The time of year when crystal balls get a viewing and many pundits put out
their annual predictions for the coming year. Rather than thinking up my own,
I figured I’d regurgitate what many others are expecting to happen.
8 Predictions About How the Security Industry Will Fare in 2017 – An eWeek
slideshow looking at areas like IoT, ransomware, automated attacks and the
security skills shortage in the industry. Chris Preimesberger (@editingwhiz),
who does a monthly #eweekchat on twitter, covers many of the worries facing
10 IoT Predictions for 2017 – IoT was my number 1 in The Top 10, Top 10
Predictions for 2016 and no doubt, IoT will continue to cause havoc. People
focus so much on the ‘things’ themselves rather than the risk of an
internet connection. This list discusses how IoT will grow up in 2017, how
having a service component will be key, the com... (more)
I recently recovered from ACDF surgery where they remove a herniated or
degenerative disc in the neck and fuse the cervical bones above and below the
disk. My body had a huge vulnerability where one good shove or fender bender
could have ruptured my spinal cord. I had some items removed and added some
hardware and now my risk of injury is greatly reduced.
Breaches are occurring at a record pace, botnets are consuming IoT devices
and bandwidth, and the cloud is becoming a de-facto standard for many
companies. Vulnerabilities are often found at the intersection of all three
of these trends, so vulnerability and risk management has never been a
greater or more critical challenge for organizations.
Vulnerabilities come in all shapes and sizes but one thing that stays
constant – at least in computer security – is that a vulnerability is a
weakness which allows an attack... (more)
JANUARY 8, 2014 02:00 PM EST
When we talk about the impact of BYOD and BYOA and the Internet of Things, we
often focus on the impact on data center architectures. That's because there
will be an increasing need for authentication, for access control, for
security, for application delivery as the number of potential endpoints
(clients, devices, things) increases. That means scale in the data center.
What we gloss over, what we skip, is that before any of these "things" ever
makes a request to access an application it had to execute a DNS query.
Every. Single. Thing.
Maybe that's because we assume DNS can handle the load. So far it's done
well. You rarely, if ever, hear of disruptions or outages due directly to the
execution of DNS. Oh, there has been some issues with misconfiguration of DNS
and of exploitation of DNS (hijacking, illicit use in reflection attacks,
The digital society has emerged.
Today’s always-connected world and the applications we interact with are
changing the way we live. People are mobile, our devices are mobile, and by
all accounts, everything that is a noun – a person, place or thing – will
soon be connected and generating data… and all that traffic is destined for
an application – that could also be portable – located somewhere in a
But not all data traffic is created equally and critical information might
need some action that requires automation of the deployment process. At the
same time, organizations can’t afford to manually make policy adjustments
every time something needs attention. Automated coordination between
applications, data and infrastructure from provisioning to applying policies
and services which are in-line with business needs must be in place.
This is Orchestration.... (more)
A few years ago, those little iHome alarm clocks started to appear in hotel
rooms. Cool gadgets that you could mount your mobile phone to battery charge
or play the music on the device. We also had a few in our home. They worked
perfectly for the iPhone 4 since the connector was that 1 inch protruding
plug. When I got the iPhone6, those clocks instantly became useless.
Obsolete. At least the phone connector part lost its value.
I’ve been thinking about this for a while.
The rate of obsolescence. The state when an object, technology, service or
practice is no longer needed or wanted… even though it still may be in good
working order. E-waste is the fastest growing segment of the waste stream.
With the technological advances, not only are we buying the latest and
greatest electronics but we’re also dumping perfectly good, working devices
at silly rates. There was eve... (more)
With 2016 crossing the half way point, let’s take a look at some technology
trends thus far.
Breaches: Well, many databases are half empty due to the continued rash of
intrusions while the crooks are half full with our personal information.
According to the Identity Theft Resource Center (ITRC), there have been 522
breaches thus far in 2016 exposing almost 13,000,000 records. Many are health
care providers as our medical information is becoming the gold mine of stolen
info. Not really surprising since the health care wearable market is set to
explode in the coming years. Many of those wearables will be transmitting our
health data back to providers. There were also a bunch of very recognizable
names getting blasted in the media: IRS, Snapchat, Wendy’s and LinkedIn.
