Sunday, December 18, 2016

Perspectives 2017: Financial Agility for Digital Transformation

by Andrew Blacklock, Senior Director, Strategy and Products, Cisco Capital

Ten years ago, companies like Uber and Airbnb were ideas waiting for technology to catch up. Now, these two brands represent a shift in the global economy in what’s known as digital transformation. This evolution towards digital-everything is constantly accelerating, leaving non-digital companies scrambling for a means to kickstart their digitization projects.

According to Gartner, there are 125,000 enterprises in the U.S. alone that are currently launching digital transformation projects. These companies are of all sizes, from nimble startups to global conglomerates. Despite the strong drive to a digital future, 40% of businesses will be unsuccessful in their digital transformation, according to Cisco’s Digital Vortex study.

Many attribute the difficulties associated with the digital transition to the significant costs of restructuring an organization’s technological backbone. Because of these challenges, many companies opt for an agile approach to financial restructuring.

Financial agility allows companies to evolve and meet the rapidly changing demands of digital business through liquid, scalable options that won’t break the bank. While it is not always possible to predict changes in the business environment, agile financing allows companies to acquire the proper technology and tools necessary to plan, work and expand their businesses.

Financial agility isn’t just another buzzword – it’s a characteristic that organizations of all sizes in all industries need to champion in order to drive efficiencies and competitive advantages. It’s a way that companies can acquire the technologies needed to shift their business without having to “go all in.” This allows companies to avoid large up-front capital investment, help with cash flow by spreading costs over time and preserve existing sources of capital to allocate to other areas of the transformation.

Organizations now need to decide how they can best adjust to the transformation and transition for the next stage of digital business. With financial options that enable organizations to acquire technology and scale quickly, companies can pivot with agility to meet the constantly-evolving demands of our digital age.

Looking at the bigger picture, financial agility is a crucial piece of an organization’s overall digital transformation puzzle. While the digital landscape might be constantly changing, flexible financing helps set an organization up for a successful transformation to the future of digital business.

About the Author

Andrew Blacklock is Senior Director, Strategy and Financial Product Development at Cisco Capital. As director of strategy & business operations, Andrew is responsible for strategy, program management and business operations. He has been with Cisco Capital for 17 years with more than 20 years of experience in captive financing. He is a graduate of Michigan State University and the Thunderbird School of Global Management.

SUPERNAP Opens in Milano

SUPERNAP International officially opened "the largest, most advanced data center in Southern Europe." The new facility is built to the specifications of the company's flagship, Tier IV Gold-rated Switch LAS VEGAS multi-tenant/colocation data center.

The SUPERNAP ITALIA data center in Milano will include:

42,000 square meters of data center space with four data halls
40 mega volt amps of power distributed through two 132 kilovolt transmission paths
Proprietary tri-redundant UPS power system
Up to 40 kilowatts of power per cabinet
200 multi-carrier fiber couples with separate paths
Patented Switch SHIELD: dual independent roof decks rated to withstand 322 kph winds
24/7 on-site network operations center (NOC), fire, safety and security
On-site, on-net member resources including conference spaces

The company said 500 cabinets and more than 3.3 megawatts of power have already been sold.

"The lightning fast growth of the data that is running our planet has driven the demand from our clients who are global, industry-leading companies to be operating inside the most advanced, innovative and sustainable data center environment," according to SUPERNAP ITALIA Managing Director Luca Beltramino, a data center industry veteran who recently joined to lead the Italian operation. "They want their worldwide technology operations in the SUPERNAP International data centers."

Telia Carrier, the operator of one of the world's largest fiber-optic networks chose SUPERNAP ITALIA's data center in Milano as a key location for its expansion in Southern Europe. "Telia Carrier is expanding into the SUPERNAP ITALIA data center for many reasons, including its high standards of data center security, availability and scalability, in addition to its carrier-neutrality and key geographical position," said Davide Binaghi, managing director of Telia Carrier Italy.

http://www.supernap.com

Google Joins Cloud Foundry

The Google Cloud Platform (GCP) is now part of Cloud Foundry.

