How do you know if you can trust your devices? What if they are the devices transporting data to you? Can you really know for sure? Tom Hollingsworth takes a look at how Cisco is security and validating service provider devices on IOS-XR.
With Cisco Live US happening this week in Orlando, we decided to share a throwback episode featuring Rob Rodgers and Mils Swart of Skyport Systems. Skyport was recently acquired by Cisco in February. It’ll be interesting to see how Cisco uses this talent to address the security concerns raised in this episode.
In this iteration of Gestalt News:
– An IT Origins with the inimitable Rebecca Fitzhugh
– A look at Cradlepoint’s move to subscriptions
– The Gestalt IT Rundown discusses the death of Moore’s Law
This week, Rich Stroffolino and guest co-host Keith Townsend discuss the end of Moore’s Law, Facebook’s GDPR reaction, Skyport Systems acquisition, and Montana’s Net Neutrality workaround.
Security is a dumpster fire, or is it somehow worse? Our esteemed guests discuss whether it’s actually many dumpster fires or some other form of refuse conflagration. It’s an invaluable and inflammable discussion.
The first Networking Field Day event will be held January 18th-20th with a second set for September 27th-29th. In addition, two Tech Field Day Extra Events will be held in Las Vegas at Interop and Cisco Live US on May 22th-24th and June 26th-28th, respectively. Check out the Networking Field Day site for videos of past events and great coverage from their delegates.
Jon Langemak of Das Blinken Lichten comments: The traditional security model has put significant emphasis on what’s typically called the ‘external edge’. That is, the connection between your network and any third party network. This is also where we create a delineation between ‘trusted’ and ‘untrusted’ networks. Regardless of how you define this boundary, it […]