SDxCentral Weekly Wrap for October 5, 2018. AT&T contributed its white box router specifications to the Open Compute Project.
We built Access to solve a problem here at Cloudflare: our VPN. Our team members hated the slowness and inconvenience of VPN but, that wasn’t the issue we needed to solve. The security risks posed by a VPN required a better solution.
VPNs punch holes in the network perimeter. Once inside, individuals can access everything. This can include critically sensitive content like private keys, cryptographic salts, and log files. Cloudflare is a security company; this situation was unacceptable. We need a better method that gives every application control over precisely who is allowed to reach it.
Access meets that need. We started by moving our browser-based applications behind Access. Team members could connect to applications faster, from anywhere, while we improved the security of the entire organization. However, we weren’t yet ready to turn off our VPN as some tasks are better done through a command line. We cannot #EndTheVPN without replacing all of its use cases. Reaching a server from the command line required us to fall back to our VPN.
Today, we’re releasing a beta command line tool to help your team, and ours. Before we started using this feature at Cloudflare, curling a server required me to Continue reading
By now the story and resulting controversy is as much about media credibility as it is about cyber — and national — security.
Because the threat landscape continues to evolve rapidly, organizations are having a hard time keeping pace with the evolving cybersecurity skills required to manage their complex environments.
On today’s Packet Pushers Weekly Show, we discuss how the broadcast media industry leverages IP networks, the initiatives behind the standards and protocols, and why it all matters to data networking professionals.
The post Weekly Show 410: Broadcast Media Using IP Networks appeared first on Packet Pushers.
The update allows for the management of glass of credentials using both Kubernetes and secure socket shell for multiple infrastructure environments.
Dell Technologies applies to list shares on NYSE; AT&T names new preliminary 5G markets; Google launches tools for its Kubernetes Engine.
MEF is pleased to announce the titles of nearly 20 Proof of Concept (PoC) Showcase demonstrations that will be presented at the MEF18 global networking event.
Have you ever tried to implement something new and run into others who are resistant to that change? In this Short Take, Russ explores the validity of the commonly used “It’s always been done that way” excuse for avoiding change.
The post Short Take – It’s Always Been Done That Way appeared first on Network Collective.

Security is a field of questions. We find ourselves asking
all kinds of them all the time. Who is trying to get into my network? What are
they using? How can I stop them? But I feel that the most important question is
the one we ask the least. And the answer to that question provides the
motivation to really fix problems as well as conserving the effort necessary to
do so.
If you’re someone with kids, imagine a conversation like
this one for a moment:
Your child runs into the kitchen with a lit torch in their hands and asks “Hey, where do we keep the gasoline?”
Now, some of you are probably laughing. And some of you are
probably imagining all kinds of crazy going on here. But I’m sure that most of
you probably started asking a lot of questions like:
Usually, the rest of the Five Ws follow Continue reading
Get ready to explore the different methods of automating technical and business challenges with Azure in James Rudley’s new course; Automation With Microsoft Azure.
In this course you will learn a range of azure features including:
Ready to master Azure? You can buy this course in streaming or downloadable format here.
The security skills gap is real, and it is a problem. But what if you could replace the most basic security jobs with an AI? According to Gunter Ollmann @CircleID, this is possible today. The next question you might want to ask is this: if AI’s replace all the entry level positions, then how are we going to train up senior level engineers? Remember that every hiring manager wants someone with ten years of experience on a product that has only been out for two years…
American businesses are in for a rude awakening. Sweeping new privacy regulations, such as the EU’s landmark GDPR law and California’s Consumer Privacy Act, along with the ongoing SEC probe of Facebook’s data Continue reading

The community of Latin America and the Caribbean has maintained an incessant activity in community networks topics, particularly during September. This work has been reflected in various spaces, highlighting the Latin American Summit of Community Networks that took place in Argentina.
A Work with History
Interest in community networks in the Latin American and Caribbean region is not recent. At least since 2015, the operators of these networks have worked together, exchanging experiences and best practices. Part of the result of this collaboration is found in the documents of the Internet Governance Forum (IGF) Dynamic Coalition on Community Connectivity (DC3). It is worth mentioning that the creation of the Internet Society’s Special Interest Group on Community Networks (SIG CN) was announced during the closing ceremony of the IGF 2017 meeting.
The effort has been reflected in various spaces. This year, several operators of these networks were invited to participate in the Fifth Annual Latin America Spectrum Management Conference, held in Buenos Aires, Argentina, from September 5 to 7. On the last day of the Conference, the International Telecommunication Union (ITU) conducted a capacity building workshop on spectrum and community networks.
The Latin American Summit
In addition to their participation in Continue reading