Google noted that it has been very active this year with the Cloud Foundry community, including the delivery of the BOSH Google CPI release, enabling the deployment of Cloud Foundry on GCP, and the recent release of the Open Service Broker API. The efforts have led to custom service brokers for eight of GCP services:

  • Google BigQuery
  • Google Cloud Storage
  • Google Cloud SQL
  • Google Cloud Pub/Sub
  • Google Cloud Vision API
  • Google Cloud Speech API
  • Google Cloud Natural Language API
  • Google Translation API


https://cloudplatform.googleblog.com/

DOCOMO Partners with China's CAICT on 5G

NTT DOCOMO and the China Academy of Information and Communication Technology (CAICT) agreed to jointly investigate the standardization of 5G technologies and available frequency bands.

CAICT, a national research organization directly under the Provincial Government of the Ministry of Industry and Information Technology, is in charge of policies and standardization strategies on information and communication in China.

Under the MOU, DOCOMO will participate in the 5G Trial launched by the IMT-2020 (5G) Promotion Group to verify 5G technologies and systems. The group is driving research and development to help standardize 5G technologies in China as quickly as possible. During the trial, DOCOMO and CAICT will also study a possible frequency bands for 5G networks.

https://www.nttdocomo.co.jp/english/info/media_center/pr/2016/1215_00.html

Violin Memory Enters Chapter 11, Seeks Auction in January

Violin Memory, which offers flash memory arrays, filed for reorganization under Chapter 11 of the U.S. bankruptcy code.  The company said its will streamline its operations and balance sheet, while simultaneously pursuing a sale of its business. The company is seeking to hold an auction in early January for the business.

Violin Memory, founded in 2005, said its assets include annual recurring service revenue, a portfolio of 58 US Patents/24 pending, a single O/S for public, private and hybrid cloud environments, integrated hardware and software solutions, and a customer base that includes some of the largest enterprises in the world.

Kevin A. DeNuccio, Violin Memory's President and CEO stated: "We are taking this action, which should conclude by the end of January 2017, to bolster Violin's ability to serve the needs of its customers. Violin intends to continue to sell solutions to customers and prospects as well as service and

http://www.violin-memory.com

Rob Sherwood leaves Big Switch for Facebook

Rob Sherwood is leaving Big Switch Networks to take up a research role at Facebook. Sherwood currently serves as Chief Technology Officer of Big Switch.


http://www.bigswitch.com/blog/2016/12/16/and-now-for-something-completely-different

Thursday, December 15, 2016

Perspectives 2017: Today’s Internet of Things Reality

And an analysis of the why and how of developing an IoT strategy

by Patrick Hubbard, Head Geek, SolarWinds

The Internet of Things (IoT) has been a buzzword for quite a while now. For many, it conjures up images of smart thermostats, home security systems, app-powered office coffeemakers, and even internet-connected crockpots. Consumer IoT devices such as these, often referred to as internet-connected appliances, are certainly experiencing exponential growth, but the growth of business or industrial IoT is even more astounding: Gartner estimates that there will 21 billion endpoints in use by 2020, resulting in massive potential for data generation in 2020.

The Challenges of IoT

Enterprise and industrial IoT devices themselves can be very helpful in determining such things as soil moisture in smart agriculture, improving asset tracking in the shipping industry, and determining temperature and utilization in a manufacturing facility. However, the sheer volume of these devices presents an issue when they are added to a network without a strategy, much like BYOD when it first came about.

But unlike with phones, tablets, or laptops, a majority of IT professionals managing networks with IoT-connected devices aren’t conducting software updates on the devices; instead, the primary focus has been on how these appliances can be used in novel ways, with the risks of their unmonitored internet connectivity falling by the wayside. This common oversight and its consequences were illustrated via the recent Dyn DDoS attack—many of the devices used in the attack were connected to corporate networks and improperly monitored. In consequence, we need to stop thinking about IoT as “BYOD on steroids.” Instead, we need very different and customized strategies because IoT has the power to disrupt operations in a dangerous way.

