Posts about Network Security

NETCONF Call Home, or reverse secure socket shell (SSH), is a technique that enables network functions virtualization (NFV) and software-defined networking (SDN) devices to establish a connection to a service provider control systems and protects the virtual customer premises equipment (vCPE), usually deployed behind a cable modem or a firewall ...
Read the full post
Beginning a post on cyber security with the observation that the threat being discussed is frightening is a bit redundant. They all are frightening. Very often, today’s threats are more dangerous because they are a mix of multiple things that, when combined, are more potent than the sum of their parts. In this case, four elements are present: botnets, DDoS attacks, the internet of things (IoT) and connected consumer electronics equipment. Put together, these inexpensive ingredients are enough to threaten the internet …
Read the full post
Unsecure edge devices are challenging our economies and our societies. We have experienced major hacking attacks on edge devices such as cameras and DSL routers. Both attacks targeted thousands of servers at the network edge by building a botnet for the orchestration of unprecedented denial of service attacks ...
Read the full post
The world of cybersecurity is a scary one. It’s especially so when it comes to vehicles. The reason is simple: In other areas of security, the end game generally is lost money or the inconvenience of getting a new credit card. In vehicle hacking, what’s at stake can actually be physical safety. It’s bad enough to lose a few bucks. It’s quite another thing to lose one’s brakes ...
Read the full post
For this post, Michael Ritter and I talked with Peter Klostermaier of Computacenter about the need to integrate the five areas of security, the importance of protecting data as it leaves the premises and how the “Snowden effect” has changed attitudes to data protection ...
Read the full post