An awareness month you should celebrate all year

In the month dedicated to more awareness topics than any other, you won't want to miss out on National Cyber Security Awareness Month (NCSAM). While you won't likely see sporting events with athletes sporting uniform accessories with neon green of NCSAM's logo (well, maybe the Seahawks...), you might be surprised to know that this year [...]

Taking Network Management Local to Enable REAL Automation

Despite decades of advancements in network speed, reach and security, the management of network devices is still a hands-on task. It involves reactive and often tedious actions open to human error. Traditional Network Management tools rely on the network itself to manage critical devices. This dependence on the network to manage the network is a [...]

Will Google drive your car before you automate network management?

The reason people don't trust network automation is that it relies on the network itself to manage the network. Like the sensors atop a driverless car with the processing and brains in the trunk, Uplogix deploys in the rack with network infrastructure for network-independent monitoring and management, and tighter security. For years, the answer to [...]

Three ways that network management is like a horror movie

Network management is kind of like a horror movie. Go with me on this -- in a horror movie only a few hearty and clever survivors get to the see the sunrise, or the sequel. Network management has many hands-on components that tend to weed out those not able to remember an obscure command to [...]

Config changes: damned if you do, damned if you don’t

Cisco alone averages more than one “significant” security advisory a week that requires an upgrade or configuration change. The Digital Energy Journal says the lack of security patch upgrades are the biggest threat to energy infrastructure. Yet Gartner says that over 40% of all network outages are due to human error – mostly from configuration [...]

The risk and pain of configuration change

To update or not to update. Too often it's the question asked in IT. Even when the answer is that yes, you should update. Security patches, OS upgrades and password updates take time and effort, and often provide an opportunity for introducing errors. Enterprise Management Associates estimated upwards of 60% of network downtime is caused [...]

Locking down long-time vulnerabilities

Don't worry -- National Cybersecurity Awareness Month isn't until October, you still have many months to plan that perfect awareness event. But this month we're going to focus on the security topic because you need to be aware of security every month. Today we're going to talk about two forms of critical security vulnerabilities continue [...]

When an “air gap” isn’t enough

The remote nature of offshore drilling platforms used to ensure the safety of their networks from the world wide web with three W's of another sort: a physical barrier of waves, wind and water. On-board, the "air gap" between vessel control systems, process control systems and data networks is shrinking as these become increasingly linked [...]

That’s our point, entirely

Incremental improvements to traditional network monitoring tools would really be like putting lipstick on a pig - you would still have a flawed solution.  A recent article on The Register entitled "What's wrong with network monitoring tools? Where do I start..." was all about incremental improvements to traditional network management methods. These improvements just point out [...]

DARPA Grand Challenge targets automated cyber security

A view of some of the sensing hardware on an autonomously piloted vehicle in the DARPA Grand Challenge. DARPA (the Defense Advanced Research Projects Agency) announced the next focus area in their series of Grand Challenges that have included autonomously driven vehicles, humanoid robotics and now automated network defenses. The Cyber Grand Challenge seeks to [...]