Thus, it’s clear that IoT devices are changing networks and our ability to monitor and manage them. With that in mind, it’s important to note IoT device class (0, 1, or 2). This refers to the variety of ways the network is affected by IoT devices. Class 0 devices are light, use low power and aren’t truly IoT devices that require dramatic shifts in the way we monitor and manage our networks

Monitoring and management of classes 1 and 2 are a different story, though. Managing class 1 and 2 IoT devices comes down to managing access properties on the routers and switches that allow devices to get to the internet. Monitoring these devices is more application traffic-specific, calling for Netflow or quality-of-service (QoS) in order to see what the devices are doing because they won’t typically allow for SNMP or provide a management interface to determine performance. This factor makes security information and event management (SIEM) and important consideration as well—you need to be able to detect that a network device is conducting a port scan or file share logons, for example.

In terms of capacity planning, if you believe the estimation of billions of devices in use by 2020, then we will undoubtedly overwhelm our networks in ways we can’t even imagine right now. If subnetting is a problem now, with the typical and somewhat manageable systems, then the order of magnitude brought on by IoT devices would likely force companies into IPv6, which they may not be ready for. They will cause transience with IP addresses and difficulty understanding what the bandwidth is of any given device—different devices have different behaviors, and they all communicate with different servers. Some will be well-optimized for this, and some won’t be. The retail industry, as an example, uses immense hyper-personalization based on IoT, so network capacity and utilization is of utmost importance. In order to avoid latency or downtime, they will need to undertake tremendous network capacity planning and utilization, or risk their reputation and customer experience.

The Benefits of an IoT Strategy

Although it may seem like the industry is moving at too rapid of a pace for you to slow down and implement and test an effective IoT strategy, it’s imperative to do so; the fact that there are a multitude of adoptable standards in existence already may help.

The first and perhaps most obvious benefit of implementing an IoT strategy is the reduced risk of data breach. Without knowledge of possible vulnerabilities, your organization may be open to security compromises in ways that could be harmful to your business and appear to come out of left field, although they could have been left unnoticed for a long period of time. A recent yet admittedly simple poll of IT professionals showed that while some organizations still don’t manage any IoT devices (or none that IT knows about), some, even in regulated industries such as healthcare, manage thousands of devices without following specific protocol.

The second benefit is financial: organizations can anticipate extra costs by conducting capacity planning and network management before IoT devices are put on a network. Additionally, organizations will be more likely to obtain what they set out to in the first place: bottom line savings advantages gained by implementing innovative IoT devices; for example, in HVAC efficiency, physical security, short lead manufacturing efficiency, and production rate optimization in the supply chain. Companies who are using IoT in truly transformative ways within the framework of formulated strategies for their customers will be the first out of the gate to experience unprecedented benefits.

Getting Started On an IoT Strategy

As a first step to gaining knowledge and control over IoT, you should take inventory of what you already have happening from an IoT device perspective within your environment. Without this baseline knowledge, there’s no way to move ahead with any kind of semblance of a strategy.

Next, you need to come to the table with business executives and discuss what they intend to do with IoT devices. Seek to understand how many devices there may be and what type.

Once there’s collective agreement about how many IoT devices will be in your environment, it’s up to you to formulate a security policy, outlining what’s acceptable in terms of risk. This is also dependent on your industry—retail versus financial services versus healthcare, for example. You may need to consider PCI, HIPAA and other compliance issues. The security policy will also drive reconsideration of network and security segmentation.

When having these conversations with business leaders, it’s also a time to calculate business risk and put a hard, defensible number behind the financial hit to the business in the event of a serious security breach as a result of IoT. Once you are able to calculate financial damage estimations, then it becomes easier to have discussions with management about security, network security, configuration, performance and quality of experience (QoE) monitoring needs.

In addition to aligning with the business on security policies and business risks, this is also the time to consider what to do with the huge amounts of data the devices will generate. And because so many organizations are moving towards hybrid IT, you may need to consider how both on-premises and cloud data will be managed from a services, applications, and storage perspective, in order to best manipulate the data to improve marketing, service delivery, or increase yield in a factory setting.

Conclusion

IoT should be an active concern for you. If you’re not already, you will soon be asked to manage more and more network-connected devices, resulting in security issues and a monumental challenge in storing, managing and analyzing mountains of data. The risk is that without a proper strategy to do so, you’ll be tackling all this on an ad hoc basis on an ad hoc basis. Instead, stop what you’re doing and start developing your IoT strategy. Begin by surveying your network today to get a baseline, then come to the table with your organization’s IoT stakeholders to determine why they need IoT and how they plan to use the devices, discuss the security implications and define a security policy, and decide what to do with all the data the devices will generate. Doing this, ahead of time if still possible, will help you ensure that your organization doesn’t become an IoT victim, but an IoT victor.

