35 Burst results for "7%"

Tolvanen scores twice, Kraken beat Predators 7-2

AP News Radio

00:35 sec | 10 hrs ago

Tolvanen scores twice, Kraken beat Predators 7-2

"That cracking age closer to a playoff birth with a 7 two thrashing of the predators. Ellie tolvan and scored twice to back Philip grubauer, who needed to make just 14 saves. Everybody was committed to playing defense and locking really important charts that I think gordo had, one of the best period on Duchenne, I think of us. Yeah, those plays a huge Jerry McCann had a goal and two assists to Seattle prevented Nashville from making a move in the wild card race. The kraken hold the top wild card birth, and the predators are behind the jets for the second. Matt duchene and Tyson Barry each had a goal and an assist for Nashville. I'm Dave ferry.

Philip Grubauer Jerry Mccann Tyson Barry Matt Duchene Ellie Tolvan Dave Ferry Twice 7 Two Assists Each Second 14 Saves ONE Gordo TWO Nashville Duchenne Seattle An Assist A Goal
Ukraine says battle for Bakhmut is 'stabilizing'

AP News Radio

00:39 sec | 15 hrs ago

Ukraine says battle for Bakhmut is 'stabilizing'

"Ukrainian top commander has said his forces are pushing back against Russian troops in the battle for a town in eastern Ukraine. The commander said the situation in bakhmut is being stabilized in a battle which can only be described as long and grinding, British military intelligence said Russia appears to be moving to a defensive strategy in eastern Ukraine. The 7 month battle for bakhmut were Russian forces have closed in on three sides, is the longest clash of the war, Russian forces must go through bakhmut to push deeper into parts of the eastern donbas region, though western officials say that the capture of the city would have limited impact on the course of the war. I'm Karen Chammas

Karen Chammas Three Sides Eastern Ukraine Russia Russian Ukrainian British 7 Month Eastern Donbas Region Bakhmut Commander
God Can Work Anything to His Glory

The Bible Recap

02:01 min | 1 d ago

God Can Work Anything to His Glory

"Before we launch into today's recap, we need to remember something we read in deuteronomy 20 to help it all make sense. In that chapter, God gave very different instructions on how the Israelites were supposed to handle cities outside of the promised land versus cities inside the promised land. For cities outside Canaan, they were supposed to greet the cities with peace and kill only the males, and only if they opposed them. But for those inside Canaan, they were supposed to operate by a principal called cherem, where everything is dedicated to yahweh and devoted to destruction. As we've talked about before, God used this practice to serve multiple purposes. Today we meet another group of people from gibbon. They're called the gibby and ice or the hivites, and they've apparently gotten word of God's instructions to the Israelites. They lived in Canaan, but decided to pretend like they didn't, so they could get the more lenient treatment and not be entirely destroyed. Pretty sneaky, they ask Israel to enter into a protective covenant with them. Remember yesterday how Joshua won the battle against Jericho, then failed to ask God for guidance when fighting against AI, and they lost, then he won against AI when he followed God's commands, it seems like he learned very little from that incident because here he is, failing to ask God for guidance again, and just forging out on his own. So he gets duped into making a covenant with his enemies, which is in direct violation of God's commands to Israel in deuteronomy 7. Pretty quickly, the Israelites find out they've been deceived, and they want to destroy the gibby a nights. But the israelite leaders tell them that they have to keep their covenant and that they'll just have to sever the consequences of their sin and entering into the covenant. But they don't kill the gibby knights slash hivites, and instead just assign them to do manual labor in the service of the temple, which makes the gibby a nights pretty happy because they know they've avoided being destroyed. One thing I find interesting about this is that even God's enemies who have deceived God's people end up serving God's purposes and glory.

Joshua Canaan Today Yesterday Israel Israelites GOD Deuteronomy 20 One Thing Israelite Deuteronomy Jericho Gibbon 7 Yahweh
Creighton ends Princeton's March Madness run with 86-75 win

AP News Radio

00:38 sec | 1 d ago

Creighton ends Princeton's March Madness run with 86-75 win

"San Diego state and creighton will play in the south regional final on Sunday. Top seed Alabama will not after the 5th seated Aztecs knocked off the crimson tide. 71 64. San Diego state held Brandon Miller to 9 points on three of 19 shooting. All while darian tremel was providing 21 points for the Aztecs. I knew what kind of covers they were in as far as ball screens. And that's something I was working on all week. The Blue Jays are in the elite 8 for the first time after beating Cinderella Princeton 86 75. Ryan kalkbrenner scored 22 points of creighton 6th win in 7 games. Baylor shireman made 5 threes and scoring 21 points. I'm Dave fairy.

Brandon Miller Ryan Kalkbrenner 21 Points 9 Points 22 Points 7 Games Sunday First Time Darian Tremel 19 8 Blue Jays 6Th Win Diego Dave Fairy Creighton San Diego 5 Threes Three 71
Hakeem Jeffries Lies, Saying Republicans Don't Want to Teach the Holocaust

Mark Levin

01:11 min | 1 d ago

Hakeem Jeffries Lies, Saying Republicans Don't Want to Teach the Holocaust

"And Hakeem Jeffries said something that I thought was quite appalling I want you to listen to this clip Cut 7 mister producer 7 go They want to ban a book called mouse It's about the horrors of the Holocaust And egregious crime against humanity that we should never ever forget 6 million Jews exterminated They want to ban mouse A book about the Holocaust What's so offensive in that book Let me read a passage They took us from our papers Our clothes and our hair we were cold And we were afraid Extreme mega Republicans don't want the children of America to learn about the Holocaust That's not the position of the Republicans It's not a single Republican in the House of Representatives who supports that view Not one

Hakeem Jeffries House Of Representatives Holocaust 6 Million America Republican Republicans Jews Single
4 ex-cops charged in Tyre Nichols' death barred from police

AP News Radio

00:52 sec | 1 d ago

4 ex-cops charged in Tyre Nichols' death barred from police

"A Tennessee commissions voted to strip away police powers from four of the 5 officers fired and charged in the deadly beating of motorists Tyree Nichols in Memphis. The peace officer standards and training commission has voted to decertify three of the 5 officers arrested in connection with the fatal beating of Tyree Nichols in January. A fourth officer, Desmond mills, voluntarily surrendered his certification. His lawyer said it's meaningless at this point, and that his time was better spent defending his client, saying mills was wrongly indicted on the second degree murder count. The lawyer for another fired officer maintained that Nichols was violent during the stop. The Memphis police department had requested the decertification of 7 former officers, including a supervisor who retired before he could be terminated. I'm Jackie Quinn

Tyree Nichols January Nichols Memphis Jackie Quinn 7 Former Officers Three Fourth Officer 5 Officers Second Degree Four Desmond Mills Tennessee Memphis Police Department Mills
Gwyneth Paltrow expected to testify in ski collision trial

AP News Radio

01:00 min | 1 d ago

Gwyneth Paltrow expected to testify in ski collision trial

"Actor and entrepreneur Gwyneth Paltrow is expected to testify at her Utah trial of her man's claims that she recklessly collided with him on a ski slope years ago. Retired optometrist, Terry Sanderson, is asking a ten member jury to award $300,000 in damages, saying Gwyneth Paltrow broke four of his ribs and left him with a concussion and lasting injuries when the Oscar winner ran into him on a beginner ski run at deer valley resort 7 years ago, Thursday's testimony featured medical experts a ski companion and his daughter polygraph, who said she noticed bringing post concussion symptoms, Paltrow's attorney, Steve Owens, questioned Gresham, about emails in which Sanderson mentioned Paltrow's celebrity, and GoPro footage of the incident that is still missing and was not presented at the trial. He's famous because he collided with a celebrity, right? That's how I take that. Paltrow says Sanderson caused the crash, and his countersuing for attorney's fees and a dollar. Next week, Paltrow's team is expected to call medical experts ski instructors and her two children Moses and Apple. I'm Jennifer King

Steve Owens Jennifer King Terry Sanderson Gwyneth Paltrow Paltrow Sanderson $300,000 Thursday Next Week Two Children Utah 7 Years Ago Gopro Moses Gresham Ten Member Jury Oscar Years Apple Deer Valley
Sex trafficking plea deal unending 'nightmare' for Texas mom

