Hopefully there’s enough good will built up in open source groups to survive the actions of governments during these times.
The RIPE 76 meeting is happening this week in Marseille, France, held at the fantastic location of the Palais du Pharo overlooking Marseille’s Old Port. And it’s also another record attendance with over 850 people registered.
The first couple of days have primarily been devoted to plenary sessions, and there’s been a big focus on routing security. Erik Bais (A2B Internet) kicked off the discussion with a presentation on ‘Why are we still seeing DDoS traffic?‘, which highlighted that DDoS attacks are still originating from the same networks. Looking at the list of the worst offenders, there’s even one amongst the regular RIPE attendees, and he called for networks to clean up their acts. This was also a good opportunity to highlight the MANRS initiative, which of course includes measures to mitigate amplification attacks, and encourages networks to make good routing practices the norm.
Alexander Azimov (Qrator Labs) reinforced this message by outlining the current problems with BGP, including the ongoing route leaks and hijacks affecting the Internet. There are currently only moral obligations to not use other providers’ address space or to support anti-spoofing policies, yet major providers (including Tier 1 providers) continue to both originate Continue reading
In this video, Tony Fortunato demonstrates software utilities to test the performance of your DNS servers.
An attendee of my Building Next-Generation Data Center online course asked me what the best learning path might be for a total (data center) beginner that has to design and install a small leaf-and-spine fabric in a near future.
This blog post was written for ipSpace.net subscribers who want to get the most out of ipSpace.net content. If you’re only interested in free stuff, you might feel it’s a waste of your time. You’ve been warned ;)
Read more ...Verizon’s annual data breach report found web applications had the most breaches in 2017.
Today's Full Stack Journey explores continual learning for technologists. Guest Cody Bunch shares tips on how to approach new information, why you should share what you learn, how to take notes, time management, and more.
The post Full Stack Journey 021: Continual Learning With Cody Bunch appeared first on Packet Pushers.
I love working as a Chief Security Officer because every day centers around building something that makes people safer. Back in 2002, as I considered leaving my role as a cybercrime federal prosecutor to work in tech on e-commerce trust and safety, a mentor told me, “You have two rewarding but very different paths: you can prosecute one bad actor at a time, or you can try to build solutions that take away many bad actors' ability to do harm at all.” And while each is rewarding in its own way, my best days are those where I get to see harm prevented—at Internet scale.
In 2016, while traveling the United States to conduct hearings on the condition of Internet security as a member of President Obama's cyber commission, my co-commissioners noticed I had fallen into a pattern of asking the same question of every panelist: “Who is responsible for building a safer online environment where small businesses can set up shop without fear?” We heard many answers that all led to the same “not a through street” conclusion: Most law enforcement agencies extend their jurisdiction online, but there are no digital equivalents to the Department of Continue reading
A new U.S. cybersecurity strategy calls on government agencies to work more closely with private sector companies to reduce risks.
From the very beginning, Cisco Systems tightly embraced the use of complexity as a market differentiator. Creating a complicated CLI to configure networking gear instead of a relatively simple GUI – Wellfleet’s choice — was an early move down this path. The next cab off this particular rank was the creation of the CCIE (Cisco Certified Internetwork Expert) program in the early 1990’s, which, in full disclosure, I had a hand in developing back in the day. This program was explicitly designed to be as difficult and complicated as possible – mirroring the products themselves – so that a CCIE “diploma” on a cubicle wall would be considered a badge of honor and give bragging rights to its owner. And, with something like 3-1/2-million CCIEs out there today, this particular bit of planned complexity was clearly a winner.
The inherent irony in all of this is that ante-Cisco life in networking was quite a simple place, really. (Show of hands anyone who remembers the two top bridging vendors, Halley Systems and Vitalink?) But, at the end of the day, networks had to grow so that businesses and, eventually, the Internet, could run on them, and bridging technology simply Continue reading
From the very beginning, Cisco Systems tightly embraced the use of complexity as a market differentiator. Creating a complicated CLI to configure networking gear instead of a relatively simple GUI – Wellfleet’s choice — was an early move down this path. The next cab off this particular rank was the creation of the CCIE (Cisco Certified Internetwork Expert) program in the early 1990’s, which, in full disclosure, I had a hand in developing back in the day. This program was explicitly designed to be as difficult and complicated as possible – mirroring the products themselves – so that a CCIE “diploma” on a cubicle wall would be considered a badge of honor and give bragging rights to its owner. And, with something like 3-1/2-million CCIEs out there today, this particular bit of planned complexity was clearly a winner.
The inherent irony in all of this is that ante-Cisco life in networking was quite a simple place, really. (Show of hands anyone who remembers the two top bridging vendors, Halley Systems and Vitalink?) But, at the end of the day, networks had to grow so that businesses and, eventually, the Internet, could run on them, and bridging technology simply Continue reading
The company sees its platform as having a scale advantage over tech-focused vendors like Docker, but with more agility than larger systems integrators like IBM.