Archive

Category Archives for "Networking"

Upcoming Class: How the Internet Really Works

Join me for How the Internet Really Works on the 27th! This four hour live webinar on Safari Books Online:

… de-mystifies the overall structure and “moving parts” of the global Internet. The class begins with a user connecting to a web site, and the process of translating the name of the service the user is seeking to a logical location (a server) where the service is actually located. From there, the path of the packets between the user and the server is traced, exposing each of the different kinds of providers that carry the packet along the way.

Register here.

Security startup Airgap Networks brings telco technologies to the LAN

AI-generating malware, deep fake identity spoofing, and state-sponsored ransomware are just a few of the latest methods that attackers are using to bypass traditional cybersecurity tools. Ritesh Agrawal, CEO of cybersecurity startup Airgap Networks, noticed that many of the attacks that compromise enterprise networks fail to penetrate telco and service provider networks.“Even though they’re deploying the same routers, switches, and firewalls, there’s something fundamentally different about telco networks that shields them from many threats to enterprise LANs,” Argawal said. Agrawal has 20 years of experience with cybersecurity, enterprise networking, and cloud computing, most of that time spent with Juniper Networks focusing on telco and large enterprise clients.To read this article in full, please click here

Security startup Airgap Networks brings telco technologies to the LAN

AI-generating malware, deep fake identity spoofing, and state-sponsored ransomware are just a few of the latest methods that attackers are using to bypass traditional cybersecurity tools. Ritesh Agrawal, CEO of cybersecurity startup Airgap Networks, noticed that many of the attacks that compromise enterprise networks fail to penetrate telco and service provider networks.“Even though they’re deploying the same routers, switches, and firewalls, there’s something fundamentally different about telco networks that shields them from many threats to enterprise LANs,” Argawal said. Agrawal has 20 years of experience with cybersecurity, enterprise networking, and cloud computing, most of that time spent with Juniper Networks focusing on telco and large enterprise clients.To read this article in full, please click here

Security startup Airgap Networks brings telco technologies to the LAN

AI-generating malware, deep fake identity spoofing, and state-sponsored ransomware are just a few of the latest methods that attackers are using to bypass traditional cybersecurity tools. Ritesh Agrawal, CEO of cybersecurity startup Airgap Networks, noticed that many of the attacks that compromise enterprise networks fail to penetrate telco and service provider networks.“Even though they’re deploying the same routers, switches, and firewalls, there’s something fundamentally different about telco networks that shields them from many threats to enterprise LANs,” Argawal said. Agrawal has 20 years of experience with cybersecurity, enterprise networking, and cloud computing, most of that time spent with Juniper Networks focusing on telco and large enterprise clients.To read this article in full, please click here

Internet Governance in 2023

In 2005 the UN-sponsored World Summit on the Information Society (WSIS) eventually agreed on a compromise approach that deferred any determination on the matter of the governance of the Internet and instead decided to convene a series of meetings on the underlying policy principles relating to Internet Governance. Hence, we saw the inauguration of a series of Internet Governance Forum (IGF) meetings. These forums were intended to be non-decisional forums for all stakeholders to debate the issues. Eighteen later this is still going on. After so long is there anything left to talk about?

Day Two Cloud 216: Implementing Private AI Architecture With VMware (Sponsored)

The goal of private AI is to bring AI models and compute to where your data is stored to ensure privacy and control. On today's Day Two Cloud, sponsored by VMware, we dig more deeply into private AI, major use cases, and the kinds of data that get fed into a private AI system. We also discuss the infrastructure required to build out a private AI platform, how to connect to your data stores, and  VMware's role in virtualizing GPUs to maximize efficiency.

The post Day Two Cloud 216: Implementing Private AI Architecture With VMware (Sponsored) appeared first on Packet Pushers.

