У нас вы можете посмотреть бесплатно TiPS Episode 26 0302 - NG911 and SD-WAN a Great Tool but Dangerous Assumptions или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Source: https://www.podbean.com/eau/pb-mr3hp-... In this episode, Fletch zooms in on a fresh reminder that “the network” is not always just plumbing, it is the backbone of operations. Cisco’s newly disclosed critical Catalyst SD-WAN vulnerability (CVE-2026-20127) is a worst-case example of what happens when the control plane becomes the target. The issue is an authentication bypass affecting Cisco Catalyst SD-WAN Controller (vSmart) and SD-WAN Manager (vManage), and it has been flagged as actively exploited. We break down, in plain English, what this kind of flaw can mean in the real world: How an attacker can pivot from “one exposed management path” into fabric-wide policy and routing manipulation Why SD-WAN is both a resiliency win and a blast-radius multiplier when misconfigured What “cyber exposure” looks like when your WAN is carrying voice, CAD, radio backhaul, video, and interop traffic that public safety depends on If you run SD-WAN in, near, or adjacent to public safety infrastructure, this is the moment to audit your management exposure, validate your hardening posture, and move patching from “schedule it” to “do it.” #Cybersecurity #SDWAN #Cisco #PublicSafety #NG911 #CriticalInfrastructure