Avatar

Vulnerabilities discovered by Talos

Talos is disclosing two denial of service vulnerabilities (CVE-2016-9036 & CVE-2016-9037) in Tarantool. Tarantool is an open-source lua-based application server. While primarily functioning as an application server, it is also capable of providing database-like features and providing an in-memory database which can be queried using a protocol based around the MsgPack serialization format. Tarantool is used by various service providers such as Mail.RU, or Badoo.

Read_More>>



Authors

Talos Group

Talos Security Intelligence & Research Group

Avatar

In Cisco Services, we are passionate about connecting the unconnected – so I’m always impressed when I see innovation aligned to this goal. And with service providers globally continually striving to differentiate their business, it’s also good to see how one person’s challenge becomes another person’s opportunity.

This year, I have developed a real interest in the challenges of rural broadband – generally the lack of – and how this impacts local economies in my own country. Closing the so-called “Digital Divide” is a focus for many governments around the globe, including the Scottish Government.  In this blog, I’ll discuss how local start-up service providers are innovating to help address these challenges in areas of poor internet provision.  One such company is Back of Beyond (BoB) Broadband – I love that name! – a Wireless Internet Service Provider (WISP) based in Oban, a small tourist town on the west coast of Scotland.  BoB Broadband are doing their bit to counter the challenges and impacts of country digitization that Cisco chairman John Chambers discusses in the video here:

When Coffee Shops Are Impacted by Digital Transformation ….

In Scotland, let’s be honest, we don’t have the best weather.  It rains. It rains a lot.  While this gives us some of the most beautiful eye-popping green scenery on the planet, it does leave you with a challenge when on holiday in Scotland: what to do when it rains!  Years ago I remember over-hearing an American tourist exclaiming “Gee, it’s raining again, time for more coffee and cake!”  Consequently, coffee and cake cafes could be classed, in my opinion, as the bedrock of the tourist economy in Scotland :-).  As I blogged earlier this year, in internet-poor areas, coffee shops in the West Highlands of Scotland are suffering because they are not able to offer good Wi-Fi experiences to their customers.  And when coffee and cake shops are impacted by poor internet provision, I’m suddenly interested in digital transformation, especially as I see Cisco chairman John Chambers’ predictions ring true in my own back yard.

Rural Broadband: It’s a Global Challenge

Rural broadband is a challenge for many countries: from the USA to Australia, it’s a contentious topic and major service providers and governments focus on investments in areas of high population.  What they are missing, however, is the opportunity to invest in areas where people go to – tourist areas – which may in fact be areas of low population.

Innovation in the Back of Beyond

Fibre to the Cabinet (FTTC) has arrived in a few areas of the West Highlands of the past year or two.  However availability and capacity are limited.  And many small businesses won’t be served any time soon, and when they are, speeds may be limited, especially when they are far from the cabinets: speeds will ultimately be throttled by the capability of the existing copper telephone lines running VDSL from the cabinet to customer premises.
BoB logo

Back of Beyond Broadband in Oban have spotted a market opportunity. They are deploying innovative low cost wireless technologies to deliver high speed broadband to customers in hard-to-reach areas.  These speeds can and will be faster than some of those offered elsewhere in the UK by the more traditional broadband providers, as the following diagram shows.

The Need for Speed!

BoB WiFi speeds now available in Oban
BoB Broadband speeds now available in Oban

The results are impressive, as shown in the figure on the right. Wow! Over 45 Mbps!  I wish I could get that from my FTTC internet – I’m in a town in (relatively) heavily populated central Scotland where I typically achieve only 26 Mbps download, but I see nowhere near the 49 Mbps upload in BoB’s first connection above.  And this is just the start: BoB are able to offer speeds of up to 300 Mbps to those local business with high capacity demands and a real need for speed!

