Security

  • Insight Out: The Fundamentals of Using Data in Splunk

    Scott DeMoss  |  May 5, 2016
    In the last post on this topic, my fellow Splunk architect, Micah Montgomery, gave an overview of one of the most important parts of getting going with Splunk: Getting Data In. He outlined a basic process and framework to follow when you... Read more
  • Hardening Splunk Against SSLv3 POODLE Vulnerability Scans

    Luke Netto  |  April 25, 2016
    As a system administrator, it is part of the job to address the vulnerabilities that leave a network open to security incursions. When looking for these vulnerabilities, it’s not uncommon to find “false positives.” Vulnerability... Read more
  • Understanding Your Organization’s Role in Cloud Security

    Scott Hogg  |  March 8, 2016
    Whenever you stay in a hotel, you likely take certain things for granted, one of which is security. You expect that the management will have taken reasonable steps to keep guests and their valuables safe during their stay. You expect that no... Read more
  • Impressions from Cisco Live! Europe 2016 in Berlin

    Thomas Maier  |  February 24, 2016
    I had the opportunity to attend Cisco Live! Europe 2016 (CLEUR!), held February 15-19 in Berlin. A combination of meetings with customers and partners provided for some fortuitous Europe-bound timing. This wasn’t my first time to Live! but... Read more
  • Can SDN Switches Replace the Firewall?

    Scott Hogg  |  April 28, 2015
    One of my 2015 technology predictions was that more companies would start to deploy Software Defined Networking (SDN). Although the concept originated in the mid-1990s, SDN is finding an eager audience today as organizations seek a more... Read more
  • Identifying Vulnerabilities in Software Defined Networking (SDN) Layers

    Scott Hogg  |  November 5, 2014
    Software Defined Networking (SDN) is a new way of providing virtualized networking. As with any new technology, potential security vulnerabilities need to be anticipated and addressed as much as possible. Of course, we can only try to... Read more
  • Improved TLS / SSL Security with DANE

    Scott Hogg  |  April 22, 2014
    You may be familiar with the benefits of using DNSSEC to provide authentication and integrity for your DNS information.  DNSSEC is a lot like dental floss: we all know that it is good for our health, but few enterprise organizations... Read more
  • Handling the Heartbleed OpenSSL Vulnerability

    Scott Hogg  |  April 16, 2014
    Undoubtedly, you have heard about the Heartbleed security vulnerability that came to light on April 7, 2014. Heartbleed is the name given by the security researchers at Google and Codenomicon who discovered this weakness in the software code... Read more
  • Organizational Security Highlighted at GTRI’s Annual Sales Kickoff

    Dave Herrald  |  March 28, 2014
    Last week GTRI held its annual sales kickoff meeting in Denver, and I wanted to share some of my observations from the event.  First, it's important to understand that GTRI's kickoff is no ordinary sales meeting.  In fact, it felt more... Read more
  • Improved Network Security through DNS Inspection (Pt. 1)

    Scott Hogg  |  March 3, 2014
    Virtually all networked applications use Internet Protocol (IP) communications and rely extensively on the Domain Name System (DNS) to determine the IP address to connect. DNS provides the mapping of human-readable fully-qualified host names... Read more