Archive

Category Archives for "Networking"

Cisco snuffs Hyperflex development, hands hyperconverged infrastructure future to Nutanix

When Cisco and Nutanix partnered in August, the writing was on the wall: future development of Cisco’s Hyperflex platform was on the rocks.The other shoe dropped this week as Cisco said it would end development of the hyperconverged (HCI) system, saying it would “end-of-life” the HyperFlex Data Platform (HXDP) and the last day to order any products related to the system would be September 11, 2024. The last day to renew to an existing subscription is February 28, 2029 though active customers will be able to continue receiving Cisco support as necessary.To read this article in full, please click here

Cisco snuffs HyperFlex development, hands HCI future to Nutanix

When Cisco and Nutanix partnered in August, it raised questions about the future development of Cisco’s HyperFlex platform. The other shoe dropped this week as Cisco said it would cease development of its hyperconverged infrastructure (HCI) system.Cisco announced the end-of-sale and end-of-life dates for its HyperFlex Data Platform (HXDP); the last day to order any products related to the system is September 11, 2024, and the last day to renew to an existing subscription is February 28, 2029. Active customers will be able to continue receiving Cisco support as necessary.To read this article in full, please click here

Cisco snuffs HyperFlex development, hands HCI future to Nutanix

When Cisco and Nutanix partnered in August, it raised questions about the future development of Cisco’s HyperFlex platform. The other shoe dropped this week as Cisco said it would cease development of its hyperconverged infrastructure (HCI) system.Cisco announced the end-of-sale and end-of-life dates for its HyperFlex Data Platform (HXDP); the last day to order any products related to the system is September 11, 2024, and the last day to renew to an existing subscription is February 28, 2029. Active customers will be able to continue receiving Cisco support as necessary.To read this article in full, please click here

IBM X-Force: Use of compromised credentials darkens cloud security picture

As connectivity to cloud-based resources grows, cybercriminals are using valid, compromised credentials to access enterprise resources at an alarming rate.That's one of the chief findings of the IBM X-Force Cloud Threat Landscape Report, which also found a 200% increase (about 3,900 vulnerabilities) in cloud-oriented Common Vulnerabilities and Exposures (CVE) in the last year.“Over 35% of cloud security incidents occurred from attackers’ use of valid, compromised credentials,” wrote Chris Caridi, strategic cyber threat analyst with IBM X-Force, in a blog about the report. “Making up nearly 90% of assets for sale on dark web marketplaces, credentials’ popularity among cybercriminals is apparent, averaging $10 per listing – or the equivalent of a dozen doughnuts.”To read this article in full, please click here

IBM X-Force: Use of compromised credentials darkens cloud security picture

As connectivity to cloud-based resources grows, cybercriminals are using valid, compromised credentials to access enterprise resources at an alarming rate.That's one of the chief findings of the IBM X-Force Cloud Threat Landscape Report, which also found a 200% increase (about 3,900 vulnerabilities) in cloud-oriented Common Vulnerabilities and Exposures (CVE) in the last year.“Over 35% of cloud security incidents occurred from attackers’ use of valid, compromised credentials,” wrote Chris Caridi, strategic cyber threat analyst with IBM X-Force, in a blog about the report. “Making up nearly 90% of assets for sale on dark web marketplaces, credentials’ popularity among cybercriminals is apparent, averaging $10 per listing – or the equivalent of a dozen doughnuts.”To read this article in full, please click here

IBM X-Force: Use of compromised credentials darkens cloud security picture

As connectivity to cloud-based resources grows, cybercriminals are using valid, compromised credentials to access enterprise resources at an alarming rate.That's one of the chief findings of the IBM X-Force Cloud Threat Landscape Report, which also found a 200% increase (about 3,900 vulnerabilities) in cloud-oriented Common Vulnerabilities and Exposures (CVE) in the last year.“Over 35% of cloud security incidents occurred from attackers’ use of valid, compromised credentials,” wrote Chris Caridi, strategic cyber threat analyst with IBM X-Force, in a blog about the report. “Making up nearly 90% of assets for sale on dark web marketplaces, credentials’ popularity among cybercriminals is apparent, averaging $10 per listing – or the equivalent of a dozen doughnuts.”To read this article in full, please click here

Heavy Networking 701: Monitoring SD-WAN At Scale With Broadcom (Sponsored)

Our topic today on Heavy Networking is SD-WAN monitoring at massive scale. Scale can grow quickly with SD-WAN when you account for the underlay, overlays, gateways, endpoints, and more. We talk with sponsor Broadcom about their monitoring platform and dig into a case study with a Broadcom customer providing global IT infrastructure for thousands of their own customers.

The post Heavy Networking 701: Monitoring SD-WAN At Scale With Broadcom (Sponsored) appeared first on Packet Pushers.

Heavy Networking 701: Monitoring SD-WAN At Scale With Broadcom (Sponsored)

Our topic today on Heavy Networking is SD-WAN monitoring at massive scale. Scale can grow quickly with SD-WAN when you account for the underlay, overlays, gateways, endpoints, and more. We talk with sponsor Broadcom about their monitoring platform and dig into a case study with a Broadcom customer providing global IT infrastructure for thousands of their own customers.

Making Content Security Policies (CSPs) easy with Page Shield

Making Content Security Policies (CSPs) easy with Page Shield
Making Content Security Policies (CSPs) easy with Page Shield

Modern web applications are complex, often loading JavaScript libraries from tens of different sources and submitting data to just as many. This leads to a vast attack surface area and many attack types that hackers may leverage to target the user browser directly. Magecart, a category of supply chain attack, is a good example.