About the Author

Patrick Hubbard is a head geek and senior technical product marketing manager at SolarWinds. With 20 years of technical expertise and IT customer perspective, his networking management experience includes work with campus, data center, storage networks, VoIP and virtualization, with a focus on application and service delivery in both Fortune 500 companies and startups in high tech, transportation, financial services and telecom industries.

About SolarWinds

SolarWinds (NYSE: SWI) provides powerful and affordable hybrid IT infrastructure management software to customers worldwide from Fortune 500® enterprises to small businesses, government agencies and educational institutions. We are committed to focusing exclusively on IT Pros, and strive to eliminate the complexity that they have been forced to accept from traditional enterprise software vendors. Regardless of where the IT asset or user sits, SolarWinds delivers products that are easy to find, buy, use, maintain and scale while providing the power to address all key areas of the infrastructure from on premises to the cloud. Our solutions are rooted in our deep connection to our user base, which interacts in our thwack online community to solve problems, share technology and best practices, and directly participate in our product development process. 


Got an idea for a Blueprint column?  We welcome your ideas on next gen network architecture.
See our guidelines.

FCC Chairman Tom Wheeler to Step Down

FCC Chairman Tom Wheeler will step down on January 20, 2017.

“Serving as F.C.C. Chairman during this period of historic technological change has been the greatest honor of my professional life. I am deeply grateful to the President for giving me this opportunity. I am especially thankful to the talented Commission staff for their service and sacrifice during my tenure. Their achievements have contributed to a thriving communications sector, where robust investment and world-leading innovation continue to drive our economy and meaningful improvements in the lives of the American people. It has been a privilege to work with my fellow Commissioners to help protect consumers, strengthen public safety and cybersecurity, and ensure fast, fair and open networks for all Americans.”

http://www.fcc.gov

  • Tom Wheeler previously served as Managing Director of Core Capital Partners, a venture capital firm headquartered in Washington, D.C. Earlier in his career, he served as President of the National Cable Television Association (NCTA) from 1979 to 1984, and later as CEO of the Cellular Telecommunications & Internet Association (CTIA) until 2004.

FCC Chairman Calls for New Net Neutrality Rules



FCC Chairman Tom Wheeler announced plans to introduce new Net Neutrality rules saying his intent is to "preserved the Internet as an open platform for innovation and expression while providing certainty and predictability in the marketplace." The announcement comes a month after the United States Court of Appeals for the D.C. Circuit ruled that the FCC overstepped its boundaries in setting Net Neutrality rules that compel broadband providers to...





FCC Eyes Residential Fiber Build-out as Condition for AT&T/DirecTV Deal


FCC Chairman Tom Wheeler has circulated a draft recommendation to his fellow FCC commissioners recommending that the AT&T/DirecTV transaction be approved with conditions concerning future fiber rollouts by AT&T. Namely, Wheeler would like 12.5 million customer locations to have access to a competitive high-speed fiber connection -- an additional build-out that is about 10 times the size of AT&T’s current fiber-to-the-premise deployment....

FCC Chairman Seeks to Extend Title II Authority to Wireless Too


FCC Chairman Tom Wheeler confirmed that he circulating a proposal this week with his fellow commissioners that would  implement and enforce open Internet protections using Title II authority.  In a column published by Wired.com, Wheeler describes his proposal as "the strongest open internet protections ever proposed by the FCC." Specifically, Wheeler seeks enforceable, bright-line rules to ban paid prioritization, and the blocking and...

Bell Canada Evaluates AT&T’s Open Source ECOMP

Bell Canada is currently testing AT&T’s ECOMP platform to create and manage software-defined networks.

ECOMP, which stands for Enhanced Control, Orchestration, Management and Policy, is the software platform AT&T created to power its new network. ECOMP lets service providers quickly add features and drive down operations costs.

