network security

untitled

Trust But Verify: Lossless End-To-End Visibility from Ixia

Tap everywhere. Tap everything. Trustworthy visibility is the key to network monitoring and security.

This is Ixia’s approach for how networking professionals can get an accurate picture of what’s really going in the network, and this was the theme of Ixia’s presentation at Networking Field Day 13.

(more…)

Information Security: Something Doesn’t Add Up

My experience leads me to think that information security is, in actual practice, more a matter of reacting to something bad that happened in the news shaking up the C-level enough to do something. But I don’t think the solemn promises of tighter security and subsequent actions match up. I may not be able to spot a tell like Patrick Jane, but something doesn’t seem right.

(more…)