As connectivity to cloud-based resources grows, cybercriminals are using valid, compromised credentials to access enterprise resources at an alarming rate.That's one of the chief findings of the IBM X-Force Cloud Threat Landscape Report, which also found a 200% increase (about 3,900 vulnerabilities) in cloud-oriented Common Vulnerabilities and Exposures (CVE) in the last year.“Over 35% of cloud security incidents occurred from attackers’ use of valid, compromised credentials,” wrote Chris Caridi, strategic cyber threat analyst with IBM X-Force, in a blog about the report. “Making up nearly 90% of assets for sale on dark web marketplaces, credentials’ popularity among cybercriminals is apparent, averaging $10 per listing – or the equivalent of a dozen doughnuts.”To read this article in full, please click here
As connectivity to cloud-based resources grows, cybercriminals are using valid, compromised credentials to access enterprise resources at an alarming rate.That's one of the chief findings of the IBM X-Force Cloud Threat Landscape Report, which also found a 200% increase (about 3,900 vulnerabilities) in cloud-oriented Common Vulnerabilities and Exposures (CVE) in the last year.“Over 35% of cloud security incidents occurred from attackers’ use of valid, compromised credentials,” wrote Chris Caridi, strategic cyber threat analyst with IBM X-Force, in a blog about the report. “Making up nearly 90% of assets for sale on dark web marketplaces, credentials’ popularity among cybercriminals is apparent, averaging $10 per listing – or the equivalent of a dozen doughnuts.”To read this article in full, please click here
It’s no secret that SASE has skyrocketed in popularity in recent years due in large part to how the solution provides strong threat protection and secure access no matter where a user, device, or application is located. This is no small feat, especially in the work-from-anywhere (WFA) era, where employees are logging in from a coffee shop one day and the office the next. To read this article in full, please click here
It’s no secret that SASE has skyrocketed in popularity in recent years due in large part to how the solution provides strong threat protection and secure access no matter where a user, device, or application is located. This is no small feat, especially in the work-from-anywhere (WFA) era, where employees are logging in from a coffee shop one day and the office the next. To read this article in full, please click here
Cisco is on a mission to make sure Ethernet is the chief underpinning for artificial intelligence networks now and in the future.It has been a huge contributor to Ethernet development in the IEEE and other industry groups over the years, and now it’s one of the core vendors driving the Ultra Ethernet Consortium (UEC), a group that’s working to develop physical, link, transport and software layer advances for Ethernet to make it more capable of supporting AI infrastructures.“Organizations are sitting on massive amounts of data that they are trying to make more accessible and gain value from faster, and they are looking at AI technology now,” said Thomas Scheibe, vice president of product management with Cisco’s cloud networking, Nexus & ACI product line.To read this article in full, please click here
Whenever you need to work with lists that are stored as text files on Linux – especially long ones – you can take advantage of some easy commands to make manipulating them a lot easier. Any text file can be easily sorted, but you can also randomly arrange the lines, number them or join files when two share an initial common field. In fact, if you only want to see every other line or every fifth line in a file, you can do that too. This post runs through the commands to do all of these things.Sorting files
The sort command makes sorting text files very easy. To view the contents of a text file in sorted order, all you need to do is type a command like this:To read this article in full, please click here
The UK government has announced it will build a £900 million (US$1.1 billion) supercomputer, to drive the country’s AI research and innovation capabilities.The supercomputer, dubbed Isambard-3 after the 19th century British civil and mechanical engineer Isambard Kingdom Brunel, is set to be installed at the National Composites Centre in Bristol later this year. The University of Bristol is home to the UKRI Centre for Doctoral Training in Interactive Artificial intelligence and is part of the GW4 group of universities — an alliance of research-intensive universities that also includes Bath, Cardiff and Exeter.Bristol University will also host the new AI Research Resource (AIRR or Isambard-AI), a national facility to help support AI research and promote the safe use of the technology. Both the supercomputer and AIRR are financed by the by the AI investment announced the government announced in March.To read this article in full, please click here