D2C216: Implementing Private AI Architecture With VMware (Sponsored)

The goal of private AI is to bring AI models and compute to where your data is stored to ensure privacy and control. On today's Day Two Cloud, sponsored by VMware, we dig more deeply into private AI, major use cases, and the kinds of data that get fed into a private AI system. We also discuss the infrastructure required to build out a private AI platform, how to connect to your data stores, and  VMware's role in virtualizing GPUs to maximize efficiency.

Juniper delivers distributed data-center security protection, firewalls

Juniper Networks has expanded its security portfolio with an architecture design that includes AI-based predictive threat support and a new family of firewalls, all designed to protect distributed data center resources.The central piece of the expanded portfolio is the new Juniper Connected Security Distributed Services Architecture. It’s implemented in a new version of the vendor’s core Junos operating system (version 23.4) and enables a variety of security features from zero trust policy enforcement to intrusion detection and prevention across distributed data center networks.Since Junos runs across Juniper’s entire product family, including QFX Series Switches, MX Series Universal Routers, SRX Series firewalls and more, all of those systems can be included in the Distributed Services Architecture. This enables customers to set up universal protection and policies for networks, data, and applications, and it’s all controlled by the vendor’s Security Director Cloud for setting and managing security policies.To read this article in full, please click here

Juniper delivers distributed data-center security protection, firewalls

Juniper Networks has expanded its security portfolio with an architecture design that includes AI-based predictive threat support and a new family of firewalls, all designed to protect distributed data center resources.The central piece of the expanded portfolio is the new Juniper Connected Security Distributed Services Architecture. It’s implemented in a new version of the vendor’s core Junos operating system (version 23.4) and enables a variety of security features from zero trust policy enforcement to intrusion detection and prevention across distributed data center networks.Since Junos runs across Juniper’s entire product family, including QFX Series Switches, MX Series Universal Routers, SRX Series firewalls and more, all of those systems can be included in the Distributed Services Architecture. This enables customers to set up universal protection and policies for networks, data, and applications, and it’s all controlled by the vendor’s Security Director Cloud for setting and managing security policies.To read this article in full, please click here

BackBox adds network vulnerability management to automation platform

BackBox this week announced its Network Vulnerability Manager (NVM), a software add-on to its existing Network Automation Platform, that will enable network managers to automate operating system upgrades, network configuration updates, and various remediations across firewalls and other network and security devices.“Common vulnerability management tools focus on endpoints and are designed for security teams rather than network teams,” says Josh Stephens, CTO of BackBox. “BackBox’s vulnerability management capabilities have been specifically engineered for network operations teams in the way that they operate and to accelerate their path toward network automation.”To read this article in full, please click here

BackBox adds network vulnerability management to automation platform

BackBox this week announced its Network Vulnerability Manager (NVM), a software add-on to its existing Network Automation Platform, that will enable network managers to automate operating system upgrades, network configuration updates, and various remediations across firewalls and other network and security devices.“Common vulnerability management tools focus on endpoints and are designed for security teams rather than network teams,” says Josh Stephens, CTO of BackBox. “BackBox’s vulnerability management capabilities have been specifically engineered for network operations teams in the way that they operate and to accelerate their path toward network automation.”To read this article in full, please click here

Gartner’s 2024 predictions: Lots of AI, changing cybersecurity roles, electricity rationing, and more

AI will play a significant role in enterprise IT in the coming year, and the influence of generative AI will permeate other tech trends on the horizon. Smart robots, a rise in employee unionization, and growing power-availability concerns are among the top predictions for 2024 and beyond from research firm Gartner, which is hosting its annual IT Symposium/Xpo this week.“This is the first full year with generative AI (GenAI) at the heart of every strategic decision, and every other technology-driven innovation has been pushed out of the spotlight,” said Leigh McMullen, distinguished vice president analyst at Gartner. “GenAI has broken the mold and has kept building more excitement.”To read this article in full, please click here

Generative AI pervades Gartner’s 2024 predictions for cybersecurity roles, application modernization and more

