Cisco Blogs

Cisco Blog > Security

Features, Bugs, and Backdoors: The Differences, How Language Can Be (Mis)Used, And A Word Of Caution

Language is a powerful tool.

With acronyms like ACL, IPS/IDS, and APT*, the security world has created its own language, acronyms, and catchphrases. In our industry, sometimes the meaning of more commonly used words can cause misunderstandings. For example, is a hacker a bad actor or a well-intentioned individual? Are all software bugs also security vulnerabilities? Can the terms feature, bug, and backdoor be used interchangeably?

A feature, a bug, or a backdoor might look like the same thing to some, but they are not. Imprecision in this area can breed misunderstandings. I believe that there are two key differences between a feature, a bug, and a backdoor: intent and transparency. Read More »

Tags: , , , , ,

OpenDaylight: Understanding the Value Propositions

The announcement today of OpenDaylight is big news.  Industry leading companies are partnering via Open Source to serve an emerging set of market needs:

  • Operators: want affordable real-time orchestration and operation of integrated virtual compute, application, and network.
  • Application Developers: want a single simple interface to the network.  Underlying details such as “router”, or “switch”, or “topology” can be a distraction they desire to abstract and simplify away.
  • Equipment Vendors: want a stable forum to interwork a plethora of Application interfaces with a plethora of nascent Network Device programmatic interfaces.

OpenDaylight members understand Read More »

Tags: , , , , , , , , , ,

Enterprise SDN: Moving from box boundaries to software boundaries

Enterprise trends driving SDN and Network Programmability are becoming clearer.  The skyrocketing number of virtual/cloud devices is making human configuration infeasible.  A natural result will be that networks will move from being integrated based on physical box boundaries to being integrated based on software boundaries.  Put another way, traditional box based network integration will be overwhelmed by device proliferation.  Therefore businesses must adopt new approaches to device configuration and control.  This will include a new layer of network software which will instantiate, orchestrate, and dismantle virtual networks.

But what does this really mean?  Read More »

Tags: , , , , , , , , , , ,