Cisco is adding a security module to its observability platform that promises to help enterprises assess threat risks and protect cloud-based resources.The Cisco Secure Application module, available now, is part of the vendor’s Full Stack Observability (FSO) platform, which is designed to correlate data from application, networking, infrastructure, security, and cloud domains to make it easier for customers to spot anomalies, preempt and address performance problems, and improve threat mitigation.FSO is designed to make intelligent use of metrics, events, logs and traces. With it, organizations can consolidate to fewer tools, collect data from any source, correlate information, and enable AI-driven analysis to predict and prevent problems, Cisco said at the FSO launch event in June. To read this article in full, please click here
Cisco is adding a security module to its observability platform that promises to help enterprises assess threat risks and protect cloud-based resources.The Cisco Secure Application module, available now, is part of the vendor’s Full Stack Observability (FSO) platform, which is designed to correlate data from application, networking, infrastructure, security, and cloud domains to make it easier for customers to spot anomalies, preempt and address performance problems, and improve threat mitigation.FSO is designed to make intelligent use of metrics, events, logs and traces. With it, organizations can consolidate to fewer tools, collect data from any source, correlate information, and enable AI-driven analysis to predict and prevent problems, Cisco said at the FSO launch event in June. To read this article in full, please click here
The reliability of services delivered by ISPs, cloud providers and conferencing services (such as unified communications-as-a-service) is critical for enterprise organizations. ThousandEyes monitors how providers are handling any performance challenges and provides Network World with a weekly roundup of interesting events that impact service delivery. Read on to see the latest analysis, and stop back next week for another update. Additional details available here.Internet report for September 4-10
ThousandEyes reported 184 global network outage events across ISPs, cloud service provider networks, collaboration app networks and edge networks (including DNS, content delivery networks, and security as a service) during the week of September 4-10. That’s up 12% from 164 outage events the week prior. Specific to the U.S., outages climbed from 66 to 91, an increase of 38%. Here’s a breakdown by category:To read this article in full, please click here
By: Nav Chander, Head of Service Provider SD-WAN/SASE Product Marketing at HPE Aruba Networking.This is part 2 of a 3-part blog series on SD-WAN, SSE, and multi-cloud networking (MCN), where we will highlight how these 3 technology areas are analogous to 3 different musical instruments that can be played separately. The first blog focused on MCN, and this blog focuses on SD-WAN technology.So, let’s first explore our second instrument the guitar, an instrument which will symbolize SD-WAN, an important foundation for building a modern enterprise WAN network that supports secure connectivity and high performance for business applications. The macro driver of SD-WAN is the digital transformation effort worldwide which is manifested by enabling an efficient, cloud-first IT strategy.To read this article in full, please click here
By: Nav Chander, Head of Service Provider SD-WAN/SASE Product Marketing at HPE Aruba Networking.This is part 2 of a 3-part blog series on SD-WAN, SSE, and multi-cloud networking (MCN), where we will highlight how these 3 technology areas are analogous to 3 different musical instruments that can be played separately. The first blog focused on MCN, and this blog focuses on SD-WAN technology.So, let’s first explore our second instrument the guitar, an instrument which will symbolize SD-WAN, an important foundation for building a modern enterprise WAN network that supports secure connectivity and high performance for business applications. The macro driver of SD-WAN is the digital transformation effort worldwide which is manifested by enabling an efficient, cloud-first IT strategy.To read this article in full, please click here
Here’s a wrinkle in corporate environmental efforts. Futurum Research is backing a recently published academic paper that suggests hard disk drives (HDD) could be greener than solid state drives (SSD) when taking into consideration the manufacturing process.The paper in question is called “The Dirty Secret of SSDs: Embodied Carbon” and was published last year by Swamit Tannu, computer science professor at the University of Wisconsin-Madison, and Prashant J. Nair, an assistant computer science professor at the University of British Columbia.The paper states that the biggest carbon emissions happen at the time of manufacture, with production of SSDs generating much more carbon than disk drives of equal capacity.To read this article in full, please click here
