17 Burst results for "Connor Craven"

"connor craven" Discussed on 7 Layers

7 Layers

06:23 min | 7 months ago

"connor craven" Discussed on 7 Layers

"This episode is brought to you by. Kpmg risk services kpmg. Believes that when you've earned the trust of all your stakeholders that's when your business has a solid platform to grow. That's the trusted imperative. Kpmg risk services develop and put in place dynamic risk strategies designed to help your business earned that all important trust go to re dot kpmg dot us slash trust to learn more. Hello and welcome to seven layers. Where every episode we look at a different aspect of technology from literal wires in the ground to switches and routers and all the way up to the exploding amount of smart devices around us. I'm your host. Connor craven associate editor. 's central. This week we are continuing to look at optical networks with a panel of experts. This is the first panel on seven layers. And i hope you'll be very pleased to hear them talk about the subject. The panelists are steve alexander chief technology officer and senior vice president at sienna. Bill gardner senior vice president and general manager of optical systems and the optical group had cisco in robert shore senior vice president of marketing at infant era. If you haven't listened to the last episode on optical networking. I highly recommend going back and giving it a listen before the panel.

"connor craven" Discussed on 7 Layers

7 Layers

01:36 min | 7 months ago

"connor craven" Discussed on 7 Layers

"They're designed for a really long span and quote a. wrinkle in optical networks it's shannon's limit which is based on an equation formulated by claude shannon in a paper published in nineteen forty eight. It is a reliable way to determine the maximum rate at which data can be sent over any communication medium based on the connections bandwidth and degree of noise noises. Anything that can harm the signal. Optical networks have managed to avoid this upper limit on data rates for years by simply increasing the bandwidth in one way or another the currently many agree that we are approaching the limit and yet aren't too worried about it as you will hear next week's panel jimmy. You explained that. Other innovations are required to continue reducing the dollar per bait ratio that the industry has grown so accustomed to some innovations could be making things smaller and cheaper or more integrated optics where the different functions of the optical devices are placed on a chip and element of shannon's limit is signal degradation where noise degrades signal in the higher. The connection speed shorter a signal can go before it becomes unreadable. That's why some connections us for one hundred gigabits per second connections to send data to achieve four hundred gigabits per second of performance. Like i mentioned before the break. Thanks for joining us on this week's episode of seven layers i've been your host. Connor craven associate editor at the central. Paul seven layer. So you never miss an episode into mentor next episode where i'll be conducting a panel discussion on optical networking between siennas. Steve alexander says bill gartner and infant eras robert short as always he.

claude shannon shannon jimmy Connor craven Steve alexander Paul bill gartner robert short
"connor craven" Discussed on 7 Layers

7 Layers

04:00 min | 7 months ago

"connor craven" Discussed on 7 Layers

"To the exploding amount of smart devices around us. I'm your host. Connor craven associate editor 's central before we dive in. I'd like to remind you to subscribe to seven layer so you never miss an episode example. Next week we are going to have our first ever expert panel. The panelists are steve alexander chief technology officer in senior vice president at sienna. Bill gartner senior vice president and general manager of optical systems at the optical group at cisco in robert shore senior vice president of marketing. At infant era. I am so excited for you to hear this panel. It went very well in my opinion. And as always if you want to learn more about the current state of technology you can head on over to sdn central dot com today. I'm going to cover optical networks as you may have guessed from the titles in companies of some of the panelists for next week these networks use glass fibers to send data as light over various distances. A most famously. Over very long distances such as across oceans the way optical networks transmit information is by modulating the light when it is sent in variations in the measurements of the light. When it is received depending on the variations the light can be interpreted as various combinations of ones and zeros. I'll get into that more. When i talked about coherent optics. Multiple streams of data can be sent over an optical fiber by using different wavelengths literally the colors of light in this episode we will cover what optical networking is optical use cases and the benefits and challenges the infrastructure of optical networks consist of cables transceivers multiplex irs amplifiers in certain cases repeaters. Optical cables are un's of fiber which is what the light travels through is similar to how copper wires work with electricity but made of course rounded by cladding the core is the innermost part of the fiber. It is typically made of class in his the medium that light passes through cladding is wrapped around the glass and keeps the light from escaping. It can be made of a variety of materials but usually is plastic or glass that is a different density from the core. Why is sent into the court angle. Forty two degrees or less. So that when the light hits the cladding after entering the glass. It is reflected in remains in the core. This is called total internal reflection. The light waves basically are bouncing back and forth hitting reflecting off the cladding as they transverse the fiber. Now the words the light waves are not traveling in a straight path down. The fiber transceivers are devices that can do both transmission and reception of signals. They receive electrical signals and turn them into the light that has sent over the fiber at the other end of the connection. Another transceiver detects light in terms of back until electrical signals for other devices to use and sends it over the last mile of transmission. Transceivers can be tuned to achieve different per wavelength line.

