Author: Stefan Brunner

Stefan Brunner

About: Stefan Brunner

Stefan started his career as a London banker in M&A and private equity, evaluating and authoring business plans, and performing financial analytics for due diligence reports. Intrigued by the upcoming Internet, he shifted his focus to leveraging technology in banking. He designed and built global hyper-scale network and security infrastructure for some of the largest financial institutions for Juniper Networks. Maintaining his bifocal business interest, he served as Product Line Manager for Juniper Networks, and has a history as an entrepreneur and founder. Excited in seeing the potential in cloud based security systems and sandboxing, Stefan joined the pioneer in sandboxing technology SonicWALL in 2014 through DELL as their Lead Solutions Architect. Stefan earned a Master in Business Administration, triple majoring in Innovations Research and Technology Management, Information and Communications Economics, and Accounting from Ludwig-Maximilians-University, and an executive degree in Telecommunications Engineering from UC Berkeley. Stefan earned countless industry certifications, including JNCIE. Stefan has published an O’Reilly bestseller on security and countless white papers.
Smart home automation app on mobile
In a casual conversation with my realtor friend, I learned that many upscale tract builders now include home automation to increase margin. We’ve come a long way since the X10 days. Home automation is still a splintered industry. No end-to-end solutions exist. There are, of course, the commercial integrators targeting custom estates with project cost measured in the percentage of home values.
Cyber criminals prefer to receive ransom in the cyber currency Bitcoin because it is anonymous. The truth is “sort of.” Let’s take a closer look at how Bitcoins work, and how the WannaCry perpetrators, possibly the Lazarus Group, want to be paid. Bitcoins are different from fiat currencies because, with Bitcoins, no actual coins or bills exist, not even digital ones.
I often get asked, “Why should we implement SSL inspection? We just upgraded our security from stateful inspection to deep inspection. If something is encrypted, is it not encrypted for a reason, for being secure?” Let me explain… Back in the day, network traffic was well behaved. If you were a software vendor and wanted to offer a new application, you had to sign up with IANA and get a reserved port for your application.