Here’s a wrinkle in corporate environmental efforts. Futurum Research is backing a recently published academic paper that suggests hard disk drives (HDD) could be greener than solid state drives (SSD) when taking into consideration the manufacturing process.The paper in question is called “The Dirty Secret of SSDs: Embodied Carbon” and was published last year by Swamit Tannu, computer science professor at the University of Wisconsin-Madison, and Prashant J. Nair, an assistant computer science professor at the University of British Columbia.The paper states that the biggest carbon emissions happen at the time of manufacture, with production of SSDs generating much more carbon than disk drives of equal capacity.To read this article in full, please click here
Weeks after Intel’s proposed $5.4 billion acquisition of Israel-based Tower Semiconductor fell apart, the two firms announced plans for Intel to provide foundry services to its former acquisition target.As part of the deal, Tower will invest up to $300 million to acquire and own equipment and other fixed assets at Intel’s New Mexico fabrication plant. Tower will eventually have a capacity of over 600,000 photo layers per month to manufacture its analog CMOS chips.Tower already owns fabs in Israel, the U.S., and Japan, and it plans to launch in Italy soon. But the existing fabs create 200 mm wafers. The New Mexico facility will create 300 mm wafers, increasing production quantity.To read this article in full, please click here
Weeks after Intel’s proposed $5.4 billion acquisition of Israel-based Tower Semiconductor fell apart, the two firms announced plans for Intel to provide foundry services to its former acquisition target.As part of the deal, Tower will invest up to $300 million to acquire and own equipment and other fixed assets at Intel’s New Mexico fabrication plant. Tower will eventually have a capacity of over 600,000 photo layers per month to manufacture its analog CMOS chips.Tower already owns fabs in Israel, the U.S., and Japan, and it plans to launch in Italy soon. But the existing fabs create 200 mm wafers. The New Mexico facility will create 300 mm wafers, increasing production quantity.To read this article in full, please click here
The comm command on Linux systems can compare file or directory contents and display the differences in a clear and useful way. Think of “comm” not so much as a reference to “compare” as to “common,” since the command writes to standard output both the lines that are common and the lines that are unique in each of the files or directories.One key requirement when using comm is that the content to be compared must be in sorted order. However, there are ways that you can get away with comparing content that isn’t sorted. Some examples of how to do this will be presented in this post.Comparing files
Normally, when using the comm command, you would compare two sorted text files to see their shared and unique lines. Here’s an example in which a list of friends and a list of neighbors are compared.To read this article in full, please click here
The use of data processing units (DPU) is beginning to grow in large enterprises as AI, security and networking applications demand greater system performance.Much DPU development to date has been aimed at hyperscalers. Looking ahead, DPU use in the data center and elsewhere in the enterprise network is expected to grow. One way that could happen is the melding of DPU technology with networking switches – a technology combination AMD Pensando calls a “smartswitch.”An early entrant in that category is HPE Aruba’s CX 10000, which combines DPU technology from AMD Pensando with high-end switching capabilities. Available since early 2022, the CX 10000 is a top-of-rack, L2/3 data-center box with 3.6Tbps of switching capacity. The box eliminates the need for separate appliances to handle low latency traffic, security and load balancing, for example.To read this article in full, please click here
Toyota assembly plants across Japan shut down for about a day last week due to a malfunction following routine maintenance. Insufficient disk space in servers used to process parts orders caused the systems to become unavailable, according to the automaker.Toyota this week provided the cause of the production system outage and reassured customers and partners that the company did not suffer from a cyberattack, but rather a lack of disk space across some of the servers in its production order system. The malfunction suspended operations at some 14 plants in Japan. (Read more about the biggest outages of the year)To read this article in full, please click here
Toyota assembly plants across Japan shut down for about a day last week due to a malfunction following routine maintenance. Insufficient disk space in servers used to process parts orders caused the systems to become unavailable, according to the automaker.Toyota this week provided the cause of the production system outage and reassured customers and partners that the company did not suffer from a cyberattack, but rather a lack of disk space across some of the servers in its production order system. The malfunction suspended operations at some 14 plants in Japan. (Read more about the biggest outages of the year)To read this article in full, please click here