Making It Happen

In life, we often see people and businesses who make things happen, those that watch things happen, and those that wonder what happened! BoB Broadband are in the “make it happen” category in my opinion.  They have identified new low cost wireless broadband equipment from Santa Clara, California-based Mimosa Wireless.  In hilly, mountainous and rural areas including the Scottish Highlands, many are recognizing that fixed wireline approaches to broadband provision are uneconomic, too slow to deliver, and that low cost wireless solutions offer the quickest route to high-speed broadband and community digital transformation.  BoB Broadband have invested in leased line capacity of 100Mbps (over a 1G bearer, with plans to rise to 500Mbps) of leased line capacity in their Oban HQ to get them started, and are setting up point-to-point connections to from subscribers to their HQ using the Mimosa near-line-of-sight technology.  BoB Broadband are now offering their service to consumers and business who aren’t being served by the more traditional broadband providers.

Business Need a Level Playing Field

WiFi with robust decent internet speed is a standard guest expectation in hotels and bars today. Business such as Scottish Pub of the Year 2014 and 5015 Barn Bar and the Cologin Chalets, both Cisco Meraki customers, are keenly awaiting the BoB rollout in their glen.  Their DSL connection struggles to achieve even 2 Mbps “…. which will never deliver the speed or bandwidth that we need for 22 properties and a busy pub and office. BoB WISP will get round the problems of our distance from the exchange and the lack of commercial fibre available in our Glen and will put us back into the frame to compete on a level playing field with the businesses in town.” said owner Linda Battison.

On the residential side, BoB customers have already experienced up to 20x speed increase over their DSL services.

Wrapping Up

Rural broadband is a challenge in many countries across the world.  It’s not just a problem – as Telecoms.com facetiously mentioned the other week – of tourists being able to upload their latest Facebook photos – poor internet provision causes queues are our ski centres, it impacts local hotels billing their customers, and it may soon start killing coffee shops in the West Highlands of Scotland.  I’m therefore delighted to see innovative new generation local service providers such as BoB Broadband take advantage of market opportunities.  They are deploying new technology and doing their bit to help their local communities avoid the impacts of country digitization, illustrating clearly that wireless internet service provider innovation is alive and well in (of all places!) the Scottish West Highlands!

Save



Authors

Stephen Speirs

SP Product Management

Cisco Customer Experience (CX)

Avatar

Diwalloween

For a company as large as Cisco, we truly feel like an interconnected family every day, but especially when the seasonal traditions from around the globe are celebrated! Celebrating holidays to ensure everyone feels included, we make it is not just about Christmas or Hanukah, Halloween or Diwali – for us, it’s Christmakahwaloween!

This year Diwali (one of the major festivals of Hinduism signifying the victory of light over darkness, good over evil, knowledge over ignorance, and hope over despair) and Halloween (a celebration before All Saints Day that includes trick-or-treating, costumes, and carving pumpkins) happened to fall on back to back days – October 30th and 31st.  Here at Cisco-Austin we saw this as a prime opportunity to blend these two wonderful holidays and create an unprecedented celebration called Diwalloween!

Our teams here like to have parties and initiatives that bring everyone together and strengthen our bonds….it’s a big reason to as why we feel so much like a family! When my “family” asked if we were celebrating both of these holidays, how could I say no? I started to think about how I could pull this off and still stay within our monthly budgets – it meant I had to get creative!

That’s when the idea came to me and Diwalloween was created.

Diwalloween2

With a little imagination and help from one of my Directors, Prasanthi Somepalli, we did it! Food was our first task to tackle – because what’s a party without food? It’s no secret that one of the best ways to share traditions with each other is through food! We asked our teams to bring in traditional Indian delicacies and ghoulish Halloween treats for Diwalloween – done! Our bellies would be filled with delicious noms!

Next, we moved on to the fun part of the party…the contest. Again, we wanted to incorporate the best of both holidays and so…a RangPumpCoo Contest was created. Teams of six were challenged to create a Rangoli picture, carve a pumpkin, and decorate a cookie that ALL fit into one theme. They had one hour to accomplish their RangPumpCoo and NO ONE disappointed. We had three great entries that left our judge scratching his head as he tried to pick just one winner!

Part of Ciscso’s People Deal Manifesto says, “We connect everything – people, process, data and things – and we use those connections to change our world for the better. We don’t just dream it, we do it every day.”

Diwalloween is a small but wonderful way to prove just that! We came together to create an event that combined the traditions of Diwali & Halloween in a way that made everyone feel included, happy, and appreciated for who they are and what they believe. It bonded us together, and even introduced some of us to new traditions.

