We are mobile, our devices are mobile, the networks we connect to are mobile
and the applications we access are mobile. Mobility, in all its iterations,
is a huge enabler and concern for enterprises and it’ll only get worse as
we start wearing our connected clothing to the office.
If the last 10 years wasn’t warning enough, 2017 will be a huge year for
mobile…again. Every year, it seems, new security opportunities, challenges
and questions surround the mobile landscape. And now it encompasses more than
just the device that causes phantom vibration syndrome, it now involves the
dizzying array of sensors, devices and automatons in our households, offices
and municipalities. Mobile has infiltrated our society and our bodies along
So the security stakes are high.
The more we become one with our mobile devices, the more they become targets.
It holds our most pr... (more)
The mad dash to connect virtually every noun to the internet or the Internet
of Things is creating a massive M2M network for all the devices, systems,
sensors and actuators to connect & communicate on the Internet.
With that, they need a communications protocol to understand each other. One
of those is Message Queue Telemetry Transport (MQTT). MQTT is a “subscribe
and publish” messaging protocol designed for lightweight machine-to-machine
(or IoT) communications.
In this episode of Lightboard Lessons, I light up how MQTT works.
IoT Ready Infrastructure IoT Effect o... (more)
A Little History
Application Delivery got its start in the form of network-based load
balancing hardware. It is the essential foundation on which Application
Delivery Controllers (ADCs) operate. The second iteration of purpose-built
load balancing (following application-based proprietary systems) materialized
in the form of network-based appliances. These are the true founding fathers
of today’s ADCs. Because these devices were application-neutral and resided
outside of the application servers themselves, they could load balance using
straightforward network techniques. In essen... (more)
I recently recovered from ACDF surgery where they remove a herniated or
degenerative disc in the neck and fuse the cervical bones above and below the
disk. My body had a huge vulnerability where one good shove or fender bender
could have ruptured my spinal cord. I had some items removed and added some
hardware and now my risk of injury is greatly reduced.
Breaches are occurring at a record pace, botnets are consuming IoT devices
and bandwidth, and the cloud is becoming a de-facto standard for many
companies. Vulnerabilities are often found at the intersection of all three
of the... (more)
Security Trends in 2016: Securing the Internet of Things
Whenever you connect anything to the internet, there is risk involved. Just
ask the millions of IoT zombies infected with Mirai. Sure, there have been
various stories over the years about hacking thermostats, refrigerators,
cameras, pacemakers, insulin pumps and other medical devices along with cars,
homes and hotel rooms…but Mirai took it to a new level.
And it’s not the only IoT botnet out there nor are these nasty botnets
going away anytime soon. There’s a gold mine of unprotected devices out
there waiting to either ha... (more)