Once computing becomes connected enough to the physical world that insecure software leads to deaths, we’ll start to see real security progress.
Startup Tempered Networks combines encryption, orchestration and the HIP protocol to create fine-grained secure networks for end point devices.
Why should you care how much a company spends on sales? Because the actual cost of selling products is paid for by the customer in the price of the product.
The Palo Alto User-ID feature is awesome as long as you can feed it IP-to-User mappings. PAN provides agents to do this which work in many environments, but not usually without Active Directory. I wrote RadiUID to perform this function in situations where all you have is RADIUS. UPDATE: RadiUID version 2.0.0 has been released […]
There is a trend in network monitoring toward Push Model (versus Pull Model) where network devices send metrics to a collector in a ‘netflow’ like fashion (read blog post of Matt Oswalt). It is up to the collector to interpret that data; no need to standardize what is being sent. The only agreement is on data format […]