AP News Radio

01:08 min | 1 d ago

Sex trafficking plea deal unending 'nightmare' for Texas mom

"A Texas mother says she'll never stop fighting to get justice for her daughter, who was sex trafficked by two men who received probation under a plea deal she's questioning. For San Antonio mother erma Reyes. Like a nightmare that I can't wake up. In 2017, her teenage daughter was put in rehab for substance abuse, but she ran away in days later, advertised online as being available for dates with men. Two men were allegedly renting her and another girl out for sex. And taking half their money, the men were arrested, San Antonio detective, Manuel and Guiana says they had solid evidence from video receipts and cell phone data. I don't think I've ever worked a case that had more evidence or actually work done on it. After years of delays and changes in prosecutors, the two suspects pleaded no contest. And wound up being sentenced to 7 years probation. It's one of many sex trafficking cases in Texas under the office of attorney general Ken Paxton. Now, under scrutiny. I'm Jackie Quinn

2017 Erma Reyes Two Men Jackie Quinn Ken Paxton Manuel Two Suspects 7 Years Texas San Antonio Guiana ONE Half Their Money General
Gonzaga beats UCLA 79-76 in Sweet 16 on Strawther's shot

AP News Radio

00:41 sec | 2 d ago

Gonzaga beats UCLA 79-76 in Sweet 16 on Strawther's shot

"Gonzaga is headed to the elite 8 after Julian's trout there's three pointer with 7 seconds to play help send the third seeded bulldogs to a 79 76 west regional semifinal win over second seeded UCLA. Strauder's three pointer answer to Mari Bailey's three and it helped Gonzaga overcome a 13 point halftime deficit. Those are literally the moments you dream of, you know, just to even make a shot like that in March Madness. And then just to be back home in Vegas, it's like the cherry on top. Drew Timmy scored 36 points for Gonzaga, who will take on fourth seeded Connecticut on Saturday after the huskies beat 8 seeded Arkansas 88 65 behind 24 points from Jordan Hawkins. I'm Adam spelling.

Drew Timmy Mari Bailey Jordan Hawkins 13 Point Julian 36 Points Vegas Saturday 7 Seconds 24 Points Ucla Three Adam 65 Three Pointer 8 Strauder Third Seeded 79 March Madness
Pastrnak gets 49th goal, Bruins top Montreal, 5th win in row

AP News Radio

00:31 sec | 2 d ago

Pastrnak gets 49th goal, Bruins top Montreal, 5th win in row

"The bruins made it 5 straight wins by doubling up the Canadians four two. David pasternak notched his 49th goal and the bruins 55th win. 7 off the NHL victory record with 11 games remaining. Pasternak also had an assist, giving him 95 points. Tyler bertuzzi had a goal and an assist, Jake de brus scored on a breakaway and David Crecy added an insurance goal. It was bertuzzi's first goal since joining Boston this month. Jeremy swayman stopped 29 shots for the bees, allowing power play goals by Nick Suzuki and Kirby dock. I'm Dave ferry.

David Crecy Jeremy Swayman Pasternak Jake De Brus 29 Shots 11 Games 95 Points Bertuzzi Tyler Bertuzzi Nick Suzuki David Pasternak First Goal Kirby 5 Straight Wins Dave Ferry 49Th Goal This Month NHL TWO 55Th Win
Forthcoming Clarity

Pray the Word with David Platt

01:49 min | 3 d ago

Forthcoming Clarity

"John chapter 13 verse 7. Jesus answered him. What I am doing, you do not understand now. But afterward, you will understand this first has meant so much to me over recent years amidst challenges and trials of various kinds to use language from first Peter. And I just want to encourage you with it today, especially if you were walking through challenge trial in your life. In any way, this picture of Jesus washing his disciples feet and Simon Peter sang. You're in a wash my feet and he's resisting what Jesus is wanting to do in his life. And she just looks at him and says, what I am doing, you don't understand now, but afterward, you will understand. And there was a moment. I was a year plus ago, and I was walking through something in an older brother in Christ, I passed her for decades who I respect deeply. I was sharing with him some of the struggles that I was walking through and he looked at me and he just quoted this verse and he said, David, you don't understand now what God is doing. But afterward, one day, you will understand. I was talking to another pastor friend later that exact same day who said something very similar. He'd been studying heaven and he said David I just don't think based on what the Bible teaches about who God is, what heaven is like, that we're going to get there one day and God's going to say to us, you know that trial, that difficulty, that challenge you walk through. Yeah, I don't know what that was about. No. And one day, we're going to understand that God was working in ways we couldn't see and didn't understand. But all throughout that challenge and trial, he was faithful, and he was wise. He was loving toward you.

David Peter Jesus Bible Simon Peter Today First Christ A Year Plus Ago Chapter 13 Verse 7 John GOD One Day Decades
Gavin Newsom Vacations While California Citizens Suffer

The Officer Tatum Show

01:19 min | 3 d ago

Gavin Newsom Vacations While California Citizens Suffer

"Okay, Jennifer, you were telling us about the 21 people that were stuck in a big bear, I believe, I believe it was. Homeboy Gavin Newsom decided to take a vacation, people were stuck literally with their lives threatened essentially. They didn't have the proper equipment to dig themselves out. Gavin Newsom goes on a vacay, but you were telling us about helicopters. Remind us of what you were saying right before the break. Right. So there's a volunteer organization called Cal dart, and they run rescue missions when there's natural disasters. They've been involved with the state for decades. So it's not just like some random group of pilots that nobody knew, right? So they know how to operate in these conditions. And they were trying to bring medicine and food and things that to the mountain, and they were denied 6 flights on one day where it was clear were denied and then two more days went by with bad weather with people stuck. There was one man who couldn't get down the mountain for his dialysis treatment because all these people were stuck for 7 days while it was snowing. So by the time it stopped knowing they'd already been stuck a week. And so this guy was already kind of getting in bad shape. He couldn't get down there. And then they tried to send a medical vehicle up to get him a medical transport. They wouldn't let the transport up the mountain because the guy didn't live there. The transport driver.

Jennifer 7 Days 6 Flights Cal Dart 21 People One Day Gavin Newsom One Man Two More Days A Week Decades
What's Wrong With Gavin Newsom?

The Officer Tatum Show

01:45 min | 3 d ago

What's Wrong With Gavin Newsom?

"Gavin Newsom is an absolute disaster when it comes to California. I was sitting there thinking, listen, Gavin Newsom is going to challenge Biden. He's going to be the guy most likely, you know, God forbid of Michelle Obama or somebody pops up on the scene, but I don't really foresee that leaving all of her income and all that kind of stuff behind. Is Gavin Newsom still looking towards The White House? It's really seems hard to fathom. Given how disastrous he is, but maybe people don't understand how disastrous this guy has been. I think they don't. And the press just completely plays along with it. And sadly, even our conservative press over the last month or so, I was basically screaming my head off about something happening here in California. We all know he took off to Mexico when we had these snowstorms about what God ignored was that there was this mountain community outside of Los Angeles, big bear Lake arrowhead area San Bernardino mountains, 21 days these people were snowed in under 12 feet of snow. They normally get maybe 6 feet in a winter. So they have some equipment, but not for 12 feet that fall within 7 days. And people were snowed in. Even when they got the main roads, plowed up there, but then within the communities they couldn't get around. I talked to people who were trying to do relief flights out there like helicopter flights of supplies because grocery stores roofs valid so they couldn't get the supplies from there. And the sheriff wouldn't let them land because it was a disaster zone and they weren't government helicopters, but the government wasn't doing anything. Why? Because San Bernardino county voted to study seceding from California and didn't forget it.

