The Falco project, donated by Sysdig, taps into the Linux kernel to provide runtime security at the application, file, system, and network levels.
Good-bye clickbait? Facebook has tossed out more than 800 publishers and accounts it accused of trafficking in clickbait and political spam, the Washington Post reports. Facebook also accused some of the accounts of “inauthentic behavior,” otherwise known as fake news. The bans met with some resistance, with some critics saying Facebook’s terms of service represent a moving target.
Let’s Encrypt rising: Let’s Encrypt, a service that provides websites free SSL certificates, is helping the Internet move toward better encryption, Forbes says. Let’s Encrypt “may finally fix the broken world of HTTPS hosting and usher in an online future in which creating an HTTPS site becomes as transparent as visiting one,” the author writes.
Government’s role in IoT security: The U.S. government could drive more security into the Internet of Things industry by changing its tech acquisition standards, says Nextgov. Federal agencies could use the Federal Acquisition Regulation to enforce minimum security standards, the author suggests.
RIP Google+: Google is planning to shut down the consumer version of its Google+ social media site after the company disclosed a massive data breach there, The Verge reports. Google+ also has “low usage and engagement,” according to Google.
Insecure security cameras: Millions of Continue reading
Supply chain safety is more than just implants
The post Supply Chain Integrity Needed for Repair Cycle tool appeared first on EtherealMind.
Evolving DevOps practices will require a new level of agility and speed to deployment. Advancements in the cloud sector have organizations wondering how the two can work together.
This blog post was initially sent to subscribers of my SDN and Network Automation mailing list. Subscribe here.
One of my readers asked a very valid question when reading the Why Is Network Automation So Hard blog post:
Why was network automation 'invented' now? I have been working in the system development engineering for 13+ years and we have always used automation because we wanted to save time & effort for repeatable tasks.
He’s absolutely right. We had fully-automated ISP service in early 1990’s, and numerous service providers used network automation for decades.
Read more ...Found an awesome blog post describing how we’re wasting resources on incomprehensible scale. Here’s a tiny little morsel:
Only in software, it’s fine if a program runs at 1% or even 0.01% of the possible performance. Everybody just seems to be ok with it. People are often even proud about how much inefficient it is, as in “why should we worry, computers are fast enough”.
The value of attending a conference is measured by how much you can learn and who you will meet. While DockerCon has you covered on both fronts. We know that everyone learns differently so the conference provides three options for you.
Workshops: Starting this year at DockerCon San Francisco, we introduced a track dedicated to workshops where technical experts deliver 2-hour deep dive sessions with hands-on tutorials to deepen your understanding of Docker technology, Kubernetes, Isito and solutions from our ecosystem partners. Included as part of your conference pass, you must pre-register for workshops to save your seat.
Hands on Labs: I instructor-led isn’t your thing, check out the self-paced Hands-On Labs. Also included with our conference pass, Hands-On Labs are available at any time throughout the conference. Drop in between sessions or anytime – grab a seat and launch a tutorial. Docker moderators will be on hand to help answer questions.
Training: In addition, you can add official Docker training courses to your DockerCon schedule at a discounted rate. Come early to Barcelona for a 2 day training course led by Docker authorized instructors and designed specifically for your role in using containers. Each course features a variety Continue reading
The company said it’s using service providers as its SD-WAN sales channel and banking on large managed services deals.
At VMworld 2017, we took the NSX show on the road and demonstrated our expanded capabilities and support for new use cases, locations, and clouds.
But a lot has changed in a year.
Earlier in 2018, we announced the expansion of the NSX family of products to include NSX Data Center (formerly NSX), NSX Cloud, AppDefense, NSX SD-WAN by VeloCloud, and NSX Hybrid Connect. With the new portfolio, we’ve delivered on the Virtual Cloud Network vision of connecting and protecting applications and data, regardless of where they sit – from the data center, to the cloud, and the edge.
To help you learn about this vision, and the products that underpin it, we have a huge VMworld 2018 in store for you. There are over 50 dedicated networking and security sessions covering everything from the basics to super-technical deep dives.
Be sure to attend the showcase sessions:
As a bonus, you can hear from real customers about their experiences in the Customer Panel on NSX Data Center.
Below is a guide to all things Networking and Security at Continue reading
You have read, heard and seen us talk about the benefits of Linux, open source and community. Here, here, and here… and I am pretty sure everywhere. This blog walks you through our journey of pushing Linux open switch ASICs into the Linux kernel and ecosystem. Before we begin, let me tell you that it has and continues to be a fun ride!
A quick historical recap on Linux networking
The Linux kernel has been doing network hardware offloads and acceleration for decades (Nics, smart-nics, wireless AP’s and many other places). Because of this, the kernel has had the infrastructure and the right abstractions to recognize and register a networking hardware device for decades. And this infrastructure has matured over time.
For hardware vendors, enabling their networking hardware for Linux just made it easier to take their hardware to new customers, objectives and industries. Today Linux enablement is the best way to get faster adoption of your hardware or faster marketing for your hardware. It has become a norm for hardware vendors to get their hardware ready for Linux first: getting their drivers in the upstream kernel and getting hardware tools ready for the Linux ecosystem.
The news comes as major cloud providers including AWS, Microsoft, and IBM are competing for a $10 billion, 10-year cloud contract from the U.S. Department of Defense.
In this Network Collective Short Take, Russ White talks about the value of harder passwords and what we should think about when developing password policies for our systems.
The post Short Take – The Diminishing Returns of Harder Passwords appeared first on Network Collective.
SDxCentral Weekly Wrap for October 12, 2018. Apple and Amazon deny they were the victims of an elaborate spying plan by the Chinese government.
The company will now give IT workers that are transferring to Infosys the option of receiving an exit package if they decline to move to the outsourcing firm.
Netsurion, a newcomer to the SD-WAN market, has found its niche in the market as it builds its SD-WAN as integrated secure connectivity service.
If you’re working in a Security Operations Center, or aim to work in one, the CCNA Cyber Ops should be high on your list of qualifications to achieve. Few certifications cover this area.
The startup developed a type of composable infrastructure that focuses specifically on computing resources.