One of my articles was published in the most