Connor craven steve alexander Bill gartner robert shore sienna cisco un
"connor craven" Discussed on 7 Layers

7 Layers

05:09 min | 9 months ago

"connor craven" Discussed on 7 Layers

"Hello and welcome to seven layers. Where every episode. We look at a different aspect of psychology from literal wires in the ground to switch his in rogers and all the way up to the exploding amount of devices around us. I'm your host connor. Craven associate editor 's dx central this week and continuing to look at machine learning in. Just a moment you'll hear from brooke winnick machine learning practice lead at data bricks. If you haven't listened to the last episode of machine learning a highly recommend going back and giving it a listen before brick and i began our conversation. I want to let you any longer. Please sit back and enjoy my interview with brooke. Winnick of data bricks. Alright listeners. I'm joined today by brooklyn machine. Learning practice lead at data brits. Hello brooke how're you doing. Well thanks for having me connor. Yeah so what is your background in machine learning. What makes you knowledgeable on the subject. Yeah so. I got into the field of machine learning actually by accident. I think that's how most people get into it. Though i was going back for a second internship at spunk and my manager was on parental leave and said hey the machine learning team will take every few weeks and i just fell in love with it. I initially got started by taking engineering..

brooke winnick connor Winnick Craven Hello brooke rogers brooke brooklyn
"connor craven" Discussed on 7 Layers

7 Layers

05:31 min | 10 months ago

"connor craven" Discussed on 7 Layers

"Every episode we look at a different aspect of technology from literal wires in the ground to switches and routers and all the way up to the exploding amount of smart devices around us. I'm your host. Connor craven associate editor at sdn central this week. We're continuing to look at software defined wide area networks. In just a moment you'll hear from pascal menezes. Cto of meth. If you haven't listened to our last upset honesty win. I highly recommend going back and giving it a listen before. Pascal and i began our conversation. I won't delay you any longer. Please sit back and enjoy my interview with pascal. Menezes of meth welcome listeners. I'm joined here today by pascal minez. Cto of match. Hello pascal how are you great. Honor thank you for having me. So what is your background in. Su and technology. What is it that makes you knowledgeable on this subject. Well you know my background goes back. Even way beyond the un. I mean i think involved in networking even the four even internetworking From the early eighties long long career bell very specific to question you know. Sdn microsoft when for saw this and this is about two thousand and ten. I would say in. It was very intriguing to see that you know the idea of overly under lease idea on the white area our see we already doing this hyper hyperspace data centers nets how you know how. The clouds hyper skills. Were doing it. They were putting in no hardware reliever three switches the underlay and then in the data centers just putting the land or nb gre overlays on top of it. So the idea that. Hey white couldn't do this on the white ear network and don't care about. The transport was very intriguing. But you know what they were doing it. For hyper scale is very different than why. St land needed this in. Why the way needed this. So so when. I saw this in two thousand twelve when i started studying seeing startups emergency area. I was thinking about this already. Two thousand ten actually In this area traffic steering over a wider network and multiple tunnels after to ryan the unruly. So so huge back on. Has i've been following this day..

Connor craven sdn central pascal menezes pascal minez Hello pascal Menezes Pascal pascal Su un microsoft ryan
"connor craven" Discussed on 7 Layers

7 Layers

02:57 min | 11 months ago

"connor craven" Discussed on 7 Layers

"Hello and welcome to seven years. Where every episode we look at a different aspect of technology from literal wires in the ground to switches and routers and all the way up to the exploding amount of smart devices around us. I'm your host. Connor craven associate editor at sdn central. This week we are continuing to look at it security in just a moment. You'll hear from justin tony pele. Ceo of wire wheel. If you haven't listened to our last episode zero trust security. I highly recommend going back and giving a lesson before justin. I began our conversation. I want to leave any longer. Please sit back and enjoy my interview with justin antoni pillay of wire wheel alright listeners. I'm joined today by the. Ceo of wire wheel. Justin tony pele. Hello justin how're you connor. Great to meet you and thanks for having me on today. Yeah so what is your experience with. It security what gives you a knowledgeable perspective connor. Thanks for having me on so wire. Wheel is a data privacy and data protection company and we help companies around the world comply with european laws like the european general data protection regulation or a growing number of data privacy laws here in the us. And you've probably seen connor the california law and the virginia privacy law I also served in the obama administration ultimately as the acting under secretary for economic affairs. So i ran the part of the government that includes the us census bureau and the bureau of economic analysis and connor. You can imagine how much time we spend in the administration thinking about it security for the census bureau which is one of the critical critical Parts of our government. I and i also had a lot of Stead a lot of time and helping the team as As the obama administration was releasing the nist cyber guidelines which you know have been kind of central control framework for it security so that's our background From the privacy side almost every privacy compliance law connor includes it security requirements and so Our platform often is leveraging or integrating with other it security platforms as well. Yeah it definitely seems like you have a storied past in. It security and definitely influenced fill..

justin Justin tony pele seven years justin tony pele This week today one justin antoni pillay Connor craven obama connor virginia privacy law sdn central law Wheel Stead european european general data protecti episode critical
"connor craven" Discussed on 7 Layers

