Richard Stiennon

Chief Research Analyst

IT-Harvest


Reducing Time-to-Resolution With Network Analytics

Posted on: 18 Apr 2017

This series of articles and the accompanying videos are part of an ongoing project to illuminate the people, products, and vendors that make up the IT security industry. The vendors paid for the video production. When Boeing acquired Narus in 2010, it was one of the few acquisitions of a Silicon Valley IT security company…

VENOM Vulnerability Could Take Bite Out of Your Week

Posted on: 13 May 2015

The greatest fear of anyone running a virtual machine especially in a shared hosting environment is that an attack against one VM could jump the wall and impact the other VMs on the same machine; a so called guest escape. CrowdStrike, a vendor of host-based security solutions, announced today that one of its Senior Security…

Clean Pipes At Last: Zscaler Introduces Cloud Firewall

Posted on: 14 Apr 2015

In 1995 a small security reseller in Southfield, Michigan, introduced possibly the first “cloud” based firewall: Check Point FW1 running on Sun Netra boxes in their small data center. Netrex would configure T1 connections from their customers’ routers to their data center and manage all of the firewall policies for them. As they developed their…

The Sony Breach is Not The Government’s Problem

Posted on: 19 Dec 2014

If the first indication that you have been hacked is your screens going blank or displaying an attacker’s message you are in real trouble. Another indicator that your organization does not understand cyber security is a call from the FBI to inform you that you are the source of a massive credit card theft. Both…

Splitting Symantec is the Right Thing To Do – Now it is Intel’s Turn

Posted on: 10 Oct 2014

The current flurry of breakups in the tech sector is gratifying to watch. The only conglomerate strategy I have ever seen work effectively is Alfred P. Sloan’s revolutionary “centralized decentralization” which allowed General Motors to become the dominant car manufacturer for decades. Roger Smith, the epitome green-visor accounting executive, destroyed that company by re-centralizing the divisions.…

The Thanks-Rob Worm to Come

Posted on: 25 Sep 2014

By now you have heard about a new bug in one of the most popular Unix shell programs, the Bourne Shell, or bash.  If you run Mac OSX you probably have used bash, it is the default terminal app. Shellshock is a “bug” in the way Heartbleed is a “bug.” A mistake in implementing code.…

Global Border Gateway Protocol (BGP) IP Tables Peak Past 512K

Posted on: 13 Aug 2014

We all knew it was coming. As more and more networks are created and the IP address space is subdivided more and more the global routing table that backbone routers have to store in memory grow. Many older routers only have 512K of memory. If the size of the table exceeds that, the routers start…

LinkedIn Scammer Techniques Are Getting Scary

Posted on: 12 Aug 2014

This is an update to the article  about identifying LinkedIn scammers when they request a connection. In that article we listed six ways to identify fake accounts: 1.Look at that URL. If it indicates that this is a new account (anything over 300 million right now) be very suspicious. Other than your kids do you know…

NetScout’s Great Blunder: Suing Gartner

Posted on: 11 Aug 2014

NetScout, a vendor of network management tools, has filed a suit against Gartner claiming that Gartner has a “pay-to-play” business model. The suit states that Gartner made false and defamatory statements regarding NetScout, causing substantial injury to NetScout. It says that NetScout suffered the consequences based on its placement in Gartner’s latest Magic Quadrant (MQ) report Network Performance Reporting and Diagnostics…

Is Russia Poised to Retaliate Against Sanctions With Cyber Attacks?

Posted on: 07 Aug 2014

Way last April, a time when the world seemed a more peaceful place, Leon Panetta and Richard Clarke were quoted warning of impending Russian cyber attacks in the wake of an escalating response from the West to Russia’s intransigence in the Ukraine. While there have certainly been a spate of defacements that are two sided…