AT&T has committed to release its ECOMP platform as open source software in conjunction with the Linux Foundation in the first quarter of 2017.

“ECOMP represents a significant investment in the software-centric networks of the future.  We have committed to taking this investment into open source through the Linux Foundation,” said Chris Rice, senior vice president – AT&T Labs, Domain 2.0 Architecture and Design. “We welcome Bell Canada’s collaboration in driving a new network approach that is faster, more efficient and ultimately more responsive to customer needs.”

“Bell Canada is committed to leading broadband network and service innovation in Canada. We believe software-defined networks will advance the future of both wireless and wireline connectivity by adapting to customer needs quickly, and enabling a seamless user experience,” said Petri Lyytikainen, Bell’s vice president, Network Strategy, Services and Management. “We are pleased to collaborate with AT&T and other leading communications companies to evaluate the promising capabilities of the open-source ECOMP platform.”
 
“It’s exciting to see the communications industry coalescing around ECOMP,” said Jim Zemlin, executive director at the Linux Foundation. “ECOMP is the most comprehensive and complete architecture for VNF/SDN automation we have seen. AT&T has had this platform in production for over 2 years now. This technology is unique in that it’s both disruptive and battle-tested. We can’t wait to host it at the Linux Foundation and open it up to the broader developer community.”

http://www.att.com


  • In September, Orange agreed to test the platform for creating and managing its own software-defined network. Orange is the first telecom company to join AT&T’s ECOMP effort. The carriers have agreed to collaborate on open source and standardization initiatives to accelerate the standardization of SDN and NFV.

Nokia to acquire Deepfield for Big Data Analytics

Nokia agreed to acquire Deepfield, a start-up specializing in in real-time analytics for IP network performance management and security.

Deepfield, which  was founded in 2011 and is based in Ann Arbor, Michigan, developed an analytics platform that identifies over 30 000 popular cloud applications and services.  Its Internet Genome tracks how traffic runs to and through networks to reach subscribers, in real time, and without the need for probes, taps and monitors in the network itself.

Nokia said it plans couple Deepfield big data analytics with the dynamic control capabilities of open SDN platforms, such as the Nokia Network Services Platform (NSP) and Nuage Networks Virtualized Services Platform (VSP). Together, these products become the cognitive "brain" that makes real-time, automated changes to wide area networks (WANs) and datacenter networks so they can quickly adapt to changes in application demand, flow and traffic patterns. This will allow Nokia customers to drive greater network efficiency, help assure quality and enhance security - without manual intervention, and in real-time.

Nokia's service assurance and customer experience management portfolios would also leverage Deepfield's big data analytics, including per subscriber application performance, to automate actions that ensure ongoing service health and customer satisfaction.

Basil Alwan, president of Nokia's IP/Optical Networks business group, said: "We are impressed with Deepfield's unique approach to network analytics and their deployments with major providers around the globe, delivering critical visibility into how leading cloud applications and services flow through their networks. Combining Deepfield's cutting-edge analytics with Software Defined Networking techniques (SDN) will allow our customers to automate engineering and assurance processes while enhancing performance, utilization and security. We believe this capability will only increase in importance as networks and applications become more complex, diverse and dynamic."

Craig Labovitz, founder and CEO of Deepfield, said: "We are very pleased to join Nokia, a like-minded global leader in IP networking with shared values in network innovation. I look forward to leveraging the strength of Nokia's world-class customer, sales and support footprint to take our Deepfield technology worldwide. This will also give us a solid foundation from which to accelerate the creation of new value - both in the Deepfield portfolio, and in joint areas such as telemetry and automation."

http://www.nokia.com

Elenion Targets Innovation in Silicon Photonics

Elenion Technologies, a start-up headquartered in New York City with offices in San Jose, California and Munich, emerged from stealth and announced its plans to drive innovation in silicon photonics.

Elenion is backed by Marlin Equity Partners, a global investment firm, that also owns Coriant. Elenion is headed Larry Schwerin, who previously was CEO of Silicon Lightwave Services, a ground-breaking silicon photonics design services company, and Capella Intelligent Subsystems, a leading supplier of Wavelength Selective Switch technology acquired by Alcatel-Lucent in 2013. In addition, Michael Hochberg, a renowned silicon photonics expert and co-founder of Luxtera, serves as the CTO.