AI will play a significant role in enterprise IT in the coming year, and the influence of generative AI will permeate other tech trends on the horizon. Smart robots, a rise in employee unionization, and growing power-availability concerns are among the top predictions for 2024 and beyond from research firm Gartner, which is hosting its annual IT Symposium/Xpo this week.“This is the first full year with generative AI (GenAI) at the heart of every strategic decision, and every other technology-driven innovation has been pushed out of the spotlight,” said Leigh McMullen, distinguished vice president analyst at Gartner. “GenAI has broken the mold and has kept building more excitement.”To read this article in full, please click here

Gartner’s 2024 predictions: Lots of AI, changing cybersecurity roles, electricity rationing, and more

AI will play a significant role in enterprise IT in the coming year, and the influence of generative AI will permeate other tech trends on the horizon. Smart robots, a rise in employee unionization, and growing power-availability concerns are among the top predictions for 2024 and beyond from research firm Gartner, which is hosting its annual IT Symposium/Xpo this week.“This is the first full year with generative AI (GenAI) at the heart of every strategic decision, and every other technology-driven innovation has been pushed out of the spotlight,” said Leigh McMullen, distinguished vice president analyst at Gartner. “GenAI has broken the mold and has kept building more excitement.”To read this article in full, please click here

Network flow monitoring is GA, providing end-to-end traffic visibility

Network flow monitoring is GA, providing end-to-end traffic visibility

Network engineers often find they need better visibility into their network’s traffic and operations while analyzing DDoS attacks or troubleshooting other traffic anomalies. These engineers typically have some high level metrics about their network traffic, but they struggle to collect essential information on the specific traffic flows that would clarify the issue. To solve this problem, Cloudflare has been piloting a cloud network flow monitoring product called Magic Network Monitoring that gives customers end-to-end visibility into all traffic across their network.

Today, Cloudflare is excited to announce that Magic Network Monitoring (previously called Flow Based Monitoring) is now generally available to all enterprise customers. Over the last year, the Cloudflare engineering team has significantly improved Magic Network Monitoring; we’re excited to offer a network services product that will help our customers identify threats faster, reduce vulnerabilities, and make their network more secure.

Magic Network Monitoring is automatically enabled for all Magic Transit and Magic WAN enterprise customers. The product is located at the account level of the Cloudflare dashboard and can be opened by navigating to “Analytics & Logs > Magic Monitoring”. The onboarding process for Magic Network Monitoring is self-serve, and all enterprise customers with access can begin Continue reading

Nvidia, Foxconn partner to start building AI factories

Chipmaker Nvidia and the world’s largest contract manufacturer Foxconn are partnering to start building AI factories globally, the two companies announced on Tuesday.AI factories are data centers with infrastructure specially built for processing, refining, and transforming vast amounts of data into valuable AI models and tokens, Nvidia founder and CEO Jensen Huang and Foxconn Chairman and CEO Young Liu, said during a fireside chat at Hon Hai Tech Day, in Taipei.“A new type of manufacturing has emerged — the production of intelligence. And the data centers that produce it are AI factories,” Huang said in a statement, adding that the data center infrastructure would include Nvidia’s accelerated computing platform — the latest GH200 Grace Hopper Superchip and Nvidia’s AI enterprise software.To read this article in full, please click here

Nvidia, Foxconn partner to start building AI factories

Chipmaker Nvidia and the world’s largest contract manufacturer Foxconn are partnering to start building AI factories globally, the two companies announced on Tuesday.AI factories are data centers with infrastructure specially built for processing, refining, and transforming vast amounts of data into valuable AI models and tokens, Nvidia founder and CEO Jensen Huang and Foxconn Chairman and CEO Young Liu, said during a fireside chat at Hon Hai Tech Day, in Taipei.“A new type of manufacturing has emerged — the production of intelligence. And the data centers that produce it are AI factories,” Huang said in a statement, adding that the data center infrastructure would include Nvidia’s accelerated computing platform — the latest GH200 Grace Hopper Superchip and Nvidia’s AI enterprise software.To read this article in full, please click here