7 Layers

03:14 min | 1 year ago

"connor craven" Discussed on 7 Layers

"Where every episode we look at a different aspect of technology from little wires in the ground switches and routers at all the way up to the exploding amount of smart devices around us. I'm your host. Connor craven associate studios editor. 's the central this week. We are continuing our deep dive into the multi cloud in just a moment. You'll hear mark van de wheel chief technology officer of h vr. If you haven't listened to our last episode on the multi cloud. I highly recommend going back and giving it listen before mark and i take a deep dive into the topic. I want delay any longer. Please sit back and enjoy my interview with mark manda wheel of h vr. Hello mark how are you and do so. What is your background in the cloud and gives you insight on multi cloud business models and great question so entry are we help customers. Eradicate data between heterogenius technologies and a very common use case that we see as the use of analytics so organizations have transactional systems possibly multiple systems ltd consolidate type into an analytical environment and use our software to do james data capture and replicate into that consolidated analyst environments now the kind of customers that we typically work with are large organizations and a number of them have quite complex state of lows across the organization. I've worked at for seven years now and indeed ardy days when when we started this relegation solution. We saw that it was dominated on. He's at a play organizations. Wanted to have entrepot system and wanted to have remedies alad environments to to to run their business intelligence. They're good they warehouses and then we saw that over time. Organization started moving to the cloud one example as civic example we were working with a global manufacturer and one of their divisions processing environment. They originally started off likeness They have from vitamins Change data capture on their oracle database running sap and that was critical information for analytics at ran into on analytical database. They they saw the trauma center declined. Eight embarked on analytical environment in the cloud and shifted to allah gies and started doing a a secondary feed into that.

mark van de wheel Eight mark mark manda wheel seven years this week h vr Connor craven one one example james allah
"connor craven" Discussed on 7 Layers

7 Layers

03:22 min | 1 year ago

"connor craven" Discussed on 7 Layers

"And workloads across clouds through a set of tools and procedures cloud networking is an emerging approach him debt solving the security visibility and management challenges of multi cloud strategies. Va tricks made headlines on february. Twenty third twenty. Twenty one when the company secured seventy five million dollars in series defunding. Bringing the company's total raised funding to one hundred fifty one million dollars aviator occc. Steve mullany said quote. The center of gravity is now in the cloud in fact it's multiple clouds and quo aviatronics addresses the challenges of multi cloud networking by acting as a cloud native layer between virtual private clouds running in any major cloud providers networks in the nba tricks by users can configure resources within the va tricks dashboard. Without having to configure each individual cloud these innovations in the multi cloud space along with the continued enterprise. Adoption of the strategy drives massive growth in the multi cloud market segment report by analysis. Mason expects the segment to go from four point. Three billion dollars in twenty nineteen to thirty two billion dollars in twenty twenty five rapidly. Growing market segments are often the subject of news headlines and industry chatter in the multi. Cloud segment is no exception on march. First twenty twenty one ibm made. Its ibm cloud satellite available to the general public expanding its ecosystem to sixty five partners. Ibm cloud satellite specifically addresses visibility. Latency insecurity concerns like ibm dell made headlines on march eighth twenty twenty one for unveiling a new multi cloud solution with faction a multi cloud pass organization intended to improve multi cloud security. This solution works with multiple clouds and gives enterprises a centralized location to monitor critical data. The solution further allows enterprises to mir data to a cloud adjacent data center in isolate. Critical data in the event of security threat like ibm and dell amazon also made headlines however amazon. Didn't make the news about a new technology. It made the news because of a new. Ceo in the first week of february amazon announce. Jeff bezos was stepping down in andy. Jasser would be stepping up as amazon. Ceo this leadership change signals. Cloud focused future for amazon especially as bezos implied growing. Ws was critical to the company at large in the fourth quarter of twenty twenty aws generated ten percent of amazon's total revenue and accounted for almost half of the company's prophets patrick moorhead founder and principal analyst at more insights strategy said quote. Aws is the industry infrastructure as a service leader increased. Its pass offerings over. The last several years he added that he expects aws to increase its offerings. Thanks for joining us on this week's episode of seven layers special. Thanks to esi. Central studios editor ashley weezer for writing our script before you go. Let's do a brief overview of what we discussed today multi cloud models benefits and disadvantages of the models and of a multi cloud strategy in general multi cloud solutions in the news and the outlook of the multi cloud approach have been your host connor craven associates studio editor 's central subscribed to seven layers..

Steve mullany Three billion dollars Jeff bezos february seventy five million dollars Jasser sixty five partners one hundred fifty one million ten percent march Mason this week ibm First thirty two billion dollars patrick moorhead connor craven Ceo Twenty one ashley weezer
"connor craven" Discussed on 7 Layers

