Posted by: psilva | April 23, 2015

RSA2015 – That’s a Wrap!


I wrap it up from RSA2015. As always, thanks to you for watching and thanks to all our guests this week: RSA’s Josh Waterloo with Risk Based Authentication, Greg Maudsley on Defending the New Perimeter, WhiteHat Security’s Jeremiah Grossman on the Change within InfoSec, FireEye’s Sam Ware on our Technology partnership and David Holmes on SSL in the Wild. Also a very special Mahalo to the F5 Studio’s Swante & Jeff for their production help this week – great work! Reporting from San Francisco!

 

ps

Related

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]
Posted by: psilva | April 23, 2015

RSA2015 – SSL Everywhere (feat Holmes)


F5 Worldwide Security Evangelist, David Holmes, talks about why the internet is going SSL Everywhere. He explains why there’s been a surge in encrypted traffic and reveals some interesting statistics from his ongoing research on the SSL protocol. Always an engaging guest, David takes us through Forward Secrecy, Strict Transport Security and SSL v3. What they solve and how they are being used in the wild.

 

ps

Related

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]
Posted by: psilva | April 22, 2015

RSA2015 Partner Spotlight: FireEye Partnership


FireEye Director of Strategic Partners, Sam Ware, talks about the new technical partnership between F5 and FireEye. FireEye aims to provide automated threat forensics and dynamic malware protection against advanced cyber threats, such as advanced persistent threats and spear phishing. Sam shares how FireEye can detect zero day anomalies and pass that information to BIG-IP to enforce a policy. Sam gives a few examples of the types of attacks that are detected and the resulting action that’s enforced.

ps

Related

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_twitter[1]  o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]

In a fascinating and fun conversation, InfoSec luminary, web application expert, TEDx speaker and WhiteHat Security Founder, Jeremiah Grossman explains some of the change occurring within information security. Have the never ending breaches changed the way people think about security? How do organizations protect their critical applications in today’s hybrid environments? He also has some fun with the fate of the perimeter and also explains why InfoSec needs security guarantees. And if you ever wondered, learn why many InfoSec folks participate in a Brazilian Jiu Jitsu Smackdown after events like RSA. Is there a connection between personal self-defense and defending against digital attacks?

 

ps

Related

 

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]
Posted by: psilva | April 22, 2015

RSA2015 – Defending the New Perimeter


Greg Maudsley, F5 Director Product Marketing, discusses the many challenges organizations face when trying to secure an evolving hybrid infrastructure all while allowing access to authorized, yet mobile users. As applications move to the cloud, policies & services need to follow. How do you manage such a diverse environment where SSL is becoming the norm. With applications everywhere and users everywhere, the traditional perimeter based approached no longer works. Greg talks about how risk based policies, intelligence and visibility within a hybrid services model can help defend this new perimeter.

 

ps

Related

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]

RSA Technology Consultant Josh Waterloo talks about the evolution of two-factor authentication and how risk based auth is starting to take hold. He also shows us a demo of the integration between RSA SecurID and BIG-IP APM to provide risk based, strong authentication for corporate access to sensitive information.

 

ps

Related

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]
Posted by: psilva | April 20, 2015

RSA2015 – Find F5


Sporting the crisp F5 ‘Defend the New Perimeter’ t-shirt, I show you how to find F5 booth 1515 at RSA 2015 in 17 paces or less. The theme this year is Change – Challenge today’s security thinking and with the mobile revolution, applications delivered from hybrid environments and the shifting perimeter, changing your security thinking today will help protect your business applications tomorrow.

 

ps

Related

 

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]
Posted by: psilva | April 16, 2015

RSA 2015 – The Preview Video


I give a preview of RSA 2015, running April 20 – 23 in San Francisco’s Moscone Center. F5 will showcase a number of solutions that help organizations defend against the threats to their data and protect the perimeter. Visit us in Booth 1515 to learn about solutions like our Silverline Cloud based WAF and DDoS protection, along with secure mobility, SSL Everywhere and Web Fraud Protection implementations.

 

ps

Related

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]
Posted by: psilva | April 14, 2015

IoT Influence on Society


iot clipping”Things” and the applications/services that support them are changing the way we live. Wearables in the sports and health sectors will grow to nearly 170 million devices by 2017 — an annual growth rate of 41 percent. Specific to the enterprise, if you thought the Bring Your Own Device (BYOD) craze was a headache, just wait until button cameras, smart watches, fitness trackers, and connected glasses are a daily occurrence in the office. Workplace wearables will be a huge challenge in the coming years as more devices, clothing and pretty much any ‘thing’ with a chip or sensor become commonplace in society.