As an Executive Administrator, I get to celebrate every day by coming to work at a place I love and making everyone smile. Cisco always embraces my creative spirit, and allows me to share this with my co-workers.

With the holiday season in full swing, let’s all take a moment to see how we can be more inclusive of one another and truly celebrate together! How are you celebrating your holiday season? What new traditions are you coming up with that enable everyone to celebrate together?  Tell us in the comments below, or share a photo on social media and tag #WeAreCisco!

 

Want to join a company that thinks every day is a reason to celebrate? We’re hiring!



Authors

Stephanie Mosher

Executive Assistant

EAS – Enterprise Access Switching

Avatar

Collecting a half-dozen engineers in a snowbound mountain cabin is a surprisingly effective way to get creative. So are Friday afternoon “break talks” with engineers lounging, connected by a video wall to coworkers in other locations. Fostering leading-edge innovation has always been top priority. Just as important in start-ups as it is for Fortune 100s.

An innovative workforce is no longer desirable for only “the few.” It is a necessity to stay relevant.

It’s not surprising that KPMG’s 2016 CEO Outlook showed that most CEOs feel the same. A significant majority indicate that they need to foster innovation in their organizations and proactively address the disruption in today’s business climate. The stakes are high.

  • Over 80% of CEOs surveyed are concerned whether their current products will be relevant to customers in three years.
  • Almost half believe their organizations will have transformed into significantly different entities by then.

That is disruption on an enormous scale. But, when every company must disrupt just to survive, disruption loses its meaning. It’s time for CEOs to aim higher, to enable their workforces to deliver creative ideas at the same time they’re “getting things done” – fast.

A create-and-do mindset gets the stuff done that helps companies grow. It improves retention, shareholder confidence and, importantly, customer satisfaction. An innovative idea is worth nothing if you don’t bring it to market and make sure it’s relevant to customers. Do is the new disrupt.

The Employee Complaint: More Mad Men than Iron Man

Most employees want to be innovative, but say they don’t have the tools and resources they need to get it done. According to Gallup, only 13% of adults feel engaged at work. That’s shocking! And even our most basic form of collaboration, meetings, works against innovation. Employees believe that 50% of meetings are wasted time – one out of two!

Forrester recently reported on the importance of the physical world in innovation. How well an employee works is impacted by their physical workspace, and employees want to be in innovative workspaces. Yet so many of the places we collaborate, like our meeting rooms, haven’t evolved in decades. Is your conference room more Mad Men than Iron Man?

Employees are of course right. Two billion of them globally use smartphones, touching them an average of 2,600 times per day as they do everything from navigating traffic to drawing to learning. The magic combination of hardware, software, and apps is our personal gateway to creating and doing. But workplace tools are not yet measuring up to this.

The Intersection of Psychology and Technology

For great products to take off, it takes the right timing of two forces coming together: psychology and technology. People need to be excited by the possibilities and the experience of using a product — the psychology. At the same time, the technology must be ready to provide an amazing experience.

A couple billion smartphone and tablet users have embraced the magical combination of hardware, software, and apps for creating and doing. I feel pretty confident in saying that the psychology was there to make the revolution happen.

That same combination has not been available for teams in the workplace. Getting it right presents an amazing opportunity to change the way we meet. And to enable an innovative workforce.

The collaboration industry has been taking small steps toward this intersection of technology and psychology for a long time. Register to watch live on January 24 as we make the leap.

Cisco Spark Event 1.24.17



Authors

OJ Winge

Senior Vice President & General Manager

Team Collaboration Group

Avatar

As I fly back from a few days visiting manufacturing facilities in Mexico, I wanted to share three things I learned on the trip:

Déjà vu – Parallel Between IT/India and Manufacturing/Mexico

Companies are investing heavily in manufacturing in Mexico. Driving north of Mexico City reminded me of a trip to Electronic City in Bangalore 10 years ago – the same feeling, just a different industry and different logos.

mexico-trip

Driving to E-City from Bangalore was a who-is-who of technology leaders. Every major technology company had their logos visible as new corporate campuses were popping up: Intel, Cisco, Microsoft, Google, Accenture… That is the same sense I got driving north of Mexico City as there are major manufacturing companies lining the highway: Ford, Colgate, Pirelli, Cummins, Daimler…

Better Together – Tightly Integrated Supply Chains

There is a tight interdependency in the supply chain of our two countries. The more we invest to strengthen those naturally interdependent connections, the better we are. After visiting the plants it was clear that the flow of products was required to create finished goods – i.e. perfumes manufactured in the US shipped to Mexico would be made into soaps, put in boxes with timber shipped from US, and built in plant across the street.