Michelle Obama Los Angeles California Mexico 12 Feet San Bernardino 21 Days Gavin Newsom Biden 6 Feet Last Month Under 12 Feet 7 Days White House GOD
What made Beethoven sick? DNA from his hair offers clues

AP News Radio

00:56 sec | 3 d ago

What made Beethoven sick? DNA from his hair offers clues

"Nearly 200 years after Ludwig van Beethoven's death, researchers are searching for clues about his health problems. The legendary German composer had hearing problems and severe stomach ailments, a new study says chronic drinking may have been a factor. You have to live a disease. And this seems to have developed over about the last 6 to 7 years of his life. His first inhabitants in 1821 were the tomb of the tack of jaundice quiz. Researcher Tristan baggett the University of Cambridge says they couldn't figure out what caused Beethoven's hearing loss. That seems to have had an onset in his mid to late 20s. It was a slow progressing form of hearing loss that appears to have been nerve related. Losing his hearing is believed to have limited Beethoven's creative work. He died at 56 researchers pulled genetic clues from Locke's Beethoven's hair that had been snipped off and preserved as keepsakes. I'm Ed Donahue.

Beethoven Ludwig Van Beethoven 1821 Ed Donahue 56 Researchers University Of Cambridge First Inhabitants German 7 Years Nearly 200 Years 6 Locke Tristan Baggett Late 20S MID Last
Japan's Kishida in Poland for talks after visit to Ukraine

AP News Radio

00:55 sec | 3 d ago

Japan's Kishida in Poland for talks after visit to Ukraine

"Japan's prime minister says he will support Poland, which bears an increasing burden due to Russia's invasion of Ukraine. Alongside Polish prime minister Matthias, fumio kushida says he visited Ukraine and conveyed unwavering solidarity of Japan and G 7 directly to president volodymyr zelensky, adding, as this year's G 7 presidency, Japan will work together with Poland to demonstrate leadership. So that's the international community. Can unite and firmly support Ukraine kushida added Japan would offer development assistance in light of the increasing burden on Poland, Japan usually provides the type of promised aid to developing countries which Poland is no longer because Japan can make an exception here. I'm Charles De Ledesma

Charles De Ledesma Volodymyr Zelensky Fumio Kushida Kushida This Year Russia Matthias Prime Minister G 7 Polish President Trump Japan Poland Ukraine
A Prayer for Unsaved Friends

Your Daily Prayer

01:46 min | 4 d ago

A Prayer for Unsaved Friends

"Be willing to go the extra mile to help your Friends receive Salvation in Jesus Christ. When it comes to praying for your Friends, be passionate, asking God to do whatever it takes for them to receive his gift of new life. This truly is a life or death situation where nothing on earth is more important for them than having their sins paid in full by the blood of the lamb. Without it, your friends will be lost forever. Ephesians one 7 explains in him we have redemption through his blood, the forgiveness of sins, in accordance with the riches of God's grace. Let's pray, dear father, we ask you to reach out and reveal your truth to our unsafe Friends, intervene O lord in their lives today, free them from unbelief. Father, please soften their hearts towards you. That their ears be open to hear their eyes to see and their hearts to understand your truth. So they might receive your Salvation through Jesus Christ. Do whatever it takes in their lives lord to bring them to faith in you. As acts for 12 reveals, Salvation is found in no one else, for there is no other name under heaven given, to mankind, which must be saved. Help them to understand that Jesus is the only way to you father and is able to save them completely. Living forevermore to intercede on their behalf. Freedom from unbelief your father and give them a new heart and a new spirit within them. In Jesus name, amen.

Jesus Jesus Christ Earth Today Ephesians One GOD 12 7
Japan, China leaders visit rival capitals in Ukraine war

AP News Radio

00:42 sec | 4 d ago

Japan, China leaders visit rival capitals in Ukraine war

"Japanese prime minister fumio kushida is in Kyiv for talks with Ukrainian president volodymyr zelensky. Kushida began a surprise visit to Ukraine early Tuesday, hours after Chinese president Xi Jinping arrived in neighboring Russia for a three day visit the dueling summits come as the longtime rivals are on diplomatic offensives because she does surprise trip to Ukraine, comes just hours after he met with Indian president Narendra Modi in New Delhi, kushida who's chairing the group of 7 summit in May is the only G 7 leader who hasn't visited Ukraine and was under pressure to do so at home. He's expected to offer continuing support for Ukraine when he meets with zelensky. I'm Charles De Ledesma

New Delhi Charles De Ledesma Kushida Ukraine Three Day Xi Jinping MAY Volodymyr Zelensky Kyiv Ukrainian Early Tuesday Narendra Modi Chinese Indian Japanese Zelensky Prime Minister President Trump Russia G 7
Bitcoin Briefly Tops $28,000 for the First Time in 9 Months

CoinDesk Podcast Network

01:37 min | 5 d ago

Bitcoin Briefly Tops $28,000 for the First Time in 9 Months

"Wendy, can you start us off with some Bitcoin talk? Yes, we actually closed above $25,200 support and flipped it into resistance. And I'm excited. And the current crypto cap, including Bitcoin, is currently at about $1.13 trillion. So yay. And of course, open interest in Bitcoin futures hits yearly high of $12 billion, which makes sense because we have some positive price action. So the dollar value locked in the number of open Bitcoin future contracts is on the rise. Coin glass data shows a nominal value of open interest has reached a yearly high of 12 billion. And that's a 7% gain this month, which again makes sense. Positive price action. Increase in open interest means new money is flowing into the market, but doesn't reveal whether traders are positioning for gains or losses. For that, you can actually check there's a liquidation website you can check, forget what the name of it is offhand, but it'll show you who is getting wrecked. But anyway, for Bitcoin, new money seems to be getting in on gains considering the funding rate or the cost of holding bullish long, very short positions is flipped into green after spending most of the early parts of the Asia trading day in the red. And positive funding rates usually indicate a bullish trend as long as positions compensate short positions. I know that is a mouthful, but I'm excited about Bitcoin prices. Everybody else excited is Bitcoin going to a $1 million. What's going on? Will I see you smiling here? I just love the trade action here this morning. And Bitcoin might go to a $1 million one day. We'll talk about that later. There are some interesting notes for this morning, so Bitcoin is at its highest level in the last 9 months. The highest trading volume since FTX collapsed and the highest D.C. eth ratio since July of 2022.

$1 Million July Of 2022 12 Billion Above $25,200 About $1.13 Trillion $12 Billion Wendy This Month Asia 7% Gain This Morning One Day Last 9 Months Bitcoin Yearly D.C. FTX
"7%" Discussed on 7 Layers

7 Layers

02:16 min | 1 year ago

"7%" Discussed on 7 Layers

"Carbon from our atmosphere the reason why a data center company would opt for greenfield deployment is because a brownfield deployment where the company is retrofitting or replacing. An existing structure can be a more labor intensive project especially if the land was used for industrial purposes previously and needs to be decontaminated if a local government isn't willing to assist in decontamination than data center. Company will be less likely to invest in constructing data center there however datacenter companies are trying to meet certain environmentally conscious standards such as leed certification meeting. Those standards is easier with a brownfield deployment because it avoids the environmental disruption. Founding greenfield deployments and even if the company has to raise an existing building to the ground in start from scratch. At least the ground is already compacted and easier to build a new foundation on recently. I spoke with phil lawson shakes chief innovation officer of alliant a sustainable data center company. And he talked about how brownfield constructions can sometimes be a faster route in making a data center in the interview. He said quote. We have retrofitted a couple of industrial buildings where it was faster to repurpose. What's called a brownfield than it would have been to build a new data center in the reason in our industry we do that. Is that if you build a new building. The time from dirt to having the first customer in there can be longer than just going to the planning office in repurposing the right of us or the purpose of the building so that you can usually fast track your certificate of occupancy basically if you do a brownfield and quote powering. Data center is an issue best resolved before construction begins and in accordance with this episodes focus. Many organizations are pursuing renewable energy sources to make their data centers more environmentally friendly in europe. There is the climate neutral data centre pact. Which has the goal of making data centers climate-neutral by twenty thirty as part of the european green deal a law that aims to make all of the european union climate neutral by twenty fifty signatories of the climate neutral data centre packed include data centre operators in companies that own or operate data centers in the eu. There are twenty two data center. Operators have signed on in fifty seven companies that own or operate data centers in the eu. At least as of this recording in the us the as of now pending.