“Following over two years of focused R&D, including extensive coordination with Coriant, we are excited with the progress Elenion’s experienced team has demonstrated in the development of next-generation photonic integrated circuit products,” said Doug Bayerd, a principal at Marlin. “Elenion is uniquely positioned to capitalize on one of the industry’s most promising technologies and accelerate the introduction of commercially-ready advanced communications solutions.”

“Silicon photonics is redefining the economics of interconnect technologies and enabling the use of optics in exciting new markets and applications,” said Schwerin. “We look forward to working with our customers to deliver innovative photonic integrated circuit solutions that are far more complex and capable than previously possible.”

http://www.elenion.com

Databricks Raises $60 Million for Cloud Data Analytics with Apache Spark

Databricks, a start-up founded by the team that created Apache Spark, announced $60 million in a Series C funding.

Databricks offers a data platform in the cloud powered by Apache Spark. The company said that as Spark's adoption moves into mainstream in large data-driven enterprises in all industries, it has seen an explosive uptick in customer demand and adoption, serving more than 400 customers today.

The funding round was led by New Enterprise Associates (NEA) and included existing Databricks investor, Andreessen Horowitz. The new funding round brings Databricks' total funding to date to $107.5 million.

"Apache Spark has enabled countless enterprises and cutting-edge early adopters to create business value through advanced analytics solutions," said Ali Ghodsi, CEO and Co-Founder at Databricks. "As Spark's adoption and the demand for our managed Spark platform continues to rise, this funding will advance our engineering and go-to-market strategies to address all of our customer's pain points as we continue to grow the Spark community."

http://www.databricks.com

Wednesday, December 14, 2016

Ten Cybersecurity Predictions for 2017

by Dr. Chase Cunningham, ECSA, LPT 
Director of Cyber Operations, A10 Networks 

The cyber landscape changes dramatically year after year. If you blink, you may miss something; whether that’s a noteworthy hack, a new attack vector or new solutions to protect your business. Sound cyber security means trying to stay one step ahead of threat actors. Before the end of 2016 comes around, I wanted to grab my crystal ball and take my best guess at what will be the big story lines in cyber security in 2017.

1. IoT continues to pose a major threat. In late 2016, all eyes were on IoT-borne attacks. Threat actors were using Internet of Things devices to build botnets to launch massive distrubted denial of service (DDoS) attacks. In two instances, these botnets collected unsecured “smart” cameras. As IoT devices proliferate, and everything has a Web connection — refrigerators, medical devices, cameras, cars, tires, you name it — this problem will continue to grow unless proper precautions like two-factor authentication, strong password protection and others are taken.

Device manufactures must also change behavior. They must scrap default passwords and either assign unique credentials to each device or apply modern password configuration techinques for the end user during setup.

2. DDoS attacks get even bigger. We recently saw some of the largest DDoS attacks on record, in some instances topping 1 Tbps. That’s absolutely massive, and it shows no sign of slowing. Through 2015, the largest attacks on record were in the 65 Gbps range. Going into 2017, we can expect to see DDoS attacks grow in size, further fueling the need for solutions tailored to protect against and mitigate these colossal attacks.

3. Predictive analytics gains groundMath, machine learning and artificial intelligence will be baked more into security solutions. Security solutions will learn from the past, and essentially predict attack vectors and behvior based on that historical data. This means security solutions will be able to more accurately and intelligently identify and predict attacks by using event data and marrying it to real-world attacks. 

4. Attack attempts on industrial control systems. Similar to the IoT attacks, it’s only due time until we see major industrial control system (ICS) attacks. Attacks on ecommerce stores, social media platforms and others have become so commonplace that we’ve almost grown cold to them. Bad guys will move onto bigger targets: dams, water treatment facilities and other critical systems to gain recognition.

5. Upstream providers become targets. The DDoS attack launched against DNS provider Dyn, which resulted in knocking out many major sites that use Dyn for DNS services, made headlines because it highlighted what can happen when threat actors target a service provider as opposed to just the end customers. These types of attacks on upstream providers causes a ripple effect that interrupts service not only for the provider, but all of their customers and users. The attack on Dyn set a dangerous presedent and will likely be emulated several times over in the coming year.