The attached report from ASU’s Center for Transborder Studies does an excellent job of laying out the facts on the value of the partnership.  “U.S. sales to Mexico are larger than all U.S. exports to Brazil, Russia, India and China combined, as well as all combined sales to Great Britain, France, Belgium and the Netherlands.”

Nobody Makes Better Guacamole – Just saying…

To learn more about the future of manufacturing check out our website:

page-cta-2

 



Authors

Randal Kenworthy

Director, Business Transformation

Manufacturing - CPG and Life Sciences Industry Lead

Avatar

Last week, I wrote about a multi-phased approach that can be used by school districts to create a vision for the use of technology on their campuses and positively manage change within the district.

Today, I want to specifically talk about one school district that used this vision planning process, Rochester City School District.

Using the five-step process, Rochester City School District set up an in-person session to bring leaders and students together in the community to draft their ideal technology experience using the Day in the Life exercise.

The Day in the Life scenes created through this collaborative process were extremely telling of the shared desire to introduce new technologies into the Rochester City schools, enhancing the experience and opportunities for students.

Screen Shot 2016-12-13 at 10.51.15 AM

The visions created by this district were created not by charismatic leaders or visionary vendors or geeky technicians, but by the students, teachers, and principals who work in the schools. It’s a user-centric approach. The value of collaboration among the small groups that brainstormed scenes for the Day in the Life formed the essential core of the process.

In Rochester, educators wanted to provide the best possible experience for students, which included a student portal, connectivity on school transportation, real time alerts and updates on classwork and extra-curricular activities, tools to aid in physical fitness and health and a school-to-school virtual mentor program.

Screen Shot 2016-12-13 at 10.50.54 AM

We found that the relationships built during the visioning process —between the CIO and the instructional leadership, between the teachers and the technical staff, and among all levels of the school community — have served to enable progress even in difficult times. Rochester City School District found that the process further demonstrated the commitment of the technology team to the larger instructional goals of the district.

So, what’s next for Rochester?

Picture1

We will use the vision as we conduct pilots of 1-to-1 learning in four schools, introduce blended learning offerings in two of these 1:1 schools, switch to digital textbooks in social studies and science, and set up student run help desks in each school.

Want to learn more about how Rochester City School District used the visioning process to transform their campuses through technology? Read more in this report.



Authors

Cynthia Temesi

Innovation Advisor

Country Digital Acceleration

Avatar

We’re at the cusp of a cloud data transformation, and there shouldn’t be any doubt that the cloud is going to take center stage in your data center planning.

Over the last few years, cloud adoption has evolved from an emerging technology to an established networking solution that is gradually gaining acceptance in enterprises.

When Cisco first launched its first Global Cloud Index report in 2015, we predicted that in four years, cloud traffic would account for most data center network traffic with the majority of workloads migrating to the cloud.
Image_1

 

Image 2

Our latest Cloud Index report, released earlier this month, continues to affirm this inexorable shift. From 2015 to 2020, cloud data center traffic will grow at a clip of about 30% year on year (see above charts). By 2020, the cloud will outpace traditional center growth with 92 per cent of workloads (see below workload distribution) processed by cloud data centers, data stored in data centers will quintuple by 2020 and 68 percent of the cloud workloads will be in public cloud data centers.

Image_3

What the numbers also indicate is that the cloud is becoming an essential scalable and flexible part of architecture for service providers of all types around the world.

We can expect network cloud traffic to double or treble each year for the next few years as service providers continue to simplify their technology infrastructures to achieve greater operational flexibilities and deliver more flexible services.

By 2020, Cisco’s Global Cloud index predicts that almost half of traffic, or 44 percent, within data centers will be supported by SDN/NFV platforms as operators strive for greater efficiencies.  SDN and NFV will help to flatten data center architectures and simplify traffic flows. Nearly 60 percent of global hyperscale data centers are expected to deploy SDN/NFV solutions.

