Archive

Category Archives for "Networking"

Datanauts 139: Getting AWS Security Right

AWS security issues show up in tech news fairly often. Today, we talk with someone who wrote about AWS services other than S3 that were found exposed to the public. Could that be some of your services?

Could be. The numbers are pretty impressive. Stay tuned, and find out how to determine whether or not your EBS snapshots, RDS snapshots, AMIs, or ElasticSearch clusters are accidentally public.

Our guest is Scott Piper, an AWS security consultant for Summit Route. You can follow him on Twitter at @0xdabbad00.

We start by exploring the types of AWS resources that can be unintentionally exposed to the public Internet, how to find them, and how to lock them down.

Then we talk about general practices such as vulnerability scanning, how to minimize human error when configuring AWS services, and drill into options such as CloudMapper and Security Monkey, open-source tools to help administrators find and control AWS resources.

Show Links:

Scott Piper on Twitter

Scott Piper’s blog – Duo.com

Scott Piper on GitHub – GitHub

Beyond S3: Exposed Resources on AWS – Duo.com

flAWS Challenge

CloudMapper – GitHub

CloudTracker – GitHub

Netflix Security Monkey – GitHub

Datanauts 086: AWS Identity & Access Continue reading

History Of Networking – Dave Crocker – Email – Part 2

Few technologies are as ubiquitous as email.  In Part 2 of this two-part series, Dave Crocker joins us to talk about the History of Email.  Listen in as he talks about the early days of message exchange and how the technology evolved to be an integral part of modern day communication.

 

Dave Crocker
Guest
Russ White
Host
Donald Sharp
Host
Eyvonne Sharp
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – Dave Crocker – Email – Part 2 appeared first on Network Collective.

BrandPost: All-flash or Hybrid Flash: How to Decide

Flash storage has quickly taken off, thanks to its ability to use less capacity with greater speed. Flash boosts performance and enables companies to reap benefits like reduced power consumption and consolidated apps per machine.Initially quite expensive, flash storage had been used reservedly, such as for subsets of application data. Although improvements and efficiencies in the technology have resulted in lower prices, there are still cases where using hard disk drives (HDDs) is either more efficient or more economical. And this is why we’re now seeing the emergence of hybrid flash storage solutions.Let’s take a look at the options.All-flash arraysTo read this article in full, please click here

IDG Contributor Network: SD-WAN: Hardening external connectivity

When I began my journey in 2015 with SD-WAN, the implementation requirements were different to what they are today. Initially, I deployed pilot sites for internal reachability. This was not a design flaw, but a solution requirement set by the options available to SD-WAN at that time. The initial requirement when designing SD-WAN was to replace multiprotocol label switching (MPLS) and connect the internal resources together.Our projects gained the benefits of SD-WAN deployments. It certainly added value, but there were compelling constraints. In particular we were limited to internal resources and users, yet our architecture consisted of remote partners and mobile workers. The real challenge for SD-WAN vendors is not solely to satisfy internal reachability. The wide area network (WAN) must support a range of different entities that require network access from multiple locations.To read this article in full, please click here

IDG Contributor Network: SD-WAN: Hardening external connectivity

When I began my journey in 2015 with SD-WAN, the implementation requirements were different to what they are today. Initially, I deployed pilot sites for internal reachability. This was not a design flaw, but a solution requirement set by the options available to SD-WAN at that time. The initial requirement when designing SD-WAN was to replace multiprotocol label switching (MPLS) and connect the internal resources together.Our projects gained the benefits of SD-WAN deployments. It certainly added value, but there were compelling constraints. In particular we were limited to internal resources and users, yet our architecture consisted of remote partners and mobile workers. The real challenge for SD-WAN vendors is not solely to satisfy internal reachability. The wide area network (WAN) must support a range of different entities that require network access from multiple locations.To read this article in full, please click here