Founding greenfield phil lawson alliant eu europe us
"7%" Discussed on 7 Layers

7 Layers

05:14 min | 1 year ago

"7%" Discussed on 7 Layers

"It all depends on how an organization wants to spend its money and time. Depending on the service in the network capabilities needed will vary and now a word from our sponsor this episode is brought to you by hp plus in a world full of smart devices. Shouldn't your printer be smart to it is with hp plus these printers. No when they're running low so you always get the inky me delivered right when you needed. Plus you save up to fifty percent on inc so you can print whatever you want as much as you want anytime you want. That is pretty smart. Get six three months of instant inc when you choose. Hp plus conditions apply visit hp dot com slash. Smart for details. Espn market is fairly mature. At this point there are several large corporations that offer..

"7%" Discussed on 7 Layers

7 Layers

04:14 min | 1 year ago

"7%" Discussed on 7 Layers

"I'll demonstrate this with some recent examples in the names in june. Twenty twenty hewlett packard enterprise or hp acquired silver peak for nine hundred twenty five million dollars to bolster. Hp's st win. Hp is taking advantage of aruba's st branch technology along with silver peak's st win in wayan optimization platforms according to cure team l. coattail aruba's founder and president of hp's intelligent edge division. The addition of silver integrates st win wired wireless routing functionalities into the aruba's branch solution together the enterprise networks edge can't connect directly to cloud and to private data center securely more about st branch check my educational articles on the topic on sdn central dot com a year later in june. Twenty twenty one fortinet partnered with four. Sdn managed service providers they are command link dna serene good networks in telecom italia these partnerships bring fort nets reach to a global scale. Each of these managed service providers will use fourteen. Sdn technology to serve their associated geographies. Jumping forward in time to last week. Cmc networks added the juniper networks sdn in missed platforms to its managed services portfolio. This increase the connection between cmc networks. And juniper because amc networks already uses one to eight technologies sdn tech and one to eight was acquired by juniper in twenty.

"7%" Discussed on 7 Layers

7 Layers

02:54 min | 1 year ago

"7%" Discussed on 7 Layers

"So is your upload speed. Sounds pretty awesome but when you integrate. Dia into your sdn infrastructure. The price is considerable depending on the service provider you get. Dia from and the speed you desire prices can range from about one hundred and seventy five to nearly nine hundred dollars per month and sometimes per location as well and at those lower prices. You're not getting even close to a gigabit per second so we have the connection types outlined. But i need to go into further detail on. How traffic gets routed over them. Policy based routing uses various pieces of context to inform how to route traffic from where it is generated to where it is going and back contextual information can include the device generating the traffic the type of application and the health of the network connections. An example for each of those is an order. Don't you think the device accessing the sdn could be an employee's device or guest or customers device a guest or customer won't be accessing the organization's data center so they can just be sent directly to the internet over wifi router and a secure broadband connection on the other hand. The employees will need to access the organization's data center so they can be routed their over an mp l. s. link or dedicated internet access connection to ensure greater connection consistency security and privacy. Sometimes an employees traffic isn't destined for the organization status center a couple scenarios would-be.

"7%" Discussed on 7 Layers

7 Layers

03:23 min | 1 year ago

"7%" Discussed on 7 Layers

"A blueprint will vary based on what the organization needs from a technology to surf organizations business goals in the context of zero trust. A blueprint can guide in. It team insecure remote workers. One method of securing our remote workforce while also enabling our trust is to use multi factor authentication and access management platforms. I told you i'd get back to access. management platforms. Aren't umbrella category for tools that verify entity in control the degree of access user or device has to assist them this includes multi factor authentication as i mentioned. Mfa is when users have to provide two or more pieces of evidence that they are who they say they are. These factors fall under a few categories including knowledge possession. I o metrics in location. A knowledge factor is something you know like a password or security question. A possession factor is an additional device..

"7%" Discussed on 7 Layers

7 Layers

05:47 min | 1 year ago

"7%" Discussed on 7 Layers

"Decisions for shutting off the system themselves this type of resource monitoring and redistribution lead me right into smart cities. Market reports recorded the twenty twenty global smart city market size to be one hundred thirteen point. One billion dollars twenty twenty. It is expected to grow at a compound annual growth rate or see agr of eighteen point one percent to reach two hundred and sixty billion dollars to continue what the domestic example as far back as two thousand fifteen. The obama white house started the smart city initiative. It included a key. Focus on developing testbeds for iot to assistant connecting cities and utilizing smart sensors major drivers for smart city market development include carbon emission reduction crime reduction and traffic management to realize smart city goals governments for multiple states and countries are beginning public private partnerships to begin smart city development. These goals require iot sensors to be spread throughout the city along with sufficiently advanced ai to analyze the resulting data a major part of living in the city is paying your landlord for utilities which is another market where out he is making an impact research reports indicate expectations for the iot utilities market to grow from twenty eight point six billion dollars in two thousand nineteen to fifty three point. Eight billion dollars in twenty twenty four. That's a c agr of thirteen point five percent. The iot utilities market segment pets expected to hold the largest market size is the electricity grid management market segment. The iot devices involved here are smart. Sensors receivers in energy boxes all capable communicating with each other with these tools in place. Utility providers are alerted to issues in the grid faster and without having to learn about an adage from customers and finally manufacturing the global iot manufacturing market size in two thousand twenty recorded as thirty three point two billion dollars researchers looking ahead to twenty twenty-five expect the market size to reach fifty three point. Eight billion dollars the g. r. there is ten point one percent over the five years within manufacturing industrial. Iot is the hot use case. And it's one of my favorite aspects of iot. As i mentioned before in this podcast is this because my dad's a machinist probably an area often talked about with industrial iot is predictive. Maintenance is can be for machines found in factories machine shops or hvac systems. For example traditionally machines are maintained on a regular schedule. That is not based on an individual machines level of us. I'm not sensors installed in a machine detect the actual wear and tear on the machines parts so replacements only occur when needed this reduces waste of dishing parts. That are still effective. Also reducing machine downtime because only the necessary parts are replaced.

Eight billion dollars two thousand six billion dollars One billion dollars two billion dollars thirteen point one percent twenty twenty four ten point nineteen twenty twenty-five one five percent one hundred thirteen two thousand fifteen twenty twenty two hundred and sixty billion thirty three point two thousand twenty fifty three point
"7%" Discussed on 7 Layers

7 Layers

07:07 min | 1 year ago

"7%" Discussed on 7 Layers

"With at outcome that have the cloud edge that networking asset of capabilities security set of capabilities that we can consume as a service. And that's really the second year the flexible consumption. And if there's anything that kobe has thought us is that we need to be ready. We need to be heard and east tomorrow morning. We need to see off. Two thousand employees to be able to work remotely from different areas areas across the world different areas across america or different geos. We need to be able to do that immediately in if we need to seen down because of some crunch you see in the market or an arjun heat were experiencing immunity to tighten the belt. We need to be able to do that as fall. Consuming connectivity secure connectivity as a service allows us to do debts finally a couple more points. I want to emphasize on earth. Sassy is really security in the fourteen coming together in itself in when we think about which vendor is right for us as a business. Those are the three points that i would urge everyone to look at networking. How do you connect to your obligation. What kind of visibility. You're having to us happening. In the internet's what kind of networking record in capabilities. You have in order to optimize and assure cutting tv secure as you ain't being if you can efficiently connecting optimize that connection you've role here on the security side. It's really easy to bolsa. Love bells and whistles in innovative features or on connectivity. if he doesn't have the security or weed ads you're suppose and we don't. We don't want that either ryan. So i would urge everyone now to be blinded by all the china features that may come from one side to the san that we're not really looking into third body. Secrecy deaths incompliance and everything that comes from the security side and then finally i would say we're talking about the cloud edge. We're talking about clinic. Dvd applications to is to are on offs and data centers. In the cloud matters your vendor needs to be cloud native iran or needs to support modern cloud architecture van or needs to have flow clinic. Dvd to all the defends providers for example how about testing the chronic dvd. Weeden outs your sassy provider to the locations to the Services officer sixty five is something that many or customers are really bending on for their business. Can your vendor improve on the bench in the last thing. And i really started with that so that that's a great he sued to end with. Sassy is a germ. we're early stage. In the process for the entire industry gartner idc any other analysts. Expect these markets really grow over. The next few years truth of the matter is that you shouldn't be forced or Into making decisions that you're not comfortable enemy to ensure that your vendor your partner is ready to support you. You can't go all the way to the cloud tomorrow morning. That's fine if you mean to spin out remote orders that's fine and then physical locations can follow if you have fifteen hundred gutter locations that you can just like data centers roffe through the cloud. This came the campbell. Says you can gradually get them through the crowd as also make sure that you understand that you're facing a junior that the partner that you're choosing has the right capabilities products and map because everything is changing right and road map in order to escort you in that journey do successful deployment office certainly thank you again for joining us today. Raviv are there any final thoughts you want to add. While seeing i've been really optionally following these the progression of security and the values that security brings over the last decade or so. Anything really interesting for me to see how we as an industry Who's on on -nology and how we can really drive security and then that the community was measured through secrecy and the only thing that mattered was how your security and elegance In how many threats he knew Against the commodity seal matter but now we efficacy on top of that. The next step in index chain was the simplicity because realized that if we we have deficiency that. We don't have simplicity than humans will get it wrong in. This is our us. This is just a human issue that we all face we've so we really have to have the technology efficacy and this implicitly but looking into tomorrow in the next couple of years whether really see that we're learning is that security needs to be art of something even bigger in needs to demonstrate immediate value to our customers. And that's really what stands at the core of sassy not just of course it simple declining. Dvd and the ability to optimize that connection in may the end users life easier and help them achieve their goals fashion about this is really where we're going in. This is really. What's guiding us now journey juicy here. It's well thank you again for joining us today and thank you to our audience. Sgx central for joining us for this sponsored interview. I've been your host craven associated studio editor. Sgx central follow seven layers. So you never miss an episode in as always you can learn more about the current state of technology over on sgx central dot com and one more thing sgx central's on twitter goes to follow at sdn central and give my page of hollow at the definer underscore dx. Please leave seven layers. A review on the podcast half of your choice to help us reach a wider audience and to see how we can improve. Thanks for joining us. And i look forward to our next episode..

