Sunday, 15 April 2018

ACI loves KVM and Red Hat Virtualization

Cisco ACI has provided integration with KVM in OpenStack environments quite for some time now. OpenStack is a great technology to implement Infrastructure-as-a-Service (Iaas) with uses cases for Private, Public and Telco clouds. But indeed Openstack provides a cloud platform, tailored to “cattle-type” of workloads, as opposed to “pet-type” workloads.

Wednesday, 11 April 2018

Redefining Security for the Modern Data Center in a Multicloud World

Global security challenges are ever-growing, especially with the rise of sophisticated threats. A growing concern for many of our customers is around security for today’s complex data centers. How do you keep data safe while you’re running applications in both on-prem data centers and in public, private, and hybrid clouds?

Friday, 6 April 2018

IcedID Banking Trojan teams up with Rovnix for distribution

In November 2017 security researchers reported a new banking Trojan known as “IcedID”. At the time of discovery IcedID was being distributed by Emotet. In late February and throughout March 2018 Cisco noticed an increase in IcedID infections being detected throughout the AMP ecosystem. Like in November 2017, some of the infections could be traced to Emotet, but this time, many detections could instead be traced to emails with attached malicious Microsoft Word documents containing macros. When the malicious documents are opened and the macros are enabled, Rovnix would be downloaded and executed, which subsequently downloads IcedID. In addition to Rovnix, many of the samples downloaded a second payload, a Bytecoin miner (Bytecoin is a crypto currency similar to Bitcoin).

Thursday, 5 April 2018

How to Deploy a UCS Manager Environment with Far Less Python Code

A co-worker sent me some infrastructure code to check out and get my opinion. The code was fine, but it was a lot of code… I mean a lot of code. Looking at the thousands of lines of purpose written code I started thinking that there could be a better way. The code was Python and used the UCS Python SDK to deploy a UCS Manager environment and it worked, it did everything it was supposed to do, but it did only those things.

Friday, 30 March 2018

Cisco UCS and HyperFlex for AI/ML Workloads in the Data Center

Data is the lifeblood of business. It helps drive deep insights and better decisions, improve processes, and offer a deeper understanding of customers, partners and business. Artificial intelligence and machine learning (AI/ML) enables us to learn from data, identify patterns and make better decisions that augment human capabilities. This provides businesses new ways to grow revenue, attract and retain customers and become more operationally efficient. Further, AI/ML can help automate tasks as well as accelerate untapped insight in previously unexplored areas. Almost all industries in every sector from banking to healthcare and manufacturing are trying to take advantage of these benefits.

Thursday, 29 March 2018

Cisco and Sentryo work together to help secure factory networks

Manufacturers, utilities, and oil & gas companies are using data and applications to improve business operations through smart manufacturing initiatives like Industrie 4.0.  To accomplish these benefits these companies recognize the need to converge their enterprise network and their factory networks with industrial Ethernet to gain a 360-degree view of their operations across a single network infrastructure. They also gain real-time network diagnostics and troubleshooting.

Wednesday, 28 March 2018

Shaping a Diverse and Stronger Cybersecurity Industry

Aside from scuba diving and working with Cisco customers to improve cyber resiliency, cooking is one of my greatest passions.  My favorite dishes are a fusion of the best ingredients, each complementing the other and accentuating the right flavors to achieve culinary heaven.  You see, if you stick with one ingredient, you are stuck with one flavor profile and the dish is left bland and unmemorable. It’s a similar issue with diversity in the cyber profession.