7 Layers

07:40 min | 1 year ago

"connor craven" Discussed on 7 Layers

"I'm here with juniper networks is bob dunne to talk about oversight regulations in the tech industry. Hello bipolar you. Good connor how are you. I'm doing well tell us a little bit about your history working with government and how it regulates the tech industry web connor i. I moved to virginia with my family about eighteen years ago. I know mentor of mine from nortel said. Can you come down here and help me figure out this federal thing as he put it and i fell in love with the federal market and its customers Since then i was in a bid for awhile. And then i worked exclusively with the intelligence community for nortel which was some of the most rewarding work i've ever i've ever done then. I tried my hand in small business. I went to a company called star which is based out of portland oregon again focused on the army and tactical solutions. Then i went to ericsson federal which was actually sold in in spun off and korea. We created the company called ozias which still exists today. And then i went back to pack star. I was ceo. They are for a little over four years. And now i'm With juniper and very proud to be vp of federal for juniper networks with regards to standards and regulations and how the oversight works with the tech industry. You know you have the usual names. Like the fcc in epa eeoc in other agencies like that but What many may not be familiar with our agencies. Gsa which is a general services administration and nist which is the national institution for standards and technology. Their mission is to enable innovation through standards and measurements. And then on top of that. Of course you have congressional oversight which pays attention to The industry and what tech companies put out whether it's a service Or hardware yeah. I'm a big fan of nist here at sgx. Because i used so much of their documentation to help. Inform my understanding of technology. When i'm writing my articles before we dive into specifics. How is the tech industry regulated Do the industry regulators and various governments. Have a tight grip or things still fairly lax. I guess it depends on which industry. You're talking about so when the part that i'm familiar with an obviously involved in right now as network equipment providers we provide solutions and we are heavily regulated when you look at the social media companies You know it's it's a new world and you've heard about the Congressional meetings and some of the scrutiny twitter and facebook and others are under. And i think they're just trying to figure out now how best to regulate them do you Put a lot of standards in place like we have today through all the certifications we go through the federal government It remains to be seen with the latest Hack that occurred. A lot of people are concerned about cybersecurity as they should be. And i think there's going to be more regulation in that area as well. yeah maybe rightfully so. What are some of the significant government or industry regulations that organizations are still complying with. Well again you know nist is is very important to juniper and we go through the steps internally and then we put forward our solutions to nist and other agencies there's an organization called the gic which is joint interoperability interoperability tests center. We put a lot of our solutions through that process and then are certifications like a fed ramp when you're talking about the cloud phipps. has strong criteria that that Have to be met and other certifications going on down the line. So you think about. Americans with disabilities act which is section five away if to be compliant with that and the list is pretty long but When you select the market that you want to go after and provide secure solutions it's necessary. It's a requirement so that will continue. And i think those companies that comply with the standards and regulations really benefit from the outcomes because it makes their solution stronger. And while there's a lot of company oversight internal oversight. I think having the checks and balances only make the company stronger. That's good to hear. It seems like there's more regulations than just on the tech itself like you mentioned About disabilities and it isn't important to remember that these organizations are just like any other in that they have the workplace regulations on top of the technological regulations Exactly however in general what does regulation of the tech industry look like in the united states. You know what aspects of the technology are most regulated while the first word that comes to mind is security so every aspect of what we delivered to our customers. has different levels of security. There's risk management framework. Put out by diet cap that must be followed and we do I mentioned the There are others that are put in place like nyack. The national information assurance partners And they focus on common criteria and then companies also put in the rigors into their supply chain so supply chain management is critically important because it starts really at the idea of a solution or a product or a service all the way down the chain to implementation at offering so especially with the bad actors that are trying to penetrate networks companies have to Maintain control and put in a security standards that are second to none and if you look at the best technology companies the most successful technology companies security is always top of mind and and i think it will be top of mind for a long time.

virginia sds central star ozias bob dunne korea juniper networks This week today eighteen years ago Connor craven portland bob pack connor ericsson over four years federal juniper nortel
"connor craven" Discussed on 7 Layers

7 Layers

05:27 min | 1 year ago

"connor craven" Discussed on 7 Layers

"We look at a different aspect of technology from literal wires in the ground to switches and routers in all the way up to the exploding amount of smart devices around us. I'm your host. Connor craven associate studios editor at sds central. This week are continuing our deep dive into oversight in regulations in the tech industry. In just a moment you'll hear from bob dunne vice president of global governments at juniper networks. If you haven't listened to our last episode on oversight in the tech industry. I highly recommend you go back and give it a listen before bob and i take a deep dive into the topic. I want delay any longer. Please sit back and enjoy my interview. With bob dunne of juniper networks. Alright listeners i'm here with juniper networks is bob dunne to talk about oversight regulations in the tech industry. Hello bipolar you. Good connor how are you. I'm doing well tell us a little bit about your history working with government and how it regulates the tech industry web connor i. I moved to virginia with my family about eighteen years ago. I know mentor of mine from nortel said. Can you come down here and help me figure out this federal thing as he put it and i fell in love with the federal market and its customers Since then i was in a bid for awhile. And then i worked exclusively with the intelligence community for nortel which was some of the most rewarding work i've ever i've ever done then. I tried my hand in small business. I went to a company called star which is based out of portland oregon again focused on the army and tactical solutions. Then i went to ericsson federal which was actually sold in in spun off and korea. We created the company called ozias which still exists today. And then i went back to pack star. I was ceo. They are for a little over four years. And now i'm With juniper and very proud to be vp of federal for juniper networks with regards to standards and regulations and how the oversight works with the tech industry. You know you have the usual names. Like the fcc in epa eeoc in other agencies like that but What many may not be familiar with our agencies. Gsa which is a general services administration and nist which is the national institution for standards and technology..

virginia sds central star ozias bob dunne korea juniper networks This week today eighteen years ago Connor craven portland bob pack connor ericsson over four years federal juniper nortel
"connor craven" Discussed on 7 Layers