With global IT spending becoming more cautious, many enterprises and service providers today need to balance between tight capital budgets, little or no head count growth and cope with a rising demand for IT services.

They need to revamp their business models and find new ways to automate processes, look for additional revenue streams, increase productivity, and scale resources up and down dynamically as the market requires.

As more organizations move to cloud and hybrid architectures, integrating their data center and cloud strategies will be critical to their IT transformation.

The question you need to ask is how the network infrastructure can deliver the agility and speed for their business to remain competitive?

By the end of 2017, Gartner predicts that nearly half of enterprise will have deployed a hybrid cloud environment. IDC in the same vein says 60% to 70% of enterprises’ IT infrastructure and software investments will be cloud based (private and public) by 2020.

I believe that the future will see a mix of workloads, with applications and data strung across public and private clouds as well as traditional on-premise, and hybrid infrastructures becoming an efficient way to host large applications in the cloud. When we shift from traditional to the cloud data center, IT needs to be provisioned as a service and be consumed only when required.

The signs are already there. Earlier this year, Netflix announced plans to shut down the last of its traditional data centers, a move that will make it one of the first of large global organizations to run all of its IT in the public cloud.

In time, we foresee a vibrant marketplace of clouds, and envision that there will be different types of clouds (public, private, virtual, and inter-clouds), and many different services (software, platform, and infrastructure) co-existing and delivered via the cloud.

To stay ahead, you need to ready your datacenter for a multicloud world.

Please watch our recent webinar here on the Global Cloud Index for APJ market.

 



Authors

Clayton Pyne

DIRECTOR OPERATIONS.SALES

Avatar

Today, global headlines are focused on alleged government-led breaches of U.S. political parties. But the threat of nefarious online activity goes beyond the email and communications of elected officials. The large-scale distributed denial-of-service (DDoS) cyberattack that flooded the servers of Domain Name System (DNS) host Dyn on Friday, Oct. 21, 2016 undoubtedly proves the disruptive potential of coordinated hacking efforts on networked communications (learn more about the Mirai botnet here). We saw firsthand evidence of this vulnerability created by interdependencies when Internet of Things (IoT) devices, built for basic consumer use, were used to create large-scale botnets. This form of cyber disruption builds networks of infected devices/connections with self-propagating malware, which ultimately results in crippling DDoS attacks. All of this was enabled by the increased connectivity of IoT nodes and applications as well as the growing ubiquity of digital transformation initiatives supported by cloud computing. Globally, machine-to-machine (M2M) modules, which include IoT, will account for 46% (12.2 billion) of all networked devices by 2020, compared to 30% (4.9 billion) in 2015, according to the latest the Cisco Visual Networking Index (VNI) Forecast.

IoT is collapsing silo-ed individual sectors, businesses, and architectures by its ubiquitous connectivity and use of powerful capabilities such as the cloud. A lot of data, big and small, is generated and used by IoT and the many consumer and business devices – much of this data is sensitive. Cybercrimes and attacks are often targeted at this sensitive and valuable data. According to the 2016 Vormetric Data Threat Report and 451 Research Group, significant amount of sensitive data is in use by enterprises in the cloud.

Figure 1: 53% of Sensitive Data Use in the cloud on SaaS

Figure_1

Source: 2016 Vormetric Data Threat Report, 451 Research Group

Certain factors have an effect on the cost of data breach, according to the latest 2016 IBM and Ponemon institute study. Figure 1 provides a list 16 factors that increase or decrease the per capita cost of data breach. As shown, an incident response team, extensive use of encryption, employee training, participation in threat sharing or business continuity management decrease the per capita cost of data breach.

In the specific study, an incident response team reduced the cost of data breach by $16 per capita and extensive use of encryption reduced cost of data breach by $13 per capita. In contrast, third party involvement in the cause of the data breach resulted in an increase of $14 per capita.

