Cisco Security

Why #SecurityEverywhere M&A strategy by Cisco is Remarkable

Reading the recent news from Cisco about its intent to acquire OpenDNS made to think about the strategy behind this group of acquisitions that the company have been doing since 2013. Every report that you read about Cybercrime is saying the same: Hackers don’t sleep, and they are always finding new ways to steal your data, or to crack your Mobile device, or use your laptop or computer like part of a highly sofisticated botnet. For example, there is the report from Juniper Research that said that “Cybercrime will Cost Businesses Over $2.1 Trillion by 2019″, where they found found that the majority of these breaches will come from existing IT and network infrastructure, but there is an increasing interest in the Internet of Things (IoT) and mobile devices, so to be prepared for this inmmediate future, organizations need to be creative, looking for the best platforms to be protected. And to which company they will begin to look? That’s why Cisco wants to become in the de-facto partner to call, covering every corner of the Security business. How they are doing this? Keep reading.

Continue reading

Duo Security + Gem = Bitcoin Security

Duo Security + Gem: Zero Trust for the Cryptocurrency World (aka: Bitcoin)

Some days ago, I was talking with a friend of mine about new technologies which could redefine in the upcoming years how we will work, live and make business, and certain word came to the conversation like a bomb: Bitcoin. I’m an avid reader for tech news and sites, spending a lot of time reading articles from Nathaniel Mott at Pando about Security and Net neutrality, discussing topics from a recent article from First Round’s Review (BTW: the last one about Hacking Sales with Inbound Marketing is amazing), and many others good resources about tech. I trust in Pando like a one of the best and sincere platforms for sharing information about Startups, Venture Capital and more topics. So, when I began to search information about what is Bitcoin, and which companies are working hard in this space, so I went again to Pando looking for the basics. Following this idea, I found very interesting articles from Dennis Keohane, talking about the new funding raising of Circle, one of the most interesting Bitcoin startups:

“With Goldman Sachs’ investment, Circle — and by proxy Bitcoin — gets a huge uplift in visibility outside of the smaller venture capital community. While General Catalyst and Accel carry weight in the world of entrepreneurs and fast-growth startups, the approval of a multinational investment bank like Goldman, even with all its baggage, is a signal of Bitcoin’s arrival in the consciousness of the financial world at-large.”

or one of Michael Carney (right now he is a partner at Upfront Ventures) talking about Gem, the Bitcoin Security startup based in Venice, California:

Gem’s stated goal has been to eliminate the learning curve for bitcoin developers, while allowing the industry to adopt best-in-class security standards to store, encrypt, and backup end user bitcoin assets, without deep expertise in cryptography or security. The company’s API does exactly this by making a comprehensive set of security solutions available at the push of a button. Crucially, Gem never needs to take possession of end-user funds, meaning that relationships between consumer and developer go un-interrupted.

These articles made me to wonder why Bitcoin doesn’t reach a major adoption for consumers, and I began to getting deep in this though, and after a deep information search, the answer came in front of me: “The Blockchain needs more to become in a more secure horse and Bitcoin companies need to be more serious with users credentials security”, and it seems that it matters for a broad adoption.

Then, I started to search more focused in this problem, looking for info about Bitcoin hacks around the world, and for my surprise, the list is very large. Even, there is a forum topic at Bitcointalk describing a very good complication of the most famous hacks and heists. One of the most famous hacks was Mt. Gox Bitcoin exchange, giving to hackers the shocking number of $460 Million; so when you see creepy things like this one, you become in an instant skeptical person about Bitcoin; but this idea is changing quickly with companies like Circle, Coinbase and Gem; because they are putting an incredible grade of resources and expertise to create Bitcoin-based secure platforms.

Continue reading

Duo Security

Duo Security: the company you need to protect your Mobile users

If you read my last post about how I integrated Redis, PostgreSQL and Neo4j, you should have noted that I use CentOS with SELinux activated in all my servers, because I know the costs behind a massive data theft, and all we have learnt this in a hard way. If you are in tech, you should remember the hacks at Target, Sony Entertaiment, Home Depot; the recently discovered vulnerabilities like VENOM, FREAK and the Logjam bug; or the news from Google shutting down its Chrome platform; or the news about the massive security risks in Lenovo’s PCs; or the three vulnerabilities discovered in Internet Explorer and the Trapwot Marlware by Palo Alto Networks’s Unit 42 Threat Intelligence team (BTW: incredible newsletter focused in Security alerts) and the list grows exponentially with time.

