Tech Field Day Coverage
Our delegate panel includes independent writers and thought leaders, and we collect their coverage of the event, Tech Field Day presentations, and sponsoring companies here.
Achieving a Consistent Policy Across Enterprise With Cisco Security Group Tag
A common policy across products and use cases can cut the chaos and solve the challenges of policy management in enterprises. Cisco’s Security Group Tag enables a central policy control, allowing teams to collaborate more effectively, and put up a strong front against cyber threats. Cisco’s approach to bridging policy islands through context sharing and the use of Security Group Tag (SGT) are described as effective solutions for centralized policy control, interoperability, and cost benefits. Read about it at Gestalt IT or watch the demo on the website.
Read More:
Achieving a Consistent Policy Across Enterprise With Cisco Security Group Tag
Security Is Hard
In this article, Alex Neihaus acknowledges the difficulty and challenging nature of enterprise security. Calling attention to the recent delegate roundtable discussion at Security Field Day, Alex highlights the asymmetric nature of the battle, where securing an environment requires perfection while attackers only need to exploit a single vulnerability.
Read More:
Thirty-Six GigaToasters
In this episode of Chaos Lever, Chris Hayner and Ned Bellavance cover Security Field Day 9, highlighting presentations by Comvault, Noname Security, Cisco, Cribl, and NetAlly’s Cyberscope. They discuss Comvault’s ThreatWise platform, which focuses on ransomware detection, and the use of fake hosts and lures to trap potential attackers. They also mention Cisco’s new hardware firewalls, the 4200 series, and their multicloud network security model. Chris shares insights on NetAlly’s Cyberscope, a handheld cybersecurity analyzer.
Read More:
Enhancing Data Protection: The Power of Real-Time Intruder Deception and Detection
In this LinkedIn article by Lars Trøen, the innovative approach to data protection showcased by Commvault at Security Field Day 9 is discussed. The article highlights the incorporation of Metallic Threatwise, a honeypot and deception service, into Commvault’s data protection software system. This integration enables real-time detection of intruders and provides tailored recommendations for deploying honeypots within the network, enhancing organizations’ ability to stay ahead of evolving cybersecurity threats.
Read More:
Enhancing Data Protection: The Power of Real-Time Intruder Deception and Detection
Cisco Live 2023 Review
Cisco Live must have been a load of fun! That’s what we take away from this article by Eric Stewart as he reflects on the event. He also shares his experience with the Tech Field Day presentations and highlights the importance of the social aspect of Cisco Live and being able to connect with friends. We’ll be watching for more from Eric soon!
Read More:
Segmentation Is a Key Edge Building Block with Mako Networks
In this Gestalt IT Tech Note, Brian Chambers discusses the importance of segmentation in operating edge environments at scale. He emphasizes that while edge environments resemble cloud architectures, they also face unique challenges, such as lack of on-site staff and poor physical security. Chambers highlights how effective network segmentation can improve performance, enhance security, and enable better network traffic management. He explores the role of segmentation in various industries, particularly retail, and emphasizes the need for a capable partner like Mako Networks to provide effective segmentation services in edge computing solutions. Read this article, sponsored by Mako Networks, to learn more about edge connectivity.
Read More:
Segmentation Is a Key Edge Building Block with Mako Networks
Thwarting Malicious Cyberattacks With the New Lightspin CNAPP From Cisco
In this Gestalt IT article, Sulagna Saha discusses Cisco’s cloud security solution, Lightspin CNAPP, and its capabilities in protecting microservices applications from vulnerabilities and malicious cyberattacks. Saha highlights the complex nature of microservices applications and the need for layered security across development and runtime phases. She explains how Lightspin CNAPP, with its graph database technology and comprehensive scanning capabilities, can identify vulnerabilities, correlate events, and provide remediation recommendations. The article also mentions the recent acquisition of Lightspin Technologies by Cisco and provides a link to watch Cisco’s demo of Lightspin CNAPP.
Read More:
Thwarting Malicious Cyberattacks With the New Lightspin CNAPP From Cisco
Democratizing Security Testing
In this post, Michael Davis discusses the democratization of security testing and validation. He highlights NetAlly’s introduction of Cyberscope, an Android-powered handheld tool that simplifies network security testing. Cyberscope offers a user-friendly interface to powerful tools like Nmap, enabling non-experts to leverage long-standing security testing programs. James Kahkoska, CTO of NetAlly, presented Cyberscope at Security Field Day and Davis provides a link to watch the presentation and the ensuing discussion on privacy matters related to RF signal collection in unlicensed spectrum.
Read More:
Democratizing Security Testing
Seeing Through Hybrid Multi-Cloud With Forward Networks
In this Tech Note article at Gestalt IT, Justin Warren discusses the challenges of securing cloud environments in the world of hybrid multi-cloud. He emphasizes that full visibility and understanding of network configurations are crucial for effective security. Forward Networks, known for network observability, offers a solution that simplifies the complex topology of cloud environments, provides consistent visibility across networks, and enables operators to ask the right security questions. Warren highlights the importance of combining existing techniques with new methods to navigate the diversity of environments and avoid overwhelming complexity. Read more in this article, which was sponsored by Forward Networks.
Read More:
Seeing Through Hybrid Multi-Cloud With Forward Networks
JetStream Software Presents the Economic Advantages of Cloud DR for VM Environments at Cloud Field Day
In a recent article, David Marshall takes a look at JetStream Software’s recent presentation at Cloud Field Day. The session explored the economic advantages of using cloud disaster recovery (DR) for virtual machine (VM) environments. JetStream Software showcased how their solution can help organizations leverage the cloud to improve their disaster recovery strategies, reduce costs, and enhance overall resilience. Read more at VMblog!
