sandbox
New DevNet Blockchain Sandbox lets you get hands on with hyperledger coding
2 min read
You’ve probably heard of blockchains by now – the relatively new technology underpinning a whole host of cryptocurrencies and distributed apps. Blockchains promise exciting solution opportunities across a range of markets, from IoT and machine-to-machine communication, to healthcare, identity management, supply chain, and more. But, have you come to grips with how blockchains work? How […]
Developing Network Security in the DevNet Sandbox
2 min read
This is what DevNet sandbox is all about. Providing access to real world security environments where one can see first-hand how these integrations work.
DevNet Sandbox Part 2: Making it Easy to Learn and Innovate
3 min read
This blog is the second in a series of two, focussing on DevNet Sandbox and the awesome free access to Cisco and Open Source tech it provides all our DevNet users. In my Part 1 blog I explained how DevNet Sandbox provides great fast, on-demand access to a whole host of Cisco technology, third party […]
DevNet Sandbox: Giving Developers Fast, Self-Service Access To Cisco Tech
3 min read
This blog is the first in a series of blogs focusing on DevNet Sandbox and the awesome free access to Cisco and Open Source technologies it provides all our DevNet users. I’m a developer. I’m also somewhat an architect, manager and evangelist which makes life super fun, but pretty fast paced. For the most part, […]
Serenity Now! A better way to malware analysis.
2 min read
Over the last half decade the term sandboxing has become so pervasive, many customers I speak to have forgotten what it’s for! Sandboxing is a type of malware analysis – dynamic malware analysis to be exact. You execute a sample / file in a virtual environment and see what happens. There are numerous other types […]
Indicators of Compromise and where to find them
4 min read
Indicators of Compromise (“IOC”) are used to suggest a system has been affected by some form of malware. An Indicator of Compromise can be anything from a file name to the behavior observed while malware is actively running on an infected system. Where do they look? Social media, new feeds, industry reports, Threat Grid sample […]
Security Beyond the Sandbox
3 min read
A few years ago sandboxing technology really came of age in the security industry. The ability to emulate an environment, detonate a file without risk of infection, and analyze its behavior became quite a handy research tool. Since then, sandboxes have become relatively popular (not nearly on the same scale as anti-virus or firewalls) and […]
1