"When you move to virtualization and are doing in software what you do in hardware today, the...
Open Networking Summit (ONS) 2019: reflections of an industry in transition.
As adoption of Internet of Things devices increases, so does the number of insecure IoT devices on the network. These devices represent an ever-increasing pool of computing and communications capacity open to misuse. They can be hijacked to spread malware, recruited to form botnets to attack other Internet users, and even used to attack critical national infrastructure, or the structural functions of the Internet itself (we give several examples from recent headlines in the Reference Section, below).
The problem this poses is what to do about IoT as a source of risk. This blog post includes reflections on events that came to light in recent weeks, sets out some thoughts about technical mitigations, and sketches out the boundaries of what we think can be done technically. Beyond those boundaries lie the realms of policy measures, which – while relevant to the big picture – are not the topic of this post.
Why are we exploring this issue now? Partly because of our current campaign to improve trust in consumer IoT devices.
And partly, also, because of recent reports that, as a step towards mitigating this risk, connected devices will be subjected to active probing, to detect whether or not they Continue reading
The SD-WAN market is so hot right now that vendors, especially security companies, can’t help but...
A long while ago I published a sample Ansible/NAPALM/Jinja2 solution that would take LLDP information and turn it into a network diagram (I described its details in a short video that’s accessible to anyone attending our network automation course or having an Expert subscription).
The trickiest part of that solution was detection of bidirectional links:
Read more ...Every time when I get bored from my day job I tend to find some small interesting project that I can do that can give me an instant sense of accomplishment and as the result lift my spirits and improve motivation. So this time I remembered when someone once asked me if they could use Terraform to control their physical network devices and I had to explain how this is the wrong tool for the job. Somehow the question got stuck in my head and now it came to fruition in the form of terraform-yang.
This is a small Terraform plugin (provider) that allows users to manipulate interface-level settings of a network device. And I’m not talking about a VM in the cloud that runs network OS of your favourite vendor, this stuff is trivial and doesn’t require anything special from Terraform. I’m talking about Terraform controlling your individual physical network devices over an OpenConfig’s gNMI interface with standard Create/Read/Update/Delete operations exposed all the way to Terraform’s playbooks (or whatever they are called). Network Infrastructure as code nirvana…
Although this may look scary at the beginning, the process of creating your Continue reading
Google teamed up with seven open source software vendors including MongoDB, Elastic, and Redis...
The OpenStack community is "focused on the needs of users," thus it "naturally includes many...
The storage caching appliance combines hardware from Dell EMC and Microsoft software in a pizza box...
In a busy market, the chipmaker seeks to compete with the likes of Nvidia and Intel by developing a...
Safer Internet Day is celebrated in over 100 countries each year to promote a more secure Internet. It nurtures and increases public awareness on cyber security, especially to young people across the globe, so that they become more responsible when using technology and digital gadgets. In Malaysia this year, this event was observed over one month, beginning 5 February.
The Malaysian Safer Internet Day campaign was officiated by Eddin Syazee Shith, Deputy Minister of Communication and Multimedia in Putrajaya, Malaysia. It focused on “Cyber Wellness,” with the objective to promote wellness in the digital world through healthy mental well-being and ethical social values.
The Internet Society Malaysia Chapter was a strategic partner in Safer Internet Day 2019. Together with the Ministry of Communications and Multimedia, CyberSecurity Malaysia and other stakeholders from the industry, regulators, and society, various programs were organized to promote cyber wellness, a safer Internet, and nurturing and increasing public awareness on cyber security.
The theme cyber wellness was chosen as young people today have greater access to the Internet and communication devices. Living in an “on demand” interactive digital culture where social media has become an influential platform to their social lives, youth can be exposed to Continue reading
Looking to elevate your skills from on-prem hardware monkey to cloudy diva? In this Datanauts episode, we explore one person's career path from tech support to cloud architect, and get his opinions on key cloud tools and issues.
The post Datanauts 162: From Tech Support To Cloud Architect – An Opinionated Career Path appeared first on Packet Pushers.