And the best advice we got? Don’t use the same password across multiple
sites. Updating passwords is ... (more)
For the month of June, DevCentral is highlighting our Programmability Month
and Codeshare Challenge. A fantastic opportunity to catch up on the power of
programmability and learn how the BIG-IP platform can transform your
infrastructure with a few lines of code.
Since my coding ability is still in the infancy stage, I thought of looking
at programmability from a different angle. Can we code a human?
First, the word ‘Programmability.’ According to multiple sources
including dictionary.com, it is derived from the adjective ‘Programmable’
or capable of being programmed. As a noun, it can be an electronic device
that can be programmed to perform specific tasks. We hear the word Program in
many different contexts – a plan of action to accomplish something, a
schedule of events, a television/entertainment program, a planned group of
activities for a purpose and so forth. ... (more)
With 2015 crossing the half way point, let’s take a look at some technology
trends thus far.
Breaches: Well, many databases are half empty due to the continued rash of
intrusions while the crooks are half full with our personal information. Data
breaches are on a record pace this year and according to the Identity Theft
Resource Center (ITRC), there have been 400 data incidents as of June 30,
2015. One more than this time last year. And, 117,576,693 records had been
compromised. ITRC also noted a 85% increase in the number of breaches within
the banking sector. From health care to government agencies to hotel chains
to universities and even Major League Baseball, breaches and attacks are now
a daily occurrence.
Cloud: Who would’ve thought back in 2008 that this cloud thing would now be
half full? Over the last couple years, the ‘cloud’ has become a very
viable op... (more)
F5 iApps are user-customizable frameworks for deploying applications that
enables you to ‘templatize’ sets of functionality on your F5 gear. You
can automate the process of adding virtual servers or build a custom iApp to
manage your iRules inventory.
Application ready templates were introduced in BIG-IP v10 and the goal was to
provide a wizard for the often deployed applications like Exchange,
SharePoint, Citrix, Oracle, VMware and so forth. This allowed the abstraction
some of the configuration details and reduced the human error when following
the pages of the thick deployment guides for those applications. Application
templates were great but there was no way to customize the template either
during the deployment or adjust it after.
Then came iApps®.
Introduced in TMOS v11, iApps is the current BIG-IP system framework for
deploying services-based, template-driv... (more)
F5 Networks on Wednesday announced that Rackspace chose F5 BIG-IP products as
the foundation for its innovative Cloud Connect service. Cloud Connect is a
hybrid architecture that allows customers to mix dedicated and cloud based
hosting platforms for scalability, flexibility, and efficiency. With an F5
BIG-IP solution, Rackspace customers can provision resources, secure and
manage network traffic, and balance workloads in real time among the two
"We chose BIG-IP as a cornerstone of Cloud Connect because with it, we can
make our customers' dedicated servers and cloud environments communicate
seamlessly with each other over a protected, private network," said Toby
Owen, Product Manager for Hybrid Hosting Solutions at Rackspace. "This
solution does much more than provide a physical connection; it allows
customers to take advantage of BIG-IP's intelligent... (more)
It's not the first time we've heard the statement that cloud can be too
expensive and I doubt it will be the last. This latest episode comes from
Alexei Rodriguez, Head of Ops at Evernote by way of Structure 2014:
Original Tweet: https://twitter.com/joeweinman/status/479769276027379712
It is important to note that this admission - like those in the past - have
come from what we call "web monsters." Web monsters are, as the name implies,
web-first (and usually only) organizations who have millions (or billions) of
users. Modern web monsters generally have only one application for which they
are responsible, a la Evernote, Netflix, Facebook, etc...
It is unlikely that most enterprises will encounter this same conundrum -
that of the cloud actually costing more than a DIY approach - for short-lived
projects. A marketing campaign, seasonal promotions and offerings, etc...... (more)