Figure 2: Impact of 16 factors on the per capita cost of data breach; reduction in cost due to encryption

Consolidated view (n=383), measured in US$

Figure_2

Source: IBM and Ponemon Institute, 2016

Amplification attackers, who have tools for carrying out a DDoS attack, exploit vulnerabilities in the network and compute resources. With the growth of the IoT and spread of vulnerable devices and traditional PCs, the abundance of configuration drawbacks with applications can be targeted. According to the Cisco VNI Forecast, the number of global DDoS attacks will increase 2.6-fold to 17 million by 2020 (up from 6.6 million in 2015).

According to the 2016 Cisco Security Report, encrypted traffic, particularly HTTPS, has reached a tipping point. While not yet the majority of transactions, it will soon become the dominant form of traffic on the Internet. It consistently represents over 50 percent of bytes transferred (Figure 2) due to the HTTPS overhead and larger content that is sent via HTTPS, such as transfers to file storage sites.

Figure 3: SSL traffic percentages

Figure_3

Source: Cisco Security Research, 2016

Companies need to protect their intellectual property and other sensitive data, advertisers want to preserve the integrity of their ad content and backend analytics, and businesses are placing more focus on protecting their customers’ privacy. Organizations have become better at encrypting data when it is transmitted between entities, but data at rest is often left unsecured. Many of the most notable breaches in the last few years have taken advantage of unencrypted data stored in the data center and other internal systems. For attackers, this is like following a secured supply truck to an unlocked warehouse.

It is also important for organizations to understand that end-to-end encryption can lessen the effectiveness of some security products. Encryption conceals the indicators of compromise used to identify and track malicious activity. But there is no excuse to leave sensitive data unencrypted.

The number of Secure Socket Layer (SSL) web servers compared to all internet facing servers are also increasing, globally. In the past year, North America and Western Europe led with the percentage of secure Internet servers compared to web-facing Internet servers, according to the Cisco Global Cloud Index (GCI).

Figure 4.               Percentage of Secure Internet Servers to Total Web-Facing Internet Servers by Region and Increase from end of year 2014 to 2015

Figure_4

Source: Cisco Global Cloud Index (GCI), 2015-2020

Companies must secure consumers and businesses alike by securing networks that are growing more complex and massive. Every device, thing, applications and servers on a network is a potential target for hackers. With more white goods becoming digitally connected, and more industries being transformed with IoT and cloud computing, cyberattacks are getting bolder. The urgent need today is for faster responses, smarter security technologies, and wider encryption.

Effectively protect your business and your customers, and monetize new opportunities with simple, open, and automated security architecture: http://www.cisco.com/c/en/us/solutions/service-provider/service-provider-security-solutions/index.html



Authors

Usha Andra

Leader, Product Marketing

Data Center and Cloud Networking

Avatar

This blog post was authored by Jakob Dohrmann, David Rodriguez, and Jaeson Schultz.

The Cisco Talos and Umbrella research teams are deploying a distributed hailstorm detection system which brings together machine learning, stream processing of DNS requests and the curated Talos email corpus.

Talos has discussed snowshoe spam before. Traditional snowshoe spam campaigns are sent from a large number of IP addresses, and a low volume of spam email per IP address. Using such techniques, snowshoe spammers intend to fly under the radar with respect to any reputation or volume-based metrics that could be applied by anti-spam systems. This post concerns “hailstorm” spam. Hailstorm spam is an evolution of snowshoe spam. Both snowshoe and hailstorm spam are sent using a large number of sender IP addresses, but unlike snowshoe spam, hailstorm campaigns are sent out in very high volume over a short timespan. In fact, some hailstorm spam attacks end just around the time the fastest traditional anti-spam defenses can update in response.

The images below, taken from Umbrella Investigate, nicely illustrate the difference between a typical snowshoe spam campaign versus a typical hailstorm spam campaign. The top image below illustrates what the DNS query volume looks like for a domain involved in a typical snowshoe attack. Note the maximum query rate is only 35 queries per hour for the snowshoe domain example. The bottom graph, in contrast, shows the DNS query volume for a domain involved in a typical hailstorm attack. In this graph, there is practically no query volume until suddenly when the DNS query volume spikes to over 75K queries per hour, then drops back down to nothing.


Typical DNS query volume patterns for traditional snowshoe spam (top) vs. hailstorm spam (bottom).

Read More



Authors

Talos Group

Talos Security Intelligence & Research Group