To combat this, browser vendors (Google, Microsoft, Mozilla, etc.) have agreed on a standard that allows application owners to control browser behavior from a security perspective. This standard is called Content Security Policies (CSPs). Content Security Policies are implemented by application owners as a specially formatted HTTP response header that the browser then parses and enforces. This header can be used, for example, to enforce loading of JavaScript libraries only from a specific set of URLs. CSPs are good as they reduce the attack surface, but are hard to implement and manage, especially in a fast-paced development environment.

Starting today, Page Shield, our client-side security product, supports all major CSP directives. We’ve also added better reporting, automated suggestions, and Page Shield specific user roles, making CSPs much easier to manage.

If you are a Page Shield enterprise customer, log in to your Continue reading

BrandPost: Unified Management Is the Key to Single-Vendor SASE

It’s no secret that SASE has skyrocketed in popularity in recent years due in large part to how the solution provides strong threat protection and secure access no matter where a user, device, or application is located. This is no small feat, especially in the work-from-anywhere (WFA) era, where employees are logging in from a coffee shop one day and the office the next.  To read this article in full, please click here

BrandPost: Unified Management Is the Key to Single-Vendor SASE

It’s no secret that SASE has skyrocketed in popularity in recent years due in large part to how the solution provides strong threat protection and secure access no matter where a user, device, or application is located. This is no small feat, especially in the work-from-anywhere (WFA) era, where employees are logging in from a coffee shop one day and the office the next.  To read this article in full, please click here

Upcoming Training: How Routers Really Work

Have you ever wondered exactly how a router moves a packet from input to output interface? Or what the difference between is between a router’s and host’s operating system? Or why forwarding engines are built in classes, and one forwarding engine cannot “do it all?” Join me on the 22nd at 1pm ET for How Routers Really Work, a three-hour tour through router guts. I’ve replaced about 10% of the slides since the last time I taught this course.

If you register, you can watch the recording at a later date.

Register here.

Cisco shapes its strategy for Ethernet-based AI networks

Cisco is on a mission to make sure Ethernet is the chief underpinning for artificial intelligence networks now and in the future.It has been a huge contributor to Ethernet development in the IEEE and other industry groups over the years, and now it’s one of the core vendors driving the Ultra Ethernet Consortium (UEC), a group that’s working to develop physical, link, transport and software layer advances for Ethernet to make it more capable of supporting AI infrastructures.“Organizations are sitting on massive amounts of data that they are trying to make more accessible and gain value from faster, and they are looking at AI technology now,” said Thomas Scheibe, vice president of product management with Cisco’s cloud networking, Nexus & ACI product line.To read this article in full, please click here

Cisco shapes its strategy for Ethernet-based AI networks

Cisco is on a mission to make sure Ethernet is the chief underpinning for artificial intelligence networks now and in the future.It has been a huge contributor to Ethernet development in the IEEE and other industry groups over the years, and now it’s one of the core vendors driving the Ultra Ethernet Consortium (UEC), a group that’s working to develop physical, link, transport and software layer advances for Ethernet to make it more capable of supporting AI infrastructures.“Organizations are sitting on massive amounts of data that they are trying to make more accessible and gain value from faster, and they are looking at AI technology now,” said Thomas Scheibe, vice president of product management with Cisco’s cloud networking, Nexus & ACI product line.To read this article in full, please click here

Cisco shapes its strategy for Ethernet-based AI networks

Cisco is on a mission to make sure Ethernet is the chief underpinning for artificial intelligence networks now and in the future.It has been a huge contributor to Ethernet development in the IEEE and other industry groups over the years, and now it’s one of the core vendors driving the Ultra Ethernet Consortium (UEC), a group that’s working to develop physical, link, transport and software layer advances for Ethernet to make it more capable of supporting AI infrastructures.“Organizations are sitting on massive amounts of data that they are trying to make more accessible and gain value from faster, and they are looking at AI technology now,” said Thomas Scheibe, vice president of product management with Cisco’s cloud networking, Nexus & ACI product line.To read this article in full, please click here

Worth Reading: Where Are the Self-Driving Cars?

Gary Marcus wrote an interesting essay describing the failure of self-driving cars to face the unknown unknowns. The following gem from his conclusions applies to AI in general:

In a different world, less driven by money, and more by a desire to build AI that we could trust, we might pause and ask a very specific question: have we discovered the right technology to address edge cases that pervade our messy really world? And if we haven’t, shouldn’t we stop hammering a square peg into a round hole, and shift our focus towards developing new methodologies for coping with the endless array of edge cases?

Obviously that’s not going to happen, we’ll keep throwing more GPU power at the problem trying to solve it by brute force.

Worth Reading: Where Are the Self-Driving Cars?

Gary Marcus wrote an interesting essay describing the failure of self-driving cars to face the unknown unknowns. The following gem from his conclusions applies to AI in general:

In a different world, less driven by money, and more by a desire to build AI that we could trust, we might pause and ask a very specific question: have we discovered the right technology to address edge cases that pervade our messy really world? And if we haven’t, shouldn’t we stop hammering a square peg into a round hole, and shift our focus towards developing new methodologies for coping with the endless array of edge cases?

Obviously that’s not going to happen, we’ll keep throwing more GPU power at the problem trying to solve it by brute force.

Sorting, joining, shuffling, skipping and numbering lines on Linux

Whenever you need to work with lists that are stored as text files on Linux – especially long ones – you can take advantage of some easy commands to make manipulating them a lot easier. Any text file can be easily sorted, but you can also randomly arrange the lines, number them or join files when two share an initial common field. In fact, if you only want to see every other line or every fifth line in a file, you can do that too. This post runs through the commands to do all of these things.Sorting files The sort command makes sorting text files very easy. To view the contents of a text file in sorted order, all you need to do is type a command like this:To read this article in full, please click here