On today’s episode Ethan is joined by Mark Prosser, a self-described Network Operator Advocate and Network Automation Dreamer, to embark on a thought exercise about network services. Together they grapple with questions such as: What is a network service, exactly? How is it defined? Is it even possible to define it when considered in the... Read more »
Today our hosts discuss IPv6 Privacy and Temporary Addresses to clarify how address provisioning can potentially work for host operating systems. The discussion covers the difference between permanent and temporary privacy addresses, their uses, and how interface identifiers are assigned to hosts.
Malware has shifted from phishing expeditions to open source packages, domains, and repositories. Ned and Kyler welcome Jenn Gile, co-founder of Open Source Malware, to discuss how malware is making its way into open source software. Together they break down NPM compromises, AI-driven infiltration, malicious agent skills, and more. Episode Links: Open Source Malware –... Read more »
Take a Network Break! We commence with a red alert on FastMCP, and then debate whether Anthropic’s Project Glasswing is a marketing stunt or a reasonable response to the growing ability of AI models to find and exploit software vulnerabilities. Iran targets US OT networks, startup Aria Networks unveils Ethernet switches purpose-built for AI factories,... Read more »
Eric Chou, author of the AI Networking Cookbook and host of Network Automation Nerds, joins Ethan and Drew to discuss adding artificial intelligence to your network automation toolbox. The AI Networking Cookbook is aimed at network engineers and provides a systematic approach to learning AI for network automation. Together they break down pros and cons... Read more »
One of the early promises of public cloud was that, in theory, you could move workloads from Cloud Provider A to Cloud Provider B for any number of reasons: lower costs, new capabilities, better uptime, and so on. In practice, once a workload goes into a public cloud and you build out all the other... Read more »
Kevin and Alexis take a break from their regular interviews to answer your questions! Join them for an unfiltered, wide-ranging discussion including the value of certifications, online learning pros and cons, how networking engineering jobs are changing, how to maintain a healthy work-life balance, and more. AdSpot Sponsor: Statseeker Statseeker gives engineers near real-time performance... Read more »
FluidCloud calls itself a cloud-cloning platform. In other words, the company can map and copy all the cloud infrastructure settings from one public cloud—including compute, storage, networking, and identity—and port those settings to a different public cloud. On today’s sponsored Day Two DevOps, Ned and Kyler talk with FluidCloud’s co-founders to understand how the platform... Read more »
Take a Network Break! Guest commentator Tom Hollingsworth joins Drew for today’s episode. We start with a double Red Alert from Cisco for its Secure FMC software. On the news front, Cato Networks adds adaptive threat prevention to its SASE offering that looks for seemingly innocuous signals that could add up to an attack, Google... Read more »
Today on the Tech Bytes podcast we hear from Statseeker, a network monitoring company that collects high-fidelity network data to help engineers and administrators get visibility into physical, virtual, and logical interfaces to find problems faster, understand root causes, and spot behaviors and anomalies so you can prevent problems instead of just reacting to them.... Read more »
Software Defined Networking (SDN) is a centralized architecture in which a controller, or a hierarchy of controllers, runs software that computes network-engineered paths and pushes that forwarding scheme into the network. It’s also very complex, which can lead to network failures. What if there was a way to keep the benefits of SDN while also... Read more »
If you’re looking for a network automation project but you’re worried about breaking stuff, why not build your automation adventure around IPv6? If your production traffic runs on IPv4, you can experiment with automated configurations and changes using IPv6 without negatively impacting that v4 traffic. You can get a two-for one experience learning both IPv6... Read more »
Engineers and developers are using AI like never before, including in production. That has potential consequences, both good and bad, for uptime, operations, security and risk management, and more. Today’s guest, Rich Mogull, guides us through the decision-making process of adding AI to your production lifecycle and possible ramifications. Rich is Chief Analyst at the... Read more »
Take a Network Break! We start with follow-up on the proper pronunciation of the US state of Nevada, and then sound the alarm about new research that gets around WiFi client isolation and could enable man-in-the-middle attacks. On the news front, AMD and Meta strike a massive deal in which AMD will sell its stock... Read more »
OT networks used to be air-gapped. These days, more and more OT networks are being bridged by IT networks, which exposes critical industrial controls and other systems to serious risk. On today’s Tech Bytes, sponsored by Palo Alto Networks, we dig into how organizations can detect “precursor signals” that may indicate a broader attack chain,... Read more »
Our topic today is the designing and building of high-performance networking hardware. If you assume the hardware details don’t matter, you’re missing the intentional engineering required to build truly reliable and quiet infrastructure. In this sponsored episode, we discuss Meter’s hardware philosophy with our guest, Joshua Markell, Head of Hardware at Meter. Joshua walks us... Read more »
Alexis and Kevin sit down with Mike Miller to discuss what brought him from the back of a garbage truck to his current position as a Virtual Chief Information Security Officer (VCISO). He breaks down how a VCISO differs from a CISO, and discusses the two types of clients looking for VCISO services: those looking... Read more »
Take a Network Break! We start with follow-ups on secure browsers and data centers in space, and then sound the red alert about an RCE vulnerability in NLTK. On the news front, Palo Alto Networks acquires a startup that monitors endpoints for malicious packages, browser extensions, scripts, and other threats, Lumen debuts a multi-cloud gateway... Read more »
Traditional routing protocols like OSPF simply choose the “shortest” path. If the shortest path is full of traffic and there are alternate paths carrying nothing, OSPF can’t help you. Path Computation Element (PCE) along with Path Computation Element Protocol (PCEP) is a way to construct forwarding paths through the network based on factors that distributed... Read more »
Ed, Nick, and Tom discuss the need for Network Address Translation v6 to v6 (NAT66). While Network Prefix Translation (NPTv6) exists, its limitations make it insufficient for real-world business needs. They also highlight that without a standardized NAT66, the market is forcing vendors to implement their own, hindering widespread IPv6 adoption. Episode Links: IPv6-to-IPv6 Network... Read more »