america twitter today Raviv second year Two thousand employees tomorrow tomorrow morning fifteen hundred gutter last decade china fourteen sgx central dot com one side seven layers three points sgx central Sgx central earth third body
"7%" Discussed on 7 Layers

7 Layers

08:24 min | 1 year ago

"7%" Discussed on 7 Layers

"Thanks for joining us for this. Sgx central sponsored interview. We'll be chatting with raviv levi. Vp of product and cloud security at cisco. Today he'll be discussing sassy strategy devops integration and the next steps for organizations selecting a sassy solution. Thanks for joining us today. Raviv so to start out. What are some of the biggest challenges your customers are facing right now and how to sassy begin to address those challenges absolutely and and thank you for having me thank you for new jersey talking to love customers and partners from really across the world lead. The heat on that i see is complexity. If we're thinking about the need to connect users to the resources to their applications at obviously he needs to keep that connection secure for the user for the enterprise for the data when it comes to complexity this is really the number one thing that hinders us from achieving that goal and we with the progress of the kranji. What we see that happening is that more and more sophistication actually creates more and more complexity which interns prevents from grievance our customers from being able to deliver that secure coding theory experienced users with all that complexity in mind how to sassy support distributed workforce network especially as organizations are moving to hybridise setup question so when we think about what we as an industry have gone through. I would say you're two. Years is data explosion of complexity grain from a certain line exponentially to be larger. And even before you could zinc about users and applications being confined within the enterprise for evener than users going different places branches working from different places. Applications do all clouds data centers offs in zones of fourth in then cooling. Hit us. Everyone is working remotely in now. That number of branches that you have to support a number of locations from which your employees into world is jess exponentially grown than to the complexity level even higher than it used to be in the if you think about the architecture that we used to have across the industry in the past we really had our users in different places in branches and then everyone would go into the data center. Everyone will go to that place for. They consume the resources there date on applications but now everyone will continue to do that in mind you we have so many more users out there working from home basically being branch of a single person all over the place that creates a real issue. Now help to solve that. You fouquet the way that we have solved that as as an industry in the consumer space if you have so many users all over the place the right way to solve for that. He's not to centralize all the connections in single ways. But rather you have a cloud edge and then the users just go to the cloud edge is closest to dead. Fundamental concepts is at the core in basis off sassy bringing networking and security together tunick cloud we're allowing our customers to consume those services are actually fishing fleet securely as a service debt creates a lot of simplicity for our customers cisco's got simmers anyone else Sassy because now they have a single place where they can go they can tweak the way the us the service says they don't have to worry about whether they have Virtual machines or employing physical appliances in all kinds of places places on locations every being used provided as a service cloud which yeah it makes sense to distribute the services when the users are themselves distributed. How to sassy represent a convergence between networking and security. We've seen the convergence of networking insecurity increasingly emerging over the last few years. I would say that a started back at a. At a time were movable security appliances end they consolidated into a unified threat management appliances then. Utm was actually the gateway for branch. Locations office says and so on in order to connect to the than with the high cost in complexity of empty less as the land was born and sooner than later we saw. Sei metro king. We utm security coming together into secure as you and i will say de or the last few years secure. St one has really been a huge wave and tran. That received moves out there in the market win. Sassy were taking in extra. Seth because that convergence of security in networking is very very high demand coming from our customers but why be introduce is a challenge because all those features in a single box these managed by someone that needs to be part of a sometimes writer complex apology building. The friendly Donald significant connections from cloud services from the branch frong the location that was seal challenging for our customer so security networking coming together on the premises was not enough. And what we've seen is the need to dig that up on level Cloud when we can deliver that as a service any truly goes back to the fundamental oin of customers really interested in that outcome wanting to users in connect them to the resources because they care about their businesses right. They care about their own goals. Customers shoots here unless they're really interesting doing so the g. of how exactly regaining from eight to be to seek the to eat customers should care about other getting their user to their application in the most efficient insecure way possible so that they can resume their business Pursued business goal which direction and this is what hashing is definitely critical to running successful business in keeping clients happy. What factors mustn't organization consider when they're selecting a sassy solution how to feature roadmaps plan to this i. Let's say that this is a bit of a loaded question. Sassy as space forming ever since Gardener i believe has coined the term in in twenty nineteen and there's really a lot of companies out there claiming to be sassy cruciate on different customers in two different directions in order to adopt sassy. In order to be off the future. I really want to dates virginity to urge customers. A single their business in the about earn needs and to think about how we can accomplish safely without jeopardising businesses. And i do want to go out. Several factors year. That again talking to people customers are nur's escorting down in that journey. I learned the first one is the need for complete and integrated sassy actually at the end of the day. Sassy is here to help us. Says easier here to make our life. Simple secure more and more effective. If we're going to piecemeal different components from different places and different vendors we'd customer would be assuming complexity which beats diverse. We need to select the vendor or two vendors Certainly not more than that. That can provide us.

Today Donald raviv today cisco two vendors first one two new jersey Raviv twenty nineteen eight last few years one Sassy single box single place single fourth last few
"7%" Discussed on 7 Layers

7 Layers

05:17 min | 2 years ago

"7%" Discussed on 7 Layers

"Released or training And bat market is forecast to be worth by twenty twenty six six point eighty four billion dollars. So that's that's that's that's not insignificant. Continue to grow Today there are very few enterprise class companies that aren't using open source in some way. This has become the way modern development is done. And if you take a look at today's generation of engineers open source or the tools even using at to learn how to code to develop code work on projects Get hub understanding. How get hub. Works are other collaboration. Platforms is super common in. So i think you'll just continue to grow. Developers have a much stronger influence today than they did. Ten or fifteen years ago in terms of helping. It shops define how they'll produce software or tools adopt so they have a big influence. And this is really. I think i helped contribute to exponential growth is very little. There's a path of less resistance. Once an organization is figured out their own their own roadmap and their own policies and their own operational policies. Once they begin with open source you'll see rapid adoption And a lot of different ways. Yeah i think it comes to mind that. If i were a in a if i were a computer science major in college It would be more likely that i could access some open source code just to tool around with it and learn from it than it would to access proprietary software So i imagine that sort of Introducing people when they're Maybe not more impressionable but You know just getting started. And influencing their view on You know best practices for developing software. His that on point or is that yeah no that. That's that's very much point. And i would say to the point at from someone on the business side and on organizational and and talent side it is more attractive to be using open source in your organization. Because you will find a find. Today's developers interested work and interesting projects. Whether it's because it's an explicit part of your technology rabat company's strategy whether it's simply to help.

