NetScout’s Great Blunder: Suing Gartner

NetScout, a vendor of network management tools, has filed a suit against Gartner claiming that Gartner has a “pay-to-play” business model. The suit states that Gartner made false and defamatory statements regarding NetScout, causing substantial injury to NetScout. It says that NetScout suffered the consequences based on its placement in Gartner’s latest Magic Quadrant (MQ) report Network Performance Reporting and Diagnostics…

Details

Is Russia Poised to Retaliate Against Sanctions With Cyber Attacks?

Way last April, a time when the world seemed a more peaceful place, Leon Panetta and Richard Clarke were quoted warning of impending Russian cyber attacks in the wake of an escalating response from the West to Russia’s intransigence in the Ukraine. While there have certainly been a spate of defacements that are two sided…

Details

NSF Cybersecurity Ideas Lab: Some Ideas Worth Considering

This past February I participated in an amazing three day innovation and ideation lab pulled together by Farnam Jahanian, Assistant Director, Directorate for Computer and Information Science and Engineering, National Science Foundation (NSF), with a lot of help from an organizing committee drawn from some of the most intelligent technology people around. The task at…

Details

General (Ret.) Keith Alexander Pivoting to the Enterprise

According to a report in Foreign Policy, former NSA head Keith Alexander has ideas. Ideas he wants to patent and turn into a business.  Admittedly, Alexander has had exposure to countering network borne attacks. In particular, he was in charge of the team at NSA that detected the presence of the Agent.btz worm on the…

Details

The House Committee on Homeland Security Passes Three Cybersecurity Bills

The House Committee on Homeland Security passed three cybersecurity bills with broad bipartisan support on Monday. The Critical Infrastructure Research and Development Advancement Act of 2013 amends the Homeland Security Act of 2002. The bill directs the Department of Homeland Security to develop a strategy for developing technology to be used in protecting critical infrastructure…

Details

Announcing the Marriage of the IT Security Office and the Network Management Group

Ok, maybe it’s not a marriage but more along the lines of living together. In a previous article, I spoke about moving to a Continuous Monitoring security model, which focuses on monitoring outbound traffic. As we move to completing our monitoring infrastructure, I’ve been pleased with the results so far and excited by the challenges discovered…

Details