PricewaterhouseCoopers (PwC) in The Wearable Future report found that 77% of respondents thought that a top benefit of wearable technology is the potential to make employees more productive and efficient. If the technology is simple to use and integrates with other devices, that should boost productivity and lift profits. Industries that could benefit immediately from the wearable market include:

  • Entertainment will be more ‘immersive and fun’
  • Social Media gets real time updates from clothes
  • Gaming can be more visually and physically engaging
  • Advertisers will also want that space someone’s back
  • Healthcare will track vitals
  • Retail could offer “pleasant, efficient” shopping experiences

Clothing is just one example of many. Organizations will also be able to manage assets and office building more efficiently. Imagine the connected home automation today, but geared toward commercial properties. Security, HVAC, assets, lighting, employee access and so forth is all handled by sensors and monitors. Smart cities are already being built with IoT on a metropolis scale. Energy, environment, street lights, sanitation, water supply, transportation and other civic related functions are all automatically controlled by meters.

The automotive industry is also taking advantage of sensors with self-driving cars, in car Wi-Fi, seamless integration with mobile phones, car to car communications, software updates and even their own in-car apps for streaming entertainment, navigation and other connected activities.

By all accounts, everything that is a noun – a person, place or thing – at some point, will have or wear a sensor/actuator/IP-chip that gathers some sort of data and all that traffic is headed for a data center somewhere. The digital society has emerged.

ps

Related

 

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]
Posted by: psilva | April 9, 2015

What are These "Things”?


The Internet of Things (IoT) refers to the set of devices and systems that interconnect real world sensors and actuators to the internet. This includes many different types of systems, including:

  • Mobile devices
  • Smart meters & objects
  • Wearable devices including clothing, health care implants, smartwatches, fitness devices, etc.
  • Internet connected automobiles
  • Home Automation Systems including thermostats, lighting, home security
  • Other measuring sensors for weather, traffic, ocean tides, road signals and more

These systems connect to the internet or gateway in a variety of manners including long range WiFi/Ethernet using IP protocols (tcp/udp, including cellular), short range Bluetooth low energy, short range Near Field Communications, or other types of medium range radio networks. Point to point radio links and serial lines are also used. There are many sensors that connect directly to the internet and there are others that may need specialized IoT networking hardware. Message Queue Telemetry Transport (MQTT), for instance, is a subscribe and publish messaging protocol designed for lightweight machine to machine (M2M) communications. Originally developed by IBM, is now an open standard but its primary purpose is to allow a device to send a very short message one hop to a MQ broker and to receive commands from that broker. It needs a gateway or receiver (broker) to communicate. Basically, every message is published to a location, called a topic, clients (the sensors) subscribe to various topics and when a message is published to the topic, the client/sensor gets it.

things

The systems themselves typically fall into a few classes of categories. The smallest devices have 8-bit embedded system on chip (SOC) controllers but no operating system; then there are ones that have a limited 32-bit architecture, like a home router, with or without a base OS and; the most capable systems have either full 32-bit or 64-bit operating platform such as a mobile phone. You might even use your mobile phone to send the data, via the internet, from the IoT device to the destined application.

Not only are we interacting with these devices, they are interacting with other machines to send specific Information, which is called Machine-to-machine technology. The M2M fabric works in conjunction with the various systems that support wearables, home networks and the widely deployed sensors. Some areas that you can focus on as IoT progresses include:

  • Focus on scale of core capabilities like DNS and availability
  • Evaluate readiness to federate access across cloud apps
  • Examine state of identity and access to manage millions of users
  • Strategize on automation for provisioning and auto-scale

According to Gartner, the Internet of Things is not a single technology but a concept with embedded sensors driving the trend, real time support and learning having a social impact and allows businesses to make situational decisions based on the sensor’s information. With that, no single architecture can address all the potential IoT device areas and requirements of each but a scalable architecture that can add or subtract resources to support a wide variety of scenarios prepares organizations for the impact IoT will have. You can check out F5’s The Internet of Things-Ready Infrastructure White Paper to learn more about how an IoT–ready environment can enable service providers and enterprises to begin taking advantage of this societal shift without a wholesale rip-and-replace of existing technology.

ps

Related

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]

Older Posts »

Categories

Follow

Get every new post delivered to your Inbox.

Join 85 other followers