Today Ten eighty four billion dollars fifteen years ago today twenty twenty six six point
"7%" Discussed on 7 Layers

7 Layers

03:45 min | 2 years ago

"7%" Discussed on 7 Layers

"Again these are tools that <Speech_Male> pro grammatically <Speech_Male> <Speech_Male> <SpeakerChange> Monitor <Speech_Male> <Speech_Male> every action. <Speech_Male> That's down in public cloud <Speech_Male> in necessite <Speech_Male> on on risk <Speech_Male> and of take a look <Speech_Male> at some of <Silence> the best practices <Speech_Male> <Speech_Male> in the current vulnerabilities <Speech_Male> around <Speech_Male> using public <Speech_Male> cloud services <Speech_Male> and then gives <Silence> users <Speech_Male> <SpeakerChange> or administrators <Speech_Male> <Speech_Male> Insight into <Silence> <Speech_Male> <Speech_Male> abilities that pop up <Speech_Male> and then with code <Speech_Male> you can instrument <Speech_Male> and remediation <Speech_Male> so <Speech_Male> you <Speech_Male> this. You can have almost <Speech_Male> <Speech_Male> eighty percent of your <Speech_Male> low fidelity security <Speech_Male> incidents <Speech_Male> incidents all <Speech_Male> managed. <Silence> Pragmatically <Speech_Male> where <Speech_Male> you know. Only the high <Speech_Male> fidelity <SpeakerChange> security <Silence> things can be <Silence> <Speech_Male> addressed <Speech_Male> by the security <Speech_Male> teams <SpeakerChange> which allow <Speech_Male> them to focus <Silence> <Speech_Male> <Speech_Male> Now is there <Speech_Male> anything that we <Silence> haven't covered yet. <Speech_Male> That <Speech_Male> you think is important <Speech_Male> or isn't talked <Speech_Male> about <SpeakerChange> enough with <Silence> cloud security. <Speech_Male> I <Speech_Male> think one <Speech_Male> interesting <Speech_Male> piece which is kind of related <Speech_Male> to the discussion <Speech_Male> is just finding <Speech_Male> <Speech_Male> the right person. <Speech_Male> In organizations <Speech_Male> you know we <Speech_Male> find a <Speech_Male> <Silence> fee that <Speech_Male> <Speech_Male> developers <Speech_Male> develop <Speech_Male> and <Speech_Male> security <Speech_Male> security and <Speech_Male> <Speech_Male> Under you <Speech_Male> know this lack <Speech_Male> of awareness of who's <Speech_Male> responsible <Speech_Male> for certain types <Speech_Male> of controls. So <Silence> i still think <Speech_Male> <Speech_Male> it's twenty. Twenty one <Speech_Male> in one <Speech_Male> of the biggest challenges <Speech_Male> in this space is <Speech_Male> is identifying <Speech_Male> <Speech_Male> with a lot of companies. <Speech_Male> Who's responsible <Speech_Male> for security <Speech_Male> and <Speech_Male> there isn't <Speech_Male> there isn't <Speech_Male> the days of <Speech_Male> having <Speech_Male> a handful of magic <Speech_Male> l. scar <Speech_Male> and everything <Speech_Male> are gone <Speech_Male> right because things <Speech_Male> are to ephemeral <Speech_Male> the to dynamic <Speech_Male> <Speech_Male> and <Speech_Male> teams move very fast. <Speech_Male> So i think <Speech_Male> it's really about <Speech_Male> leveraging <Speech_Male> code in the ability to <Speech_Male> automate security <Silence> <Speech_Male> and <Speech_Male> making sure that developed <Speech_Male> means development <Speech_Male> teams pick up that responsibility <Speech_Male> and pick <Speech_Male> up that skill set him build <Speech_Male> that muscle <Speech_Male> so as part <Speech_Male> of their education <Speech_Male> and learning <Speech_Male> the languages using <Speech_Male> and <Speech_Male> and how to develop <Speech_Male> the solutions <Speech_Male> are billing for customers <Speech_Male> also picking <Speech_Male> up in <Speech_Male> understanding how <Speech_Male> to build and deploy <Speech_Male> those <Speech_Male> that value <Silence> securely. <SpeakerChange> <Speech_Male> <Speech_Male> Yeah what. I'm <Speech_Male> getting from <Speech_Male> this is <Silence> it takes a village <Speech_Male> <Speech_Male> And <Speech_Male> to <Speech_Male> support the <Speech_Male> difficulty <Speech_Male> of <Speech_Male> finding <Speech_Male> that leprechaun <Speech_Male> using tools <Speech_Male> that are more automation <Speech_Male> heavy or <Speech_Male> working to <Speech_Male> develop <Speech_Male> tools <Speech_Male> that can be automated <Speech_Male> so <Speech_Male> a lot of the work <Speech_Male> that would <Speech_Male> beyond that <Speech_Male> leprechauns back is. <Speech_Male> <SpeakerChange> The load <Speech_Male> is lightened <Speech_Telephony_Male> <Speech_Male> Yata automation <Speech_Male> is key. You know <Speech_Male> just removing <Speech_Male> People <Speech_Male> out of the <SpeakerChange> way and <Speech_Male> leaning on <Speech_Male> the services. There <Silence> are actually really <Speech_Male> amazing <Speech_Male> capabilities. <Speech_Male> You know <Speech_Male> in. It's just learning <Silence> as <Speech_Male> this <Speech_Male> matures. <Speech_Male> People become more <Speech_Male> familiar with how <Speech_Male> to use these services. <Speech_Male> The type <Speech_Male> of controls you can instrument <Speech_Male> in our <Speech_Male> are unbelievable. <Speech_Male> Compared <Speech_Male> to how difficult they were <Speech_Male> would be to do on <Speech_Male> premise. You know <Speech_Male> getting that programmatic <Speech_Male> access so <Speech_Male> <Speech_Male> as <Speech_Male> the industry continues <Speech_Male> to mature <Speech_Male> in companies <Speech_Male> like barracuda. Continue <Speech_Male> to investigate. <Speech_Male> It'll just make it a lot <Speech_Male> easier for customers <Speech_Male> to <Speech_Male> build these programmatic. <Speech_Male> Security control <Speech_Male> frameworks to allow <Speech_Male> them to embrace <Speech_Male> in us <Speech_Male> all these native services <Speech_Male> and build fast. <Silence> Stay <SpeakerChange> secure <Silence> <Speech_Male> wealth. <Speech_Male> That's all the questions <Speech_Male> i have <Speech_Male> for you today <Speech_Male> <Speech_Male> I'd like to thank <Speech_Male> you for coming on tim. <Speech_Male> Hopefully we <Speech_Male> can get you back <Speech_Male> on in the future. <Speech_Male> Thanks conor <Speech_Male> is great <Silence> appreciate <SpeakerChange> it.

twenty Twenty one today one eighty percent every action
"7%" Discussed on 7 Layers

7 Layers

02:44 min | 2 years ago

"7%" Discussed on 7 Layers

"There's going to be challenges because nothing is easy. What are some of these challenges that you see cloud security leprechaun thing you know where a lot of developers understand the language or the the sprints in stories that they're trying to build on and you know one of the core skill sets of developers. Today is learning in managing infrastructures code. So using the tooling around that using that same methodology that software development life cycle for managing infrastructure. And taking that big leap. And i think one of the biggest challenges is this Combining the scurity teams goals and objectives with the development teams and building that skill set and building that muscle. So the best practice. Is you know having this. The skirting risk organizations joined the development team sprints so they understand their stories instead of telling them specifically. What tools do you use or how to instrument that controls that they share with them instead. What security controls need to be done you know. As part of those sprints and then leave it up to the development teams to figure out the best methodology or tooling or mechanism to instrument those control so this specific control framework Or set of specific controls that spring team can work with the security teams on a weekly basis as these development cycles mature and and kind of share these milestones in the teams continue to learn. So i think that's been the biggest barrier. What would you say then. With the teams that are starting to work together or teams that organizations could start to merge a bit more. What are the technologies that they are using that are so crucial to securing the cloud. The big the big opportunity here is getting humans out of the way leveraging coat and since all the infrastructure's code you know one of the magic things about public cloud is all this instrumentation. That's already done all the services are consecutively. Pi's and some of that visibility. That was so difficult to get on. Premises is already inched in essentially for free and public cloud. So it's really about leveraging that and then building programmatic controls with code an instrument in that in as you're building and that allows teams to be agile on. I think that's where they both. Public cloud providers end is v. ecosystem of donor really job is a ton innovation around helping enterprises use. These types of tools like barracuda developed to a cold cloud security guardian..