7 Layers

07:47 min | 1 year ago

"connor craven" Discussed on 7 Layers

"Where every episode we look at a different aspect of technology from literal wires in the ground to switches and routers and all the way up to the exploding amounts art devices around us. I'm your host. Connor craven associate studios editor at sdn central this week. We are continuing to look at how the cloud has evolved since its inception in. Just a moment. You'll hear from dave larssen spirent general manager. If you haven't listened to her last episode on cloud volition. I highly recommend going back and giving it listen before david i get going on the topic. I want to let you any longer. Please sit back and enjoy my interview with dave larsen of spirit alright listeners. I'm here aspiring general manager. Dave larsen to talk about the evolution of the cloud. Hello dave how are you. Welcome to thank you. It's great to be here with you today. So could you tell listeners. Bid about yourself and explain why you are knowledgeable about how the cloud has grown and changed overtime. Sure i'd be happy to I've been industry been in the industry now for probably twenty seven years Started out focused on the advent of switched ethernet Which is the underpinning. He's technology that the cloud depends on But lately in my career. I have Spent a lot of time on cloud architecture. I'm the general manager at spier communications for our security solutions business unit which is focused on building technology for the test and measurement assurance of security capabilities whether they exist in the cloud or whether they're ensconced in a hardware appliance sits deployed in your environment. in the end you're not secured anyone point in the chain. You're not secure so we technology all of the above. I've been in this role for about six months. Previous to this role. I was in the office of the cto. Hewlett packard enterprise while i was responsible for strategy and vision for networking data security in cloud architecture for the company. So i've had a fair amount of access Both to partner chain of folks that are developing technology. That's consumed whether it's public or private or hybrid cloud or telco for that matter and i've been in a position of vision and strategy that has allowed me to see how the stuff has been evolving so a very much enjoy than looking forward on this conversation with you have. It's pretty far-reaching. And if listeners would like to learn more about security in it they can always check the back catalogue of a seven layers because we've touched on quite a bit and going off of your experience in the cloud. What technology has supported the cloud when it was beginning and just becoming widely used by private organizations really like this question connor because you know the cloud really evolved out. Nothing omar through to nist. Nick needs in terms of large entities like amazon. That had huge. It expenditures that they needed to monetize. So cloud really evolved off of the same exact technology than enterprises use circa ten or fifteen years ago so is using industry standard Technology industry standard. Our technology industry standard storage technology. One of the interesting things about that though is that over time if they became clear at scale the big public cloud operators need to run their businesses. The things needed to evolve and change. And so we've seen a lot of things in that environment that have adopted in move. Beyond what you would typically find in an enterprise. It's all based on the same technology in many respects Was based on the x eighty six processor but more more recently has been based on arm processor or really interesting inference engines for machine learning and artificial intelligence than vector processors or something that you might see from nvidia There's a whole host of technology. That's being leveraged. I think the thing that's interesting about the public cloud and the big cloud operators is what they vowed to do to accommodate the scale that they need to operate at high magin. As the cloud has grown it has been exponential somewhat. Similar to almost a hype cycle graph. Where i guess an adoption chart would be more appropriate early adopters early majority so on where does just ramp up and up and up and up. What have the bump spin in the road though as it goes up and up for the cloud as it has evolved expanded. Yeah this is this is a this is a really important question in it. It's a intersects with a lot of my own personal experience. The probably the most critical thing in getting people to move confidently to adopting cloud architecture. Model says been the evolution of the security landscape to support that in a way that allowed businesses to operate using the public cloud within their risk expectations their regulatory regime however they are whatever compliance initiatives they are required to adhere to and one of the main things. I touched on this earlier and one of the comments that i made the real evolution had to do a scale but it had to do a scale in concert with operating an environment with multiple tenants. You know we talk about multi tenant capabilities of various infrastructure components of the it domain. But the cloud has had to do this in a way that was entirely at a different scale and it wasn't just cloud operators per se. It was anybody in the hyperscale realm so that could include an uber or twitter or an apple or other large-scale entities that are providing services content capabilities to millions of entities. And that problem was something that the enterprise regime was beginning to look at in terms of thinking of individual operational silos of an enterprise as an individual tenant but he never had to do it at the scale of millions of such entities and the cloud has quite successfully over the last decade plus been able to deliver an operating model that allows you to operate reliably and securely in a co located environment. Where you when you go into the public cloud. And he reserved instance. You don't always reserve an instance that is specifically hardware. That's dedicated to you. You might be sharing that instance competitor without even knowing it but the isolation that has been Imbued injured that architecture by the cloud developers themselves as allow to reliably operate knowing that the workloads that were running on that instance have been isolated and they are only operational for us And they are exposed to the internet to some degree. The fernande of many of the applications that runs on the cloud is exposed in the security domain near that allows access privileges to that. But the rest of the back. in cloud architectures are well isolated. Vp context That allows someone.

Dave larsen amazon twitter apple uber dave dave larsen david twenty seven years Nick Both millions nvidia today this week about six months fifteen years ago Connor craven One x eighty six
"connor craven" Discussed on 7 Layers

