In the study of Machine Learning, the focus is on supervised and unsupervised learning. (We will not be considering deep learning in this article.) Supervised learning, and many aspects of unsupervised learning, require the known anomalies to be available to learn from and then predict anomalies in test data using the trained models and then fine tune them through techniques such as cross-validation. In cybersecurity, one is usually looking for an anomaly in the midst of a huge amount of normal traffic or behavior. Such…
This scenario should sound familiar to you: You’ve been running IT organizations for what seems like forever and while you work tirelessly to make sure the network is working right, that everyone can access the network at all times, and that network traffic goes where it needs to when it needs to be there, the fact that you can’t control every nuance can be frustrating and impeding to your service level objectives. There’s a certain lack of control when it comes to managing WAN links…
The concept of segmentation has existed ever since we started connecting data centers to each other. In the early days, firewalls controlled what was able to get in from the outside. Perimeter firewalls are still a critical part of protecting the data center and that will never go away, despite the dissolving perimeter. As networks became more complex, we saw the concept of segmentation move inside with VLANs creating segments for the right size broadcast zones to ensure network performance. For more granular control, we’ve…
Security threats continue to increase exponentially in volume and in risk. According to a recent CBR article, cybercrime is expected to cost the world more than $2 trillion by 2019. Developers are creating applications more frequently and many are migrating them between different clouds for business agility. The greater volume and dynamic nature of applications make businesses more vulnerable. In fact, Microsoft predicts that we will be writing 111 billion lines of new code every year that will generate 50 times more data volume by…
by Calvin Rowland The whole tech industry is abuzz with talk of multi-cloud environments. Survey after survey shows definitively that the race is on to a multi-cloud world. In fact, according to IDC, 30%[1] or more of organizations have already migrated or have plans to migrate literally every workload to the cloud. Further, 85%[2] of large businesses will be committed by 2018 to multi-cloud strategies as IT continues to transform.
by Manuel Nedbal “Micro-segmentation” has rapidly become the de facto term invoked when cloud and virtualization teams start talking risk, compliance and security policy for highly virtualized or Cloud infrastructure environments. Yet while this important concept provides a foundation upon which security may be applied, by itself, it does not constitute enterprise-class security. It is simply a foundation, a first step.
by Atchison Frazer Back in 2015, we offered some popular advice on “how to create a virtual WAN” (VWAN), a concept that was widely covered in the media at the time as a game-changing alternative to MPLS. However, the name quickly became outdated, as discussions about the future of networking shifted to software-defined WANs (SD-WANs) and hybrid WANs that actually complement MPLS. Today, the VWAN descriptor is rarely used, except as an occasional synonym for SD-WAN.
During the spring 2017 ONUG general meeting, at the conclusion of the Monitoring and Analytics (M&A) panel, a member of the audience commented, “We are already collecting a lot of data; and, you are telling us to collect even more?” His point was well understood by the panel members and the audience: there is a total cost of ownership associate with all that collection that is spiraling out of control.
by Hari Krishnan The threat landscape is getting more sophisticated with the rise of ransomware, web based malware, botnets and phishing emails resulting in significant financial loss and data breaches. Recent malware like WannaCry ransomware that used lateral movement shows the importance of ensuring proper segmentation both at the branch and datacenter to contain lateral spread and the need for a new analytics based approach to detect and respond to these zero-day attacks. Recent massive data breach at Equifax Is a reminder to organizations on…
by Nick Lippis It’s clear that Amazon, Google, Microsoft, Oracle and other cloud providers are building out their services at speed to keep up with demand. In that process, and mostly due out of necessity, they are building their own cloud stacks. That is, each cloud is proprietary and will be so for a very long time.