Today both one one of barracuda core skill challenges
"7%" Discussed on 7 Layers

7 Layers

03:21 min | 2 years ago

"7%" Discussed on 7 Layers

"Right him then. Security is such a foundational and important aspect to any it environment. what can a organization or customer Expect to benefit from having good cloud security. What are these pros that they can look to win a utilizing effective cloud security tools. Yeah i just think it's speed and agility right. which is you know the. The world moves so fast now especially when it comes to digital value propositions you know like Companies need to continue to innovate faster and faster to keep up and you know ten twenty years ago you lean on a particular innovation for a long time in monetize that commercially in today's world value propositions come and go popcorn so enterprises need to be very agile with respect to continuing to have their finger on their value proposition. How quickly they need to evolve in having security get in the way. That is is a big threat. I would argue enterprises competing right. So it's really important that in this highly federated distributed modular environment where developers are moving fast and building very modular environments that that organizations have strong security programs to allow them to do that quickly and securely into reduce as much risk as possible to facilitate that in. So it's not only keeping everything secure to avoid A breach or something. It's also just clearing the runway for everything else to run smoothly times teams want built fast. Developers will have ideas in their building architect. And if you don't if enterprises don't have a strong program and there's a lot of pain kness around how intimate controls that can create friction and slowing down. You may have compliance teams have security teams that may put the brakes on some innovation until they get their arms around that and i think all of us have tons of anecdotal stories of of meeting with companies and enterprises Entire projects have been brought to a halt For long periods of time because it took a significant effort for these separate security teams to kind of get their arms around what was being done. What was being built and figuring out how to to build the right types of security controls in in one of the areas of constant friction is taking security methodology. That was built from on. Prem and china apply that in a public compartment in these highly distributed environments using different deployment models or models became anticipates. They ended up causing more friction. So it's just a lot of learning and education. Evolution of the security industry to eliminate that friction allow teams to move fast innovate and ultimately give enterprises the ability to offer value to customers. Quicker compete however to get to a secure environment and to really clear that runway for everybody..

ten twenty years ago today Prem one china tons
"7%" Discussed on 7 Layers

7 Layers

01:32 min | 2 years ago

"7%" Discussed on 7 Layers

"Achieve solid cybersecurity three process recommendations are establishing an office of national cyber director developing a national cyber security strategy and improving current cybersecurity efforts in the government by strengthening private sector partnerships. Public private sector's focus on strengthening cybersecurity. Will dry financial success. In the market segments for cyber security and more specifically cloud security spending on cybersecurity is expected to increase ten percent in twenty twenty one according to a analysts report web and email security is set to grow the most in the security market with spending forecast to increase up to twelve point five percent in twenty twenty one security analytics threat. Intelligence is also expected to see spending increase up to eleven percent for the year. This focus on security is no surprise. Considering catalysts found twelve billion reached records in twenty twenty with ransomware attacks increasing by sixty percent. Matthew bell chief analyst at kennels said quote products to secure the cloud and delivered from the cloud and quote will be key drivers to security expansion. Thanks for joining us on this. Week's episode of seven myers special. Thanks to the central studios editor ashley weiner for writing our script before you go. Let's do a brief overview of what we discussed today cloud security fundamentals benefits in downsides of cloud security supporting technologies cloud security use cases in current cloud market landscape..

Matthew bell twelve billion ten percent sixty percent today seven myers five percent twenty twenty ashley weiner twenty twenty one kennels up to eleven percent three process recommendations twelve point up to
"7%" Discussed on 7 Layers

7 Layers

05:30 min | 2 years ago

"7%" Discussed on 7 Layers

"Thirty six point seven percent twenty twenty two and thirty three point. Two percent twenty twenty consistently outpacing other information security markets this market segment growth is also indicated by big spending on acquisitions and mergers in the space palo alto networks dropped one hundred and fifty six million dollars for devops. Security startup breach crew bridge crews a developer focus security platform that palo alto networks is planning to fold into personal cloud security platform allowing it to integrate cloud security across application lifecycles. Versa has also taken advantage of the increasing. Rates of cloud adoptions and growing concerns around cloud security march sixteenth twenty twenty one versa announced an integration. Between its sassy platform and small to mid sized businesses or smb titan st went solution versus cmo. Mike would said quote titan. St win is really a software as a service model delivered via the cloud and the user interface is incredibly simple and versa extended the simplicity to. Its sassy solution. The sassy security stack cannot be extended to remote workers in branches were enterprises can take advantage of the cloud based routing insecurity without the need for a cpa appliance. But what gets the most news attention. In the cloud security space our security breaches in the first week of march twenty twenty one qualifies a cloud. Security firm was hit by zero day. Exploit related to the axiom breach qualis reports that the attack didn't compromise production or data just months earlier in january qualities confirmed that the solar winds attackers targeted. It systems both the sealion and solar winds breaches continued to make headlines and highlight the need for modern security for the cloud. The acceleration breach was realized in december when cillian patched vulnerability notified customers. But this was just the beginning. Since then victims of the attack continued to reveal themselves other notable victims aside from qualis include kroger which reports no customer information compromised washington state auditor's office which reports the personal information of one point four million unemployment claims were potentially exposed in the reserve bank of new zealand and the australian securities investment commission that report commercial and consumer information where compromised attackers targeted exit. Twenty year old file transfer appliance which is a cloud based file transfer system. It's wide adoption and age made it a prime target for attackers..

Two percent seven percent december Mike march sixteenth versa Thirty six point one hundred Twenty year old palo alto twenty washington march twenty twenty one one point january zero day thirty three point palo alto networks fifty six million dollars kroger
"7%" Discussed on 7 Layers

7 Layers

07:40 min | 2 years ago

"7%" Discussed on 7 Layers

"I'm here with juniper networks is bob dunne to talk about oversight regulations in the tech industry. Hello bipolar you. Good connor how are you. I'm doing well tell us a little bit about your history working with government and how it regulates the tech industry web connor i. I moved to virginia with my family about eighteen years ago. I know mentor of mine from nortel said. Can you come down here and help me figure out this federal thing as he put it and i fell in love with the federal market and its customers Since then i was in a bid for awhile. And then i worked exclusively with the intelligence community for nortel which was some of the most rewarding work i've ever i've ever done then. I tried my hand in small business. I went to a company called star which is based out of portland oregon again focused on the army and tactical solutions. Then i went to ericsson federal which was actually sold in in spun off and korea. We created the company called ozias which still exists today. And then i went back to pack star. I was ceo. They are for a little over four years. And now i'm With juniper and very proud to be vp of federal for juniper networks with regards to standards and regulations and how the oversight works with the tech industry. You know you have the usual names. Like the fcc in epa eeoc in other agencies like that but What many may not be familiar with our agencies. Gsa which is a general services administration and nist which is the national institution for standards and technology. Their mission is to enable innovation through standards and measurements. And then on top of that. Of course you have congressional oversight which pays attention to The industry and what tech companies put out whether it's a service Or hardware yeah. I'm a big fan of nist here at sgx. Because i used so much of their documentation to help. Inform my understanding of technology. When i'm writing my articles before we dive into specifics. How is the tech industry regulated Do the industry regulators and various governments. Have a tight grip or things still fairly lax. I guess it depends on which industry. You're talking about so when the part that i'm familiar with an obviously involved in right now as network equipment providers we provide solutions and we are heavily regulated when you look at the social media companies You know it's it's a new world and you've heard about the Congressional meetings and some of the scrutiny twitter and facebook and others are under. And i think they're just trying to figure out now how best to regulate them do you Put a lot of standards in place like we have today through all the certifications we go through the federal government It remains to be seen with the latest Hack that occurred. A lot of people are concerned about cybersecurity as they should be. And i think there's going to be more regulation in that area as well. yeah maybe rightfully so. What are some of the significant government or industry regulations that organizations are still complying with. Well again you know nist is is very important to juniper and we go through the steps internally and then we put forward our solutions to nist and other agencies there's an organization called the gic which is joint interoperability interoperability tests center. We put a lot of our solutions through that process and then are certifications like a fed ramp when you're talking about the cloud phipps. has strong criteria that that Have to be met and other certifications going on down the line. So you think about. Americans with disabilities act which is section five away if to be compliant with that and the list is pretty long but When you select the market that you want to go after and provide secure solutions it's necessary. It's a requirement so that will continue. And i think those companies that comply with the standards and regulations really benefit from the outcomes because it makes their solution stronger. And while there's a lot of company oversight internal oversight. I think having the checks and balances only make the company stronger. That's good to hear. It seems like there's more regulations than just on the tech itself like you mentioned About disabilities and it isn't important to remember that these organizations are just like any other in that they have the workplace regulations on top of the technological regulations Exactly however in general what does regulation of the tech industry look like in the united states. You know what aspects of the technology are most regulated while the first word that comes to mind is security so every aspect of what we delivered to our customers. has different levels of security. There's risk management framework. Put out by diet cap that must be followed and we do I mentioned the There are others that are put in place like nyack. The national information assurance partners And they focus on common criteria and then companies also put in the rigors into their supply chain so supply chain management is critically important because it starts really at the idea of a solution or a product or a service all the way down the chain to implementation at offering so especially with the bad actors that are trying to penetrate networks companies have to Maintain control and put in a security standards that are second to none and if you look at the best technology companies the most successful technology companies security is always top of mind and and i think it will be top of mind for a long time.