7 Layers

04:19 min | 1 year ago

"connor craven" Discussed on 7 Layers

"We look at different aspect of technology from literal wires in the ground to switches and routers and all the way up to the exploded amount of smart devices around us. I'm your host. Connor craven associate studios editor at sds central this week. We are getting an experts perspective on secure access services edge in just a moment. You'll hear from paul kohler principal consultant at the silicon valley technology. Alliance if you have to our previous upset the covered. Sassy i suggest to give it a listen it will give you all the basic information acronyms. You'll need to know before jumping into this conversation. I won't hold you any longer. Please enjoy interviewed with paul kohler. Welcome listeners to my interview with principal consultant at the silicon valley technology alliance. Paul kohler we are here today to talk about the technology secure access services edge or sassy for short but before we begin. How are you today. paul Doing very well. Thanks conor could you tell the listeners. A bit about yourself and philipson on where your knowledge on security service edge comes from. Yeah sure sure so So i I worked at cisco three different stints. I've worked. vm-ware also vip tele St wind pioneer and then through of had various different held various different roles Tech support seo sales engineer systems engineer t emmy product manager technology alliance partnerships running partnerships and for the coach. Just over the past year. I've been an independent consultant. I focus on. Sdn and cloud security and network management strategy then that role. I kind of talked various. Different contacts. That i've made the is These various different companies and try and keep on top of old various trends yet your focus on sdn networking security. That all seems to tie pretty well together to make what most people define sassy Speaking speaking of how people define sassy garner defined the technology in twenty nineteen but that definition sort of existed in vacuum. How would you define sassy. Yeah shaw so i think you know. It's it's really primarily two key components one is the security Sort of cloud based security portion and then the other is the actual enforcement portion so a use. Cpa portion so that cloud security portion. I think you know that there's been a lot of sort of disparite Solutions on the security side so like firewall cosby sake And then also you've got ips ideas malware and so long. And you know as as scott. I think correctly sort of defined it You know there's this increasing the more scalable lying rate Security rather than having point products and doing service chaining Just sort of being able to inspect the traffic one single time and also I think having sort of it's it's in a way. It's like applying the principles of st one and two to sassy a to security so meaning that you kind of consolidate your and unify your your policy engine. You'll management in the cloud and then the enforcement in a similar way similar to the sdn model..

Paul kohler paul kohler paul Doing Connor craven today cisco silicon valley technology silicon valley technology alli one this week past year two key components conor one single time twenty nineteen scott sds central three philipson stints
"connor craven" Discussed on 7 Layers

7 Layers

04:54 min | 1 year ago

"connor craven" Discussed on 7 Layers

"How have you seen <unk>. Cybersecurity change over the years cybersecurity as an industry. If you roll it back to when i was getting started was practitioner level application of theory. That is you had a group of people who are bush like the grey hats. We all had backgrounds recreationally exploring computer security and we became professionals up and started applying what we learned to help on the defensive side and our adversaries were essentially pierce. People were being very similar things but hadn't gone down the now. What we tend to see. Is that temperature is big business. Adversaries are most likely if you're talking about serious cybersecurity concerns state level actors. They're foreign governments and organizations. That are incredible funded colonel enterprises and the protection side shifted from this idea that we can block bad things from happening too much more sophisticated and nuanced approach to understanding risk in the same way that we might consider financial risk or business risk. Now security is one of those things and the last one. Didn't make on that if you look at a large publicly traded company and you pull down their public. Filing documents and ks cybersecurity is usually one of the things that's listed within them right so instead of being the purview of it. It's now an executive consideration that gets billing in a boardroom. Yeah i think that's definitely necessary to have take more of a naming a front seat but be part of a more serious conversation within an organization so as you've seen cyber security evolve in sort of become more professional in certain senses have there been a vents that more specifically influenced the way the world operates or caused the government intervening and industries to standardize themselves. There's there's three parts to that answer. The first is that we now are in an era of major data breaches being a foregone conclusion. Right everything about you. That has ever been recorded. Somewhere has probably been compromised. Whether it's your credit history moments you've you've lived in financial transactions e mail accounts you've had though if you go in pull down of weary again something like have i been postponed and put <unk>. Address it's stunning. How much information about. All of us is private citizens. Corporate entities is for sale and has been taken at some point so that changes the landscape in nature of attack threat. We see when organization is now attacked. You know what we used to think was that you could create a perimeter around the company and that was a firewall or something like it and the bad guys were out. There and organizations could consider themselves from an internal perspective to be safe and they just had to keep the bad guys from getting in. But that's not how it works anymore. And so there's been a real change from not exclusively but on moss a real change from highly technical attacks that leveraged code execution is. Choose right what i was doing. Twenty years ago can hack into a piece of technology to a much more. Social engineering focused landscape. Can i get someone to just give me access. Can i compromise someone through social engineering and deception. And i think what we've done from governmental perspective is start to establish some around what gatien's organizations have to protect the personal data of the people who they both employed but also that they own and us from a consumer perspective. You're especially seeing this right now. In the united states with things like the cpa the the california consumer privacy act or of course in in europe the gdp the general data protection regulations. This idea that that that personal data is an asset that has value in if your organization handles it with negligent security standards. You are on the hook for whatever matt costs and and the teeth. These regulations carry were bare their sharp and they can bite into profits and have enormous fines. So that's a real shift right like at one point in time cybersecurity as a market was about securing machines in securing technology. Now it's much more about protecting the private data of individuals in the attacks that we see our most likely going to be social engineering if not in their entirety that at the early stages if i can set efficient algorithm to give me access as an attacker. That's what i'm gonna do. Because it's easier than hacking into their their technical stack

Connor craven great horn cloud native e security compan kevin o'brien kevin O'brien Connor Kevin boston pierce bush
"connor craven" Discussed on 7 Layers

