Author: Blog

  • Server Load Balancer Performance in the Face of Malicious Traffic

    The other day I actually had a bit of time on my hands to sit down and have a sandwich at lunch, so I figured I would jump online. After I had iwconfig‚d ath0 with my SSID and WPA2 Key, associated with my access point, and sent my DHCP request to the broadcast address of my Linksys router, I bothered Comcast’s DNS server with a CNAME query to get a handful of viable IP Addresses that are, for all intents and purposes, mirrors of Yahoo.

  • Mobile Network Security: Understanding the Threat

    According to Cisco CTO Padmasree Warrior, the number of devices connected to the Internet will reach 1 trillion in 2013. That is up from 500 million in 2007. Walking around during the last few conferences I’ve attended and seeing all the iPads, iPhones and Androids in the hands of folks, I would have thought that number had already been reached. And although this interconnectivity can help us in a variety of ways, whether for work or fun, it also increases the risk landscape. During the past several weeks I’ve been privy to several conversations about mobile network security and performance, through analyst briefings, press meetings, our recent webcast and more. The topic has been on my mind a lot and not surprisingly the news is filled with stories. Two came across my feeds just this morning.