Continue reading "Interview with Juniper Networks Ambassador Said van de Klundert"
Companies want simplicity and security, so “I don’t think building virtual networks on top of...
The move highlights robust plans for the carrier, though it could still lag behind rivals that are...
Preventing damaging intrusions to increasingly comingled IT and operational technology (OT) domains...
The vendors say they have more than 50 communication service providers running live production...
With the API, carriers will have a common access system for a diverse range of services, including...
In today's episode we make sense of IPv6 protocol analysis with expert teacher and troubleshooter Denise Fishburne. We discuss the importance of using a protocol analyzer and packet captures to better understand IPv6, and how to get over your fear of learning this protocol.
The post IPv6 Buzz 020: Demystifying IPv6 Protocol Analysis With Denise Fishburne appeared first on Packet Pushers.
Last fall, the United States FBI warned organizations of an increase in attacks that exploit vulnerabilities in the Remote Desktop Protocol (RDP). Attackers stole sensitive data and compromised networks by taking advantage of desktops left unprotected. Like legacy VPNs, RDP configurations made work outside of the office corporate network possible by opening a hole in it.
Starting today, you can use Cloudflare Access to connect over RDP without sacrificing security or performance. Access enables your team to lock down remote desktops like you do physical ones while using your SSO credentials to authenticate each connection request.
The FBI cited weak passwords and unrestricted port access to RDP ports as serious risks that led to the rise in RDP-based attacks. Cloudflare Access addresses those vulnerabilities by removing them altogether.
When users connect over RDP, they enter a local password to login to the target machine. However, organizations rarely manage these credentials. Instead, users set and save these passwords on an ad-hoc basis outside of the single sign-on credentials used for other services. That oversight leads to outdated, reused, and ultimately weak passwords.
Cloudflare Access integrates with the identity credentials your team already uses. Whether your Continue reading
Can applying NFV and SDN principles to a telco organization yield better results?
I recently talked to a company doing some very interesting things in the mobility space and I thought I’d take a stab at writing about them. Most of my mobility posts are about access points or controller software or me just complaining in general about the state of Wi-Fi 6. But this idea had me a little intrigued. And confused.
Atmosic is a company that is focusing on low-power chips, especially for IoT applications. Most of their team came from Atheros, which you may recall powers a ton of the reference architectures used in wireless APs in many, many AP manufacturers that don’t make their own chips. Their team has the chops to make good wireless stuff one would think.
Atmosic wants to make IoT devices that use Bluetooth Low Energy (BLE). So far, this is sounding pretty good to me. I’ve seen a lot of crazy awesome ideas for BLE, like location tracking indoors or on-demand digital signage. Sure, there are some tracking issues that go along with that but it’s mostly okay. BLE is what the industry has decided to standardize on for a ton of IoT functionality.
How does Atmosic want to change things Continue reading
But, the local operators will be the ones feeling the most pressure to match the world in 5G...
What attendees can expect from Chinese equipment vendors Huawei and ZTE at MWC Barcelona following...