7 Layers

05:44 min | 1 year ago

"connor craven" Discussed on 7 Layers

"Where every episode we look at a different aspect of technology from literal wires in the ground to switches and routers in all the way up to the exploding amount of smart devices around us. I'm your host. Connor craven associate studios editor at s. e. x. central this week. We are looking at again data security in just a moment. You'll hear from kevin o'brien founder and ceo of great horn a cloud native security company. If you haven't listened to our last episode on data security yet. I recommend you give listen. It's a good look at what threats are out there. Regulations meant to secure organizations ways to protect yourself and the consequences of data breach. I won't hold you any longer. Please enjoy my interview with kevin. O'brien alright listeners. Today i am joined by kevin. O'brien ceo and co founder of cloud native e security company. Great horn hello. Kevin how are you today. Connor thanks for having me on the show. What is your history with cybersecurity. What got you into the field in. What kept you in it so in late. Nineteen ninety s the nineteen ninety nine. I met some of the team that was just about to formally start a company called at stake in boston was a group of hackers who were the loft Who had made a bunch of hacking technology software throughout the eighties nineties. And some business folks. That company was my introduction. I was invited to join the team right at the very beginning. Last time i was really technically useful for anybody. Perhaps but i was part of that crew reverse engineering and and pen testing in hacking for higher and really fell in love with it and over the last twenty years. Have done every security. Companies almost exclusively. Yeah that sounds like quite a history. How have you seen Cybersecurity change over the years cybersecurity as an industry. If you roll it back to when i was getting started was practitioner level application of theory. That is you had a group of people who are bush like the grey hats. We all had backgrounds recreationally exploring computer security and we became professionals up and started applying what we learned to help on the defensive side and our adversaries were essentially pierce. People were being very similar things but hadn't gone down the now. What we tend to see. Is that temperature is big business. Adversaries are most likely if you're talking about serious cybersecurity concerns state level actors. They're foreign governments and organizations. That are incredible funded colonel enterprises and the protection side shifted from this idea that we can block bad things from happening too much more sophisticated and nuanced approach to understanding risk in the same way that we might consider financial risk or business risk. Now security is one of those things and the last one. Didn't make on that if you look at a large publicly traded company and you pull down their public..

Connor craven great horn cloud native e security compan kevin o'brien kevin O'brien Connor Kevin boston pierce bush
"connor craven" Discussed on 7 Layers

7 Layers

05:12 min | 1 year ago

"connor craven" Discussed on 7 Layers

"We look at different aspects of technology from literal wires in the ground to switches and routers and all the way up to the exploding amount of smart devices around us. I'm your host. Connor craven associate studio editor at sdn central this week. We are continuing to look at ransomware. In just a moment you will hear from jim. Bowers security architect in the tech gurus team at technology brokerage inc or tbi. Please no on occasion. I refer to tbi as ti research. This was set an error the tpi. Jim bowers works at is not the same organization as be research if fact if you search for tv. I research you'll probably find research papers on traumatic brain injuries and not the latest on technology solutions. If you haven't listened to our last episode on ransomware yet. I recommend you give it a listen. It's a welcome refresher on this type of malware. The short version is attackers gain access to files. They encrypt them in demand. Money before decrypt the files while they'll decrease the house if you're lucky i won't hold you any longer. Please enjoy my interview with security architect. Jim bowers of tbi hello audience. We are here with jim. Bowers of research. Welcome jim i appreciate you taking the time to chat about ransomware today. Can you tell the audience a little bit about your background and your role at ti. Yeah it'd be glad to do so My background over. The past twenty five years really started in networking for the first half. I are protected. Low latency distribution in architecture for financial trading and voice and video As threat actors starting to all the attack started to get better kinda jump into security. And that's when i worked with diaz. Mitigation helps us several carriers. Us mitigation cloud based products. And then kind of shifted more into Helping manage stock offerings rolled out several companies as well as lookit security assessments for companies tv. I really glad to be here. are of their tech guru group and that's a group of kennard engineers. That helps all of our partners kind of do that. Consultative approach Whether it's insecurity on the cybersecurity architects Or cloud or all things of voice Voice related so we really enable our our partners. Have that deeper discussion. Yeah it seems like you're Maybe a jack of all trades or You'll have a fingers a lot of pies so within all of that Where have you learned the most about ransomware and you know..

Jim bowers Connor craven Bowers jim lookit diaz kennard Us
"connor craven" Discussed on 7 Layers

7 Layers

01:31 min | 2 years ago

"connor craven" Discussed on 7 Layers

"Hello and welcome to seven layers where each episode we explored different layer at the technology that connects our world from the literal wires in the ground to switches and routers, and all the way up to exploding amount of smart devices that surround us I'm your host Connor Craven Studios Associate Editor 's DX central this week. We are shifting our discussion about the Internet of things to its considerable security challenges all discuss the general state of. Of, security for out devices, then all export some examples of attacks that could or have happened using devices, and while an entire technical rundown of the various ways to secure the many types of devices isn't super feasible. In a forty five minute podcast, this will give you a strong knowledge best practices. He very well may have announced device in your home or office, whether that'd be a Thermostat, vacuum, refrigerator, printer, or even fax machine. I do hope this episode scares you a little bit, and maybe we should have saved it for Halloween, because not devices are some of the most prevalent forms of insecure connected devices in the world today they're easily hacked and act as an entry point into a larger network and the data within according to Mary O'Neill. VP of security at Nokia, when an unprotected devices connected to a network, it is infected in pre minutes or less. If. You have one or several Audi devices that put you at risk. Listen to what I have to say, and then plenty of your own additional research to see what you can do to keep your information safe. I will say you may just be relieved to find that. The company about your devices from actually took security seriously. Make..