Read More:
Evolving API Landscape and Ensuring Secure Transitions With the Help of Noname Security
In this LinkedIn post, Lars Trøen reflects on his experience as a remote delegate at Security Field Day. He highlights the importance of API security in the rapidly evolving landscape of application programming interfaces (APIs). Trøen discusses the challenges faced in adapting to changing API standards and emphasizes the significance of making informed decisions and prioritizing web application security. Trøen also highlights the services offered by Noname Security, such as monitoring API calls and providing API testing, to facilitate smooth and secure API transitions.
Read More:
Evolving API Landscape and Ensuring Secure Transitions With the Help of Noname Security
Grokking a Cosmos’ Worth of Logs
In this thought-provoking article, Alex Neihaus expresses his skepticism towards the concept of “big data” and highlights the challenges of managing and extracting actionable insights from massive amounts of operational logging data. He references Cribl’s product, Stream, showcased at Security Field Day, which intelligently eliminates data noise and selectively ingests log data into any destination. By reducing unnecessary data, Stream not only offers cost savings but also enhances the quality and accuracy of analysis, allowing organizations to focus on the most relevant security information within their logging data.
Read More:
Grokking a Cosmos’ Worth of Logs
Cisco Rolls Out Industrial Ethernet Catalyst Switches for the Most Rugged Outdoor Deployments
Outdoor industrial environments can be harsh to enterprise switching and wireless equipment that are most suited to work in controlled indoor settings. That’s why Cisco has launched a new set of weather-proof industrial ethernet switches that are built to provide speedy connectivity in the most unfriendly locations. Read about the Cisco Catalyst IE9300 Rugged Series at Gestalt IT or watch the demo here at the website.
Read More:
Cisco Rolls Out Industrial Ethernet Catalyst Switches for the Most Rugged Outdoor Deployments
Edge to Cloud (To Edge) on the Biggest Stage on Earth
In the latest from The Tech Arena, Allyson Klein and Carl Moberg of Avassa discuss the complexities of delivering live broadcast media on a global scale. They bring up the transformation happening in the production side of the broadcast chain, highlighting the challenges of real-time video processing and the need for specialized infrastructure. They also share their thoughts on the future of production infrastructure, including the potential for cloud-based solutions and the importance of considering the specific requirements of each production scenario.
Read More:
Edge to Cloud (To Edge) on the Biggest Stage on Earth
Drilling Down Into the Invisible Parts of the Network With ThousandEyes
Uninterrupted visibility is no longer a privilege, but an absolute essential in today’s digital scene. ThousandEyes eliminates obscurity, bringing transparency and observability into the most complex IT environments, thus unlocking accelerated innovation. Read about the platform’s new capabilities at Gestalt IT, or watch the presentation on the website.
Read More:
Drilling Down Into the Invisible Parts of the Network With ThousandEyes
You Are Your APIs
In this article, Alex Neihaus discusses the emerging category of API security products and the potential security vulnerabilities posed by APIs. He highlights Noname Security’s product, which was outlined at Security Field Day 9. Alex is impressed with the capabilities of Noname’s API security solution, including its ability to analyze network traffic and categorize APIs based on public domain names. The post emphasizes the importance of API security in protecting businesses and encourages readers to consider adding API security to their security product arsenal.
Read More:
StorPool – Storage Delivery With Commodity Hardware the Right Way!
In this Gestalt IT Tech Note, Chris Childerhose discusses how StorPool is disrupting the storage scene with its software-defined storage solution. The platform overcomes the challenges faced by IT teams by allowing the use of any hardware while managing it homogeneously. With broad compatibility and being a fully-managed storage solution, StorPool aims to meet the needs of various sectors, including private/public clouds and managed service providers. Its unique architecture, data integrity, scalability, and hardware-agnostic approach set it apart in the storage market, offering cost savings and simplifying datacenter design. Rear more in this article, sponsored by StorPool Storage!
Read More:
StorPool – Storage Delivery With Commodity Hardware the Right Way!
Tech Field Day – Storage Field Day 25
Chris Childerhose posted about his experience as a Storage Field Day delegate and also mentions that he had the opportunity to write a blog post about StorPool Storage, emphasizing the value of delivering storage with commodity hardware. Check out his sponsored post at Gestalt IT for more!
Read More:
Tech Field Day – Storage Field Day 25
Login…rinse…repeat
In this LinkedIn post, Alex Neihaus discusses the challenges faced by cloud infrastructure architects, engineers, and developers when it comes to managing access to hosts and databases. He highlights the convenience of storing credentials in insecure locations and the need for a more secure solution. Alex introduces HashiCorp Boundary, a cloud-native infrastructure access management tool presented at Security Field Day that combines scalable proxying and cloud-native network constructs to solve these challenges. He emphasizes its secure and auditable nature, as well as its open-source architecture, which allows for internal examination and trust in enterprise environments.
Read More:
Secrets Are Difficult to Keep
HashiCorp is revolutionizing secrets management with their new offering, HCP Vault Secrets, as highlighted in Karen Lopez’s LinkedIn article. This solution provides organizations with a secure and flexible platform for storing, generating, and accessing sensitive information like API keys and passwords. With features such as tokenization, dynamic secrets, role-based access, and centralized management, Vault Secrets ensures the confidentiality and integrity of secrets across clouds and environments, while also offering auditing and compliance monitoring capabilities.
Read More: