Posts about Transport Layer

When I was a kid, spying was something countries did to maintain the upper hand in war, trade negotiations, bragging rights and financial gain. The tools of the spy trade included listening/recording devices, super telephoto lenses, a submarine, a stylish and aloof international man or woman and, most importantly, a very fast car, plane or speed boat. At least, that’s what the James Bond movies led us all to believe ...
Read the full post
The healthcare industry has become increasingly exposed to cyberattacks. In 2015, 36% of compromised records were healthcare related, making it the number one industry for data breaches. Perhaps this should come as no surprise as confidential personal data from healthcare organizations is particularly lucrative for hackers. Criminals know it’s likely to include not only names and dates of birth but also insurance and financial information. And, thanks to the boom in cloud computing and application-based connectivity, there’s no longer one single point of entry for a hacker to access a company’s system ...
Read the full post
As mentioned in my last post, data center interconnect (DCI) is a growing market for the entire optical value chain – from carriers to optical component suppliers. Standard OTN, DWDM, Carrier Ethernet or legacy SONET/SDH platforms alone cannot address the high-bandwidth, low-power, low-cost and high-density demands of DCI. As a result, many network equipment manufacturers (NEMs) have developed specific solutions to address it. Some of the most common solutions are described below ...
Read the full post
Data security has become the key concern of businesses everywhere. Following last year’s high-profile breaches and the damage to reputation and revenue caused by the fallout, enterprises across the world are waking up to the fact that their networks are fundamentally insecure. For IT operators in all major organizations, protecting the integrity of their network is now the most significant challenge. They know that attacks can come from any direction, including from cyber criminals and secret service organizations who may be hacking into portals to steal data or simply eavesdropping on data sent over WANs to collect information such as unencrypted passwords. The other growing trend is to finally focus on protecting data as it moves outside the walls of organizations and data centers ...
Read the full post
If you read Carl Weinschenk’s recent blog post on network security, I suspect that you may have already cancelled all your online accounts, unplugged your computer and abandoned modern life. I was tempted to do the same. It was an alarming article. One that left little hope of building a safe and secure Internet. While I was reading it, I was reminded of a Marc Benioff interview I saw on Bloomberg. During the Q&A, Benioff stated that cybersecurity is an oxymoron and that the Internet is inherently insecure ...
Read the full post