Connor Craven Studios Associate Editor Mary O'Neill Audi Nokia VP
"connor craven" Discussed on 7 Layers

7 Layers

05:29 min | 2 years ago

"connor craven" Discussed on 7 Layers

"We explore a different layer of the technology that connects our world from the literal wires in the ground to switches and routers and all the way up to the exploiting amount of smart devices that surround us. I'm your host Connor Craven Studios Associate Editor at Sdn Central in our last episode. We gave the basics. What five G is and how it works. It is a complex multi-faceted and according to the Central Editor Matt Capco a considerably over hyped technology. This week is the second in a two part series of five G. Networks in this episode. We're going to answer the questions. What is the current satisified networks? What are some five use cases and Howard telecoms going to monetize five G. following that we are joined by the president of Five G. America's Chris Pearson to discuss the five G. Market and use cases? G America's is a five G. dedicated industry trade organization made up of telecommunication service providers and manufacturers is impossible to deploy a mature G. Network. All at once. Has He talked about in the previous episode. Five years really out in stages as such the five G. Deployment Status of every major telecommunications company Telekom is in constant flux across the globe telecoms are racing to build better five G. networks to play them fester improve out the modernization model in this section. I'm going to look at a few countries. Telecom sector leading the charge including China South Korea the United Kingdom Germany and the United States. While this is not a comprehensive list of every country in telecom developing five G. networks. It will give you a good overview of the global landscape and general state of deployments in trials and be sure to check the episode transcript for links to resources for those of you who really want to fall down the rabbit hole of five. G. Market landscapes as of this recording. Only one of these countries mentioned has auctioned off the high frequency millimeter wave spectrum. This is significant because the military spectrum is the frequency range newest five G. networks provides high in dense urban areas plans by the other countries in the list to do so in early twenty. Twenty it disrupted by the Cova. Nineteen pandemic which country has completed their action. Well you'll just have to listen to find out. Let's start with China. According to the Chinese state run news agency Shenhua. China launched the world's largest G. Network on October thirty first two thousand nineteen this is significant because according to analysts at the firm Jefferies as well as GSM a the number of people in China subscribe to five G. will grow from one hundred ten million to six hundred million between twenty twenty and twenty twenty five. That would equate to about forty percent of the entire global five market in twenty twenty-five the largest possible because the three largest Chinese network operators China Mobile China Unicom in China Telecom agreed to cooperate in building Vijay Infrastructure China Unicom and China. Telecom are also sharing bands of five G. frequency spectrum. Let's go a little deeper cooperation between the three on building infrastructure. Each of the telecoms were responsible for deploying. A portion of the total number base stations needed to hit the mark of the largest five-day network collectively three telecoms deployed almost eighty six thousand. Five G base stations as of November twenty nineteen. Because the three work together on this the time it took to have the largest network was reduced entering China into the five G. Race however as of this recording they have yet to utilize the high frequency millimeter wave spectrum. A key element of five G. networks. The rapid ramp-up of infrastructure was accomplished despite the efforts to hamper China's spivey progress from the United States and other countries as Chris Nicholl a principal analysts that he g was quoted in an SEC. Central article quote any other time. I would say that this effort in China is really pushing the five G. development forward globally but with the Chinese vendors being hampered in the global market Nokia Ericsson. Samsung are buffered in the United States against Y and Z. T he added. I'm still hearing reports. That hallway is about a year ahead of the other vendors in key areas such as massive multiple input multiple output antennas in radio performance. But the are behind on V. Ran. So you need to pick your position on leadership and quote. China may have the largest five G. Network South Korea may have the most advance according to a December twenty nineteen report from open signal the network performance of both escape telecoms in Korea Telecom's five networks surpassed five G. networks in nearly all other countries for example escaped telecom at the time of the open signal report had download speeds of sixty nine point eight megabits per second L. G. You plus and Korea Telecom the other telecoms reviewed had download speeds of forty eight point one and forty seven point three megabits per second respectively. Moreover both providers have portions of their networks. That are on five G. standalone infrastructure. In case you've forgotten from last episode of five Stanley Infrastructure is one that does not rely on four G. Network infrastructure. All of this is being done without millimeter wave frequencies as they have not been auctioned off by the South Korean government beyond the technical aspects. South Korea also lease land market adoption. South Korean customers have been buying five network services more than any other country according to research from IHS Market Publishing September. Twenty nineteen stores could not keep five G. capable devices in stock in South Korea additionally. Ihs Market reported that it only took sixty nine days for South Korea's five G. providers to reach one million five G. subscribers citing the greater variety of phones leading to a more rapid growth of the five G. market between nineteen reports summary South Korea's.

China telecoms South Korea G. Networks G. Market China Mobile China Unicom United States Vijay Infrastructure China Uni Korea Telecom China Telecom IHS Market Howard telecoms G. networks Stanley Infrastructure Connor Craven Studios G. Network Five G. America Matt Capco Editor Sdn Central