6. Physical security grows in importance. Cyber security is just one part of the puzzle. Strong physical security is also necessary. In 2017, companies will take notice, and will implement stronger physical security measures and policies to protect against internal threats and theft and unwanted devices coming in and infecting systems.

7. Automobiles become a target. With autonomous vehicles on the way and the massive success of sophisticated electric cars like Teslas, the automobile industry will become a much more attractive target for attackers. Taking control of an automobile isn’t fantasy, and it could be a real threat next year.

8. Point solutions no longer do the job. The days of Frankensteining together a set of security solutions has to stop. Instead of buying a single solution for each issue, businesses must trust security solutions from best-of-breed vendors and partnerships that answer a number of security needs. Why have 12 solutions when you can have three? In 2017, your security footprint will get smaller, but will be much more powerful.

9. The threat of ransomware growsRansomware was one of the fastest growing online threats in 2016, and it will become more serious and more frequent in 2017. We’ve seen businesses and individuals pay thousands of dollars to free their data from the grip of threat actors. The growth of ransomware means we must be more diligent to protect against it by not clicking on anything suspicious. Remember: if it sounds too good to be true, it probably is.

10. Security teams are 24/7. The days of security teams working 9-to-5 are long gone. Now is the dawn of the 24/7 security team. As more security solutions become services-based, consumers and businesses will demand the security teams and their vendors be available around the clock. While monitoring tools do some of the work, threats don’t stop just because it’s midnight, and security teams need to be ready to do battle all day, every day.

About the Author

Dr. Chase Cunningham (CPO USN Ret.)  is A10 Networks' Director of Cyber Operations. He is an industry authority on advanced threat intelligence and cyberattack tactics. Cunningham is a former US Navy chief cryptologic technician who supported US Special Forces and Navy Seals during three tours of Iraq. During this time, he also supported the NSA and acted as lead computer network exploitation expert for the US Joint Cryptologic Analysis Course. Prior to joining A10 Networks, Cunningham was the director of cyber threat research and innovation at Armor, a provider of cloud-based cyber defense solutions. 


Yahoo! -- One Billion Accounts Compromised

Yahoo! confirmed that hackers stole data and compromised more than one billion user accounts in August 2013. The exploit was first disclosed by Yahoo! in November and is most likely different from incident disclosed on September 22, 2016.

Separately, Yahoo previously disclosed that its outside forensic experts were investigating the creation of forged cookies that could allow an intruder to access users' accounts without a password. Based on the ongoing investigation, the company believes an unauthorized third party accessed the company's proprietary code to learn how to forge cookies. The outside forensic experts have identified user accounts for which they believe forged cookies were taken or used. Yahoo is notifying the affected account holders, and has invalidated the forged cookies. The company has connected some of this activity to the same state-sponsored actor believed to be responsible for the data theft the company disclosed on September 22, 2016.

https://yahoo.com/security-update

Yahoo Cites State Actor for Massive Security Breach

Yahoo believes a state-sponsored actor breached its network in late 2014 and may have stole names, email addresses, telephone numbers, dates of birth, hashed passwords (the vast majority with bcrypt) and, in some cases, encrypted or unencrypted security questions and answers from at least 500 million accounts.

Yahoo said its ongoing investigation suggests that stolen information did not include unprotected passwords, payment card data, or bank account information.

http://www.yahoo.com

FBI Arrests USC Student in DDoS Sweep

The FBI announced the arrest of Sean Sharma, a graduate student at the University of Southern California, for his suspected role in a distributed denial of service (DDoS) attack against a San Francisco chat service company.  The arrest came as part of an operation aimed at users of “DDoS for hire” services. The sweep, which was coordinated from The Hague in the Netherlands by Europol’s European Cyber Crime Centre (EC3), yielded nearly three dozen arrests in 13 countries.

https://www.fbi.gov/news/stories/international-cyber-sweep-nets-ddos-attackers

Alibaba Cloud for Japan Ready for Launch

Alibaba Cloud for Japan is ready for commercial launch on December 15, 2016.

