sandbox

October 3, 2017

DEVELOPER

New DevNet Blockchain Sandbox lets you get hands on with hyperledger coding

2 min read

You’ve probably heard of blockchains by now – the relatively new technology underpinning a whole host of cryptocurrencies and distributed apps.  Blockchains promise exciting solution opportunities across a range of markets, from IoT and machine-to-machine communication, to healthcare, identity management, supply chain, and more. But, have you come to grips with how blockchains work? How […]

September 28, 2017

DEVELOPER

Developing Network Security in the DevNet Sandbox

2 min read

This is what DevNet sandbox is all about. Providing access to real world security environments where one can see first-hand how these integrations work.

September 14, 2017

DEVELOPER

DevNet Sandbox Part 2: Making it Easy to Learn and Innovate

3 min read

This blog is the second in a series of two, focussing on DevNet Sandbox and the awesome free access to Cisco and Open Source tech it provides all our DevNet users. In my Part 1 blog I explained how DevNet Sandbox provides great fast, on-demand access to a whole host of Cisco technology, third party […]

August 28, 2017

DEVELOPER

DevNet Sandbox: Giving Developers Fast, Self-Service Access To Cisco Tech

3 min read

This blog is the first in a series of blogs focusing on DevNet Sandbox and the awesome free access to Cisco and Open Source technologies it provides all our DevNet users. I’m a developer. I’m also somewhat an architect, manager and evangelist which makes life super fun, but pretty fast paced. For the most part, […]

February 23, 2017

SECURITY

Serenity Now! A better way to malware analysis.

2 min read

Over the last half decade the term sandboxing has become so pervasive, many customers I speak to have forgotten what it’s for!  Sandboxing is a type of malware analysis – dynamic malware analysis to be exact. You execute a sample / file in a virtual environment and see what happens. There are numerous other types […]

February 10, 2017

SECURITY

Indicators of Compromise and where to find them

4 min read

Indicators of Compromise (“IOC”) are used to suggest a system has been affected by some form of malware. An Indicator of Compromise can be anything from a file name to the behavior observed while malware is actively running on an infected system. Where do they look? Social media, new feeds, industry reports, Threat Grid sample […]

September 10, 2015

SECURITY

Security Beyond the Sandbox

3 min read

A few years ago sandboxing technology really came of age in the security industry. The ability to emulate an environment, detonate a file without risk of infection, and analyze its behavior became quite a handy research tool. Since then, sandboxes have become relatively popular (not nearly on the same scale as anti-virus or firewalls) and […]