virginia sds central star ozias bob dunne korea juniper networks This week today eighteen years ago Connor craven portland bob pack connor ericsson over four years federal juniper nortel
"7%" Discussed on 7 Layers

7 Layers

04:19 min | 2 years ago

"7%" Discussed on 7 Layers

"You know the that is often the case for large company. So that's the challenge in front of them however they also have saved to take the example of cisco they have the ability to force lower price point on the cpi violence through just sheer volume essex and then also their install base so they have a very very very very good chance and then also that tradition of doing excellent aquisitions and making them super successful. Another one is them. You know kind of these multi networking players like an al jazeera or navy tricks. That had challenges gonna be scaling. The security to the local pops colo's right worldwide nationwide. And so that's that's kind of challenge. Yeah i think some other interesting Kind of threads on this. Is that your the traditional sort of approach or you know the way new technologies kind of rollout. Frankly is the in north. America generally speaking the enterprises. They have their own internal. It departments which then deployed the products will wide say in europe and asia. Pac generally speaking. It's a lot more popular to have your manage service provider manage managed network and your security for years now and you know within new so north america moves quicker and the smaller companies are the early. Adopters it goes. Smb then up to the larger enterprises however in this model. It's kind of interesting i think. Msp's have an awful lot to gain. While they had an awful lot to lose on the play they have a you know. There's a big play for them so because buying large they have that c. p. at the hung right you'll broadband a connection is a variety or or a france telecom british telecom comcast and they potentially they have You know they control that beachhead and you know. I think it'll be very interesting to see how that plays out and so not. Surprisingly versa is doing an awful lot with ms peace globally and in a really really upset a rolling out. And so you know. That's that's another thing in terms of selling because it's basically a solution. The encourages few devices like fewer sa- consolidation on the security side is move to security away from networking which all makes sense the nancy. Naturally i think networking departments. He'll have resistance. And then some you know within security departments in they'll be resistance and so it's it's kinda the sal is in many cases more from the cio or senior management. Down getting to buy in first and then the to get the customer to sober by and Another you know. I think key features that don't get mentioned very much I think multi tenancy role based access control A very very key Because it basic enables customers to sort of separate the different functions between security and networking and then departments and also helps support this sort of zero. Trust type approach And then also network management. We saw with st when while sdn had huge advantages benefits You know as a solution with the consolidated consolidated you..

europe asia America north america al jazeera navy cisco france first sdn comcast british
"7%" Discussed on 7 Layers

7 Layers

05:26 min | 2 years ago

"7%" Discussed on 7 Layers

"Sassy basics gartner coined the term. Sassy in the twenty nineteen hype cycle cloud security report deemed the future of network insecurity functions at the time sassy was just an emerging technology and there was barely a sassy product on the market. Uh sassy as defined by gartner quote combines network security functions with wayne capabilities to support. The dynamic secure access needs of organizations. These capabilities are delivered primarily as a service in based upon the identity of the entity. Real time context insecurity slash compliance policies. So essentially sassy is a new package of technologies including sdn secure web gateways cloud access security brokers zero trust network access and firewall as a service at abilities with the ability to identify sensitive data or malware and the ability to decrypt content at line speed with continuous monitoring of sessions for risk and trust levels and quote despite being new to the industry by summer. Twenty twenty multiple offerings were on the market and thanks to the flexible definition of sassy more on that later the offerings varied widely the shift. To sassy was here in cannot have come at a more urgent time. The covid nineteen pandemic and shift to remote work highlighted the need for infrastructure that supports flexible work options with secure remote access in. Sassy does just that sassy enabled enterprises to deliver secure networking insecurity more generally in a consistent way in a remote environment. But of course sassy is more complex than that says. He is a network architecture that merges wham capabilities with cloud native security functions these functions are provided as a service by sassy vendors though one emerging technology. Sassy isn't necessarily a new technology at all instead. It is a convergence of existing network. Insecurity technologies built around a single pass architecture. This allows for an efficient network that has the ability to inspect traffic. While in transit as the name suggests celsius two core components one the secure access to the service edge. The service edge refers to the edge principle functions are optimized by moving access and competing resources closer to individual users through the use of wide area networking or when the typically delivered through pops or points of presence close to the end points. Pops may be owned by vendors public clouds or a third party secure access refers to the use of cloud native security functions therefore security functions commonly used in sassy these are secure web gateways or s. Wg's cloud access security broker or caspi zero trust network access or z. Tna and firewall as a service or f. w. a. s. Let's dive a little deeper. Into each of these functions a secure web gateway prevents data breaches and cyber attacks by protecting data in enforcing security policies. They filter out unsafe content from network traffic and can block unauthorized user behavior. They can be deployed from anywhere. Making them a great option. For remote workforce's cloud access security broker platforms used various security functions from cloud hosted services is not a single technology instead. Many technologies fall under the caspi umbrella. Technologies under caspi include shadow. It discovery data loss prevention access control and others. Zero trust network access is a security model that has strict real time identification requirements for every individual trying to access resources within a private network whether they are in or outside the network permettre several different principles and technologies are used for zero trust architecture and finally firewalls a service this refers to firewalls delivered from the cloud. As you guessed it a service cloud firewalls block. Cyber attacks directed at cloud assets who various security capabilities like url filtering intrusion prevention and uniform policy management is creates a virtual barrier around cloud platforms infrastructures in applications with these functions at its core. Sassy can identify maur or sensitive data and decrypt content while continuously monitoring the session and assessing trust levels. All in real time since sassy in many cases utilizes sdn it is important to make the distinction between the two clear. Sdn's primary responsibility is to connect geographically distant offices and headquarters to each other. Security tools are usually located at offices in customer premises equipment and not an individual devices. Sassy on the other hand. Folks on connecting individual points efficiently and securely with an emphasis on the cloud as neal mcdonald distinguished. Vp analyst at gartner said in an interview with sgx central quote. The heavy lifting of sassy is performed in the cloud and quote part of the reason. Why the line between sassy. Sdn win gets muddled is because of inconsistencies within the industry has mentioned at the top of the episode sassy defined by gartner is quote a new package of technologies including st win s. Wg caz be z. Tna and firewalls service as core capabilities with the ability to identify sensitive data or malware and the ability to decrypt content at line speed with continuous monitoring of sessions for risk and trust levels and quote

Cartner levi cisco Karner north america paul kohler Gartner silicon valley