Colorado in the 719 area code day.

Tools 52