Update: Apple responded with a press release on April 27, 2011
Read More »
Tags: mobility, privacy, security
Yes, the question is “Are you really secure?” Now that I’ve asked a loaded question, let me get to the point.
The term “secure” sure has a lot of different meanings depending on the context in which it is used. If we take it from a corporate security perspective, your options are somewhat limited to physical security, as in video surveillance or physical access, or logical security, as in your laptop or data access. But, when you ask a security professional if they are secure, they will most certainly take that in the context of what they can control, and will most likely answer “yes”.
Well, what about the things you cannot control? You can control which products you buy to provide security, you control how they are installed and configured, and you control the processes and procedures that identify how they are managed and updated. But, can you control how they are manufactured?
Read More »
Tags: cloud security, cyber security, cybercrime, data center, information security, network security, privacy, RSA, secure information, secure-id, security, virtualization
There is a new Whitepaper out on the Next-Generation Cryptography called “Suite B” for Government that will enable a new level of secure communications and collaboration.
The Suite B set of cryptographic algorithms has become the preferred global standard for ensuring the security and integrity of information shared over non-trusted networks. This white paper, intended for public sector IT professionals, explains that:
- Suite B combines four well established public domain cryptographic algorithms
- The Internet Engineering TaskForce (IETF) has established open standards for commercial products using Suite B, helping organizations adopt it with confidence
- Cisco has introduced an IPsec-based implementation of Suite B cryptography in its VPN products
There is a nice quote from David McGrew – Cisco Fellow
“Open and freely implementable cryptography standards are indispensable to global information security. By not asserting patent rights with the Galois/Counter Mode of operation, Cisco has taken an active role in helping Suite B standards remain open.”
For an understanding of Suite B, you may download the Whitepaper here.
Tags: Cisco, cryptography, security, suite b
In the previous installment of our series of IPv6 security posts, we covered some of the basic things you need to consider when securing your IPv6 network. In this post, we’ll talk about some of the things to consider when performing security testing on your IPv6 product or network. This testing is useful whether you are developing an IPv6 application or simply deploying IPv6 on your network.
Increased Setup Time
Start with an IPv6 environment in which most people do not have a lot of experience. Next throw in the typical dual stack configurations, and it is almost guaranteed that any IPv6 security testing that you perform is likely to take longer than it took you in your IPv4 environment. With dual stack configurations, both IPv4 and IPv6 are viable traffic paths. Therefore, just making sure that your test traffic is actually using IPv6 is one of the first hurdles you will face. So when developing your schedules for performing IPv6 security testing, always allow a little extra time to account for those problems that will almost certainly appear.
Read More »
Tags: IPv6, security, security testing
Today is Earth Day, and that has me thinking green. As I discussed this afternoon at GigaOm’s Green: Net conference, the world is changing around us in many ways, including becoming more urbanized. Over the next five years, some 500 million people will be added to the world’s cities. As we think about how to manage the energy and environmental challenges that will accompany these trends, what role will the network play in helping us be more efficient and more sustainable? And what benefits will that bring to utilities and to consumers, to governments and communities at large?
Cities consume 75 percent of the world’s energy and are responsible for 80 percent of greenhouse gas emissions. Utilities and the energy infrastructure are at the heart of city planning. If we are to better manage this impact, we must transform our electrical grid into a modern and more sustainable platform for the 21st century. Technology is the only way we can achieve balanced and sustainable growth.
Lessons in how to make our electric grids more reliable, more secure and more scalable can be gleaned from our experience in vastly revamping the telecommunications infrastructure in the ‘90s. Here too we had somewhat proprietary, siloed networks that didn’t talk to one another. Here too we had an industry that was highly regulated and needed to cautiously implement change. And here too we had an emerging field of companies chomping at the bit to capitalize on making the new telecomm infrastructure everything it could be.
The lessons we learned from this transition are important: architect the infrastructure on open, standards-based technology; build in security from the beginning; and establish public- private partnerships to align policy with infrastructure investment needs.
This transformation will rely on new technologies but also on leveraging existing technologies such as routing and switching for a utility environment. Data centers, cloud computing and security have a role to play in managing and protecting the vast influx of usage data so that we can make better educated decisions about energy consumption. Energy management of businesses and homes will leverage the existing networks extend their reach and impact. And given that the entire grid is the world’s largest infrastructure, integrating energy infrastructure with information technology will require a disciplined, architectural approach that we can only begin to foresee.
This transition has great implications, especially in our largest cities, where the need is most apparent. Examples are cropping up around the world of this vision in action. The Envision Charlotte initiative has set a goal of reducing energy use by up to 20 percent within its perimeter through greater education of citizens and use of information technology. BC Hydro in Vancouver just announced that it will roll out 1.8 million smart meters based on Itron’s OpenWay technology, powered by Cisco, to enable a more efficient grid and foster the use of renewable energy. And the city of Incheon, Korea is building in sustainability from the ground up.
These are but a few of the examples of how cities are changing, based on their energy and environmental goals. As I look around today, I see a smarter, more connected world emerging with a more intelligent and efficient energy infrastructure, supporting millions of customers, and billions of watts, with one network at the core
Tags: Cisco, Cloud Computing, data center, energy efficiency, environment, Green Technology, security, technology