It´s not just in U.S; in the APAC region, the cyber battle is ruthless too. FireEye released an amazing research report in April describing how a cyber threat group (they called APT30) exploited governments and commercial entities across Southeast Asia and India for almost a decade, and more recently they worked with Microsoft in a new report, where they exposed a new Obfuscation tactic used on Microsoft TechNet, where they determinated that APT17, a China-based advanced persistent threat group was behind the attempt. This battle is getting more serious every second in every corner of the world, and there is one particular area where attacks are more sophisticated and common: targeting Mobile users and apps.

If you are one of my loyal readers, you should know that I’m a Statistics fan, and precisely, the numbers about cybersecurity in the well known Mary Meeker´s 2015 Internet Trends Report are simply shocking (Slides 88 and 89):

and there are many companies which are Mobile-First companies that are vulnerable to all this. But, my friend, still there are people out there which is working very hard to help you to secure your Mobile apps. FireEye for example, made a strategic partnership with Samsung Knox to protect Galaxy S6 users, based in their mobile threat protection products; already I’ve talked about Lookout and Palo Alto Networks, Red Hat’s approach to make the best Enterprise Linux distribution with a big thinking in security, OpenDNS with its Umbrella platform for protecting user from many forms of attacks in your corporate network, and more vendors. But, I will talk here about a new competitor in the space which is redefining how Mobile-First companies like Facebook, Uber, Etsy, are securing their respective apps with Two-Factor Authentication (2FA), and it seems they are doing a very good job on it, because every day, many organizations are more interested in the services they provide. Surprisingly for me, they are not based in California, their HQs are in Ann Arbor, Michigan and its name is: Duo Security.

Continue reading

Integrating Redis, PostgreSQL and Neo4j in CentOS 7

Recently, working for a new client here at UCI, we began to think in an internal Social Network, focused in educational purposes where students, researchers, teachers and more, could have an online space to discuss trends, make comments, give online talks, etc. My team was in charge to define the Data Model of the platform, and of course, to define the completed strategy to the new Data infrastructure behind the platform. We are a big fans of CentOS (and RHEL of course), for its incredible stability, performance and amazing security features through SELinux, the security project sponsored by Red Hat, available in many Linux distributions today, but in CentOS and Fedora, there is the last policy version (# 28) which is the most updated version of it.

We began to dig in the data model, and we saw an opportunity to create a new kind of data storage solution, using PostgreSQL like the center of the hub; but making interactions with NoSQL solutions focused in fast in-memory read/writes and of course, to be able to store the social interaction among the members of the network like a graph. So, we began to test Redis and Neo4j for these particular tasks. This post is to explain how we did it.

Continue reading

10-companies

10 Companies with Mobile-related services to skyrocket your Career

Thinking in testing the LinkedIn’s blogging platform, I was planing since the last week to publish a post about Career Management, and talking to my one of my friends, came the idea to create a list of 10 companies with Mobile-related services to skyrocket a professional career. This kind of post is perfect for LinkedIn, so I made two. You can visit my LinkedIn’s profile to read them:

Enjoy them and let me know what do you think with a comment in the posts. Thanks for reading.

Location matters for MobileAds

SEA Thoughts: Mobile Enterprise opportunities and Venture Capital

If you are one of my followers at Twitter, you should note I’m a big believer of the Southeast region. I’m always reading and looking for interesting news from this group of countries. One of the numbers that have impressed me is the accelerated growth of Mobile subscriptions. This area has an amazing potential to grow almost every industry which could take advantage from Mobile devices, apps and its related ecosystem. All these trends are being heard and used by entrepreneurs and investors, and everyday we hear a new Venture Capital deal from well known investments firms. So, I want to start a new section in the blog called: SEA Thoughts, where I will expose interesting news related to Mobile, Cloud and Big Data Analytics sectors in Southeast Asia, and this is my first post focusing in one of my favorite sectors: Mobile.

Continue reading

Buffer

What I Learned using Buffer for my own Social Media Marketing Strategy

If you are one of my followers at Twitter (@marcosluis2186), you should note that I’m a Buffer fan. This incredible tool and its ecosystem has allowed me to grow my personal brand in every major Social Media platform using its clean UI and its powerful analytics dashboard. I’ve been using Buffer for a while since I returned from my previous work in Venezuela, where I was a HootSuite Ambassador for LATAM. Don’t make wrong: HootSuite is a great Social Media Management platform, but it’s not made for my country, for the characteristics of Internet connections here, and HootSuite is based in Adobe Flex and ActionScript, which is very heavy in terms of network data use and speed here; instead Buffer which has a clean and simple dashboard with a small fingerprint using HTML5 and CSS 3 mainly, united to they use Amazon CloudFront like its CDN to distribute its static files around the world, and it’s works great. But these are not the unique features why I use Buffer everyday now; there is more benefits if you get in this boat. Keep reading.

Continue reading