Lenovo announces hybrid liquid-cooling system: Neptune

Water cooling for enterprise servers is slowly creeping in from the fringes to the mainstream of data center use as vendors and end users alike realize the limitations of air cooling. With increased compute density, fans just don’t cut it anymore, and water cooling is far more efficient.Several vendors have adapted their cabinets to accommodate water-cooling systems, and now Lenovo is the latest to get religion on the subject with Neptune, a series of technologies for the data center. The company announced the new system at the International Supercomputing Conference (ISC) in Frankfurt, Germany.[ Learn how server disaggregation can boost data center efficiency. | Get regularly scheduled insights by signing up for Network World newsletters. ] Neptune is a three-pronged approach, borrowed from the legend of the Roman god of the seas Neptune, who wields a three-pointed spear. It offers direct-to-node liquid cooling, rear door heat exchangers, and hybrid cooling that mixes air and liquid, all of which is documented in a lighthearted blog post by the company.To read this article in full, please click here

Lenovo announces hybrid liquid-cooling system: Neptune

Water cooling for enterprise servers is slowly creeping in from the fringes to the mainstream of data center use as vendors and end users alike realize the limitations of air cooling. With increased compute density, fans just don’t cut it anymore, and water cooling is far more efficient.Several vendors have adapted their cabinets to accommodate water-cooling systems, and now Lenovo is the latest to get religion on the subject with Neptune, a series of technologies for the data center. The company announced the new system at the International Supercomputing Conference (ISC) in Frankfurt, Germany.[ Learn how server disaggregation can boost data center efficiency. | Get regularly scheduled insights by signing up for Network World newsletters. ] Neptune is a three-pronged approach, borrowed from the legend of the Roman god of the seas Neptune, who wields a three-pointed spear. It offers direct-to-node liquid cooling, rear door heat exchangers, and hybrid cooling that mixes air and liquid, all of which is documented in a lighthearted blog post by the company.To read this article in full, please click here

What is NVMe, and how is it changing enterprise storage

NVMe (non-volatile memory express) is shaking up the enterprise storage industry.A communications protocol developed specifically for all-flash storage, NVMe enables faster performance and greater density compared to legacy protocols. It's geared for enterprise workloads that require top performance, such as real-time data analytics, online trading platforms and other latency-sensitive workloads.[ Check out AI boosts data-center availability, efficiency. Also learn what hyperconvergence is and whether you’re ready for hyperconverged storage. | For regularly scheduled insights sign up for Network World newsletters. ] NVMe vs. serial-attached SCSI (SAS) NVMe is aimed at reducing the software overhead between applications and storage in all-flash systems.To read this article in full, please click here

IoT Security is the Heart of the Matter

The Internet Society is raising awareness around the issues and challenges with Internet of Things (IoT) devices, and the OTA IoT Trust Framework is promoting best practices in protection of user security and privacy. The importance of this was brought home with the keynote talk at the recent TNC18 Conference, which was given by Marie Moe (SINTEF) who related her experiences with her network-connected heart pacemaker.

Marie is a security researcher (who also formerly worked for NorCERT, the Norwegian National Cybersecurity Centre) who has an implanted pacemaker to monitor and control her heart, and has used the opportunity to investigate the firmware and security issues that have had detrimental and potentially fatal consequences. Quite aside from uncovering misconfigurations that required tweaking (e.g. the maximum heartbeat setting turned out to be set too low for a younger person), and an adverse event that required a firmware upgrade, she was even more concerned to discover that little consideration had gone into the authentication and access aspects that might allow an attacker to take control of the device.

These devices allow their recipients to lead normal lives, and of course being network-connectable has many practical advantages in terms of monitoring and Continue reading

Worth Reading: Fake News in IT

Stumbled upon “Is Tech News Fake” article by Tom Nolle. Here’s the gist of his pretty verbose text:

When readers pay for news, they get news useful to readers.  When vendors pay, not only do the vendors get news they like, the rest of us get that same story.  It doesn’t mean that the story being told is a lie, but that it reflects the view of an interested party other than the reader.

High-quality content is not cheap, so always ask yourself: who’s paying for the content… and if it’s not you, you may be the product.

Full disclosure: ipSpace.net is funded exclusively with subscriptions and online courses. Some of our guest speakers work for networking vendors, but we always point that out, and never get paid for that.

HPE places a $4B bet on its edge-network portfolio

[ Check out our corporate guide to addressing IoT security. ] HPE's pledge to pump billions of dollars into developing edge systems shines a light on the company's ambition to be the leading end-to-end computing infrastructure provider.CEO Antonio Neri made the investment announcement at the company's Discover conference Tuesday in Las Vegas, in his first appearance at the company's annual event as chief executive. He took over the CEO role from Meg Whitman in February.To read this article in full, please click here