A coalition of more than 40 companies focused on protecting online users has endorsed a global community initiative, coordinated by the Internet Society, to improve the security of the Internet’s routing system.
The Cybersecurity Tech Accord, whose members include Facebook, Microsoft, Oracle, and Hewlett Packard Enterprise, will support the Mutually Agreed Norms for Routing Security (MANRS) initiative.
The goal of MANRS is to ensure a secure and resilient Internet by protecting its routing infrastructure. In 2017 alone, more than 14,000 routing outages or attacks – such as hijacking, leaks, or spoofing – resulted in stolen data, lost revenue, and reputational damage.
“The new endorsement is a good first step,” said Salam Yamout, Internet Society Lead for the MANRS initiative.
“It is not enough to talk about routing security; it is time for action,” Yamout added. “Because the Internet’s routing system was built on the principles of collaboration and shared responsibility, this endorsement from the Cybersecurity Tech Accord and our new partnership is a major step forward. It clearly reflects the will of industry to be proactive in implementing safe routing practices.”
MANRS focuses on four defensive actions that can reduce the most common routing threats:
In February, Troy Hunt unveiled Pwned Passwords v2. Containing over half a billion real world leaked passwords, this database provides a vital tool for correcting the course of how the industry combats modern threats against password security.
In supporting this project; I built a k-Anonymity model to add a layer of security to performed queries. This model allows for enhanced caching by mapping multiple leaked password hashes to a single hash prefix and additionally being performed in a deterministic HTTP-friendly way (which allows caching whereas other implementations of Private Set Intersection require a degree of randomness).
Since launch, PwnedPasswords, using this anonymity model and delivered by Cloudflare, has been implemented in a widespread way across a wide variety of platforms - from site like EVE Online and Kogan to tools like 1Password and Okta's PassProtect. The anonymity model is also used by Firefox Monitor when checking if an email is in a data breach.
Since it has been adopted, Troy has tweeted out about the high cache hit ratio; and people have been asking me about my "secret ways" of gaining such a high cache hit ratio. Over time I touched various pieces of Cloudflare's caching systems; in late 2016 Continue reading
Learn why and how you test IPv6 interoperability in the latest episode of the IPv6 Buzz podcast. Our guest is Tim Winters, director of the University of New Hampshire's InterOperability Lab.
The post IPv6 Buzz 006: Why And How To Test IPv6 Interoperability appeared first on Packet Pushers.
In November 2017, the Internet Society hosted the inaugural Indigenous Connectivity Summit in Santa Fe, New Mexico. The event brought together community network operators, Internet service providers, community members, researchers, policy makers, and Indigenous leadership to work together to bridge the connectivity gap in indigenous communities in North America. One of the participants shared her story.
The Navajo Nation spans over 27,000 square miles across three states, making it the largest indigenous nation in the United States, in both geographic area and population. With such a sizable landmass, network building can face significant challenges.
“Infrastructure and coverage are tricky because of the way that the Navajo Nation is surrounded by highways and railways but none really cross through,” says Sylvia Jordan, Principal IT for the Navajo Nation Division of Community Development. “We are trying to bridge middle mile to last/first mile,” says Jordan, “while maintaining affordability for communities requesting access.”
The unique geographic features of the area can dictate connection quality in many areas on the Navajo Nation. Jordan explains that the ridge around Black Mesa, which is more than 8,000 feet high, is large enough that service can trickle down to some rural communities in the southern part of the Continue reading
The traditional network security perimeter has become smaller and smaller as attackers become more sophisticated. But how practical is the zero-trust model?
Submarine cables carry whole Internet Traffic. I am not exaggerating. Today’s 95% of the Internet Traffic is carried over Submarine cables. They are so important but as a network engineer how much do you know about Submarine cables ? I explained the fundamentals of submarine cables in this post. If […]
The post Submarine cables carry whole Internet Traffic ! More than 95% appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.
Submarine cables carry whole Internet Traffic. I am not exaggerating. Today’s 95{ea8372c0850978052e20c0d53be15bc420c794e9b9b32f0ee9dfe0056552e01e} of the Internet Traffic is carried over Submarine cables. They are so important but as a network engineer how much do you know about Submarine cables ? I explained the fundamentals of submarine cables in this post. If …
Continue reading "Submarine cables carry whole Internet Traffic ! More than 95"
The post Submarine cables carry whole Internet Traffic ! More than 95 appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.
Submarine cables carry whole Internet Traffic. I am not exaggerating. Today’s 95{ea8372c0850978052e20c0d53be15bc420c794e9b9b32f0ee9dfe0056552e01e} of the Internet Traffic is carried over Submarine cables. They are so important but as a network engineer how much do you know about Submarine cables ? I explained the fundamentals of submarine cables in this post. If …
Continue reading "Submarine cables carry whole Internet Traffic ! More than 95"
The post Submarine cables carry whole Internet Traffic ! More than 95 appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.
After fixing the Building Network Automation Solutions materials, I decided to tackle the next summer janitorial project: creating standard curriculum pages for Building Next Generation Data Centers online course and splitting it into more granular modules (the course is ~150 hours long, and some modules have more than 40 hours of self-study materials).
Read more ... During the Black Hat Keynote, Google’s Parisa Tabriz, who manages the Project Zero bug hunting team, urged tech companies to build coalitions to solve complex security problems.
The company's CEO said the firm was not looking just yet at a Series B, but that reception to its platform sped up the process.
In New Relic's fiscal first quarter earnings call with investors, CEO Lew Cirne said that its business continues to grow as it adds new points of visibility to its core APM platform.
Behind each Cumulus customer is an awesome story about the future of open networking. These companies are forward thinkers who know that web-scale is the best solution for their network — enabling flexibility, reducing TCO, increasing efficiency — but it’s more than just our innovation. When we begin working with our customers, we get to see what innovations they’re driving, and recognize how we now fit into their story. We wanted to take a moment to highlight a few of our newer case studies that have been published and highlight the awesome work that these organizations have accomplished.
iNNOVO Cloud
iNNOVO Cloud truly blew us away with one of the most energy efficient data centers in the world. They decided to run everything as an L3/IP fabric and not have large layer 2 domains (music to our ears). Partnering with OpenStack and Kubernetes, iNNOVO built an environment that brings efficiency and scale to their cloud and blockchain services. In fact, they reduced the time to configure switches by 83%. How’s that for increased efficiency? The best part is that their data center is all about sustainability and they’ve gone above and beyond your average infrastructure. Here’s a hint: think shipping Continue reading