The service is provided by SB Cloud Corporation, which is a joint venture between SoftBank Corp. and Alibaba Group Holding Limited.

Alibaba Cloud, the cloud computing arm of Alibaba Group, has the largest share of the Chinese market with its services. Its services provide the critical infrastructure that supports the Alibaba Group’s e-commerce sites, which recently processed a maximum 175,000 orders per second during this year’s Singles’ Day, a large-scale sale that takes place in China on November 11.

With Alibaba Cloud, customers can use Alibaba Group hosted data centers in China, the United States, Hong Kong, Singapore and other locations in addition to those hosted by SB Cloud in Japan.

https://www.sbcloud.co.jp/

AWS London Opens for Business

Amazon Web Services officially launched its AWS London Region, offering two availability zones (data centers).  The new London Region is currently available for multiple services, including Amazon Elastic Compute Cloud (Amazon EC2), Amazon Simple Storage Service (Amazon S3), and Amazon Relational Database Service (Amazon RDS).

The London Region joins Ireland and Frankfurt as AWS’ third European location. This brings the number of AWS Regions worldwide to sixteen, and the total number of AWS Availability Zones to 42.

https://aws.amazon.com/about-aws/whats-new/2016/12/announcing-the-aws-europe-london-region/

AT&T Connects NASA's Deep Space Network Radio Antennas

AT&T will provide a global VPN linking the giant radio antennas of NASA's Deep Space Network.

AT&T said its highly secure and reliable VPN lets NASA protect and transmit data 3x faster than before. It also lets NASA increase of decrease bandwidth on demand.

NASA’s Deep Space Network supports communications for interplanetary spacecraft missions. It also provides radar and radio astronomy observations that improve our understanding of the solar system and the larger universe

http://www/att.com
http://deepspace.jpl.nasa.gov/about/

Arista Wins in Copyright Case Versus Cisco

A U.S. jury in the Northern District of California has found that Arista is not liable for copyright infringement related to Arista’s use of a small number of commands similar to those found in Cisco’s Command Line Interface (CLI), and does not owe damages to Cisco.

“We would like to thank the jurors and Judge Freeman for their tireless efforts. Today’s verdict represents an important victory not only for Arista but for the entire industry,” said Marc Taxay, Senior Vice President and General Counsel of Arista.

http://www.arista.com


Cisco Confirms Import Ban for Infringing Arista Products


In a blog posting, Cisco's Mark Chandler confirmed that the office of the U.S. Trade Representative has stated that the International Trade Commission’s import ban and cease and desist order covering all Arista products that infringed three core Cisco patents is now in effect. In the statement, Chandler said Cisco is prepared to bring an enforcement action if Arista violates the ban and continues to sell or support infringing products. http://blogs.cisco.com/news/protecting-innovation-facing-the-facts Cisco...


Blacksky Integrates Satellite Imagery wtih Data Streams

Spaceflight Industries introduced a cloud-based platform that integrates satellite imagery, social media and other data feeds – to reveal timely and relevant insights around specific topics or locations.

The new BlackSky global intelligence platform offers two major capabilities:


  • Imagery: Customers can discover, purchase and download imagery via the BlackSky platform, which currently provides access to more than 10 high-resolution imaging spacecraft including those from 21AT’s TripleSat, SIIS’s KOMPSAT, and UrtheCast’s Deimos-2. The platform will incorporate data from BlackSky’s 60-satellite constellation as it enters commercial operation in 2017. Additionally, customers can acquire real-time images by tasking partner satellite systems and soon the BlackSky constellation.
  • Insights: The platform fuses the satellite imagery with information from other sources including news outlets and social media to create curated data feeds by location (ex: port, pipeline, border) or theme (ex: geopolitical conflict, natural disasters, energy, or health/outbreak). Through machine learning, predictive algorithms and natural language processing techniques, the platform triangulates these relevant global events in time and space. Customers then receive customized results that are prioritized based on their preferences.

“Our business plan has always been to look at the planet in real time, in every spectrum, to solve real-world problems,” said Jason Andrews, chief executive officer of Spaceflight Industries. “Today we are announcing significant progress on that journey. For the first time, organizations can fuse satellite imagery with a wide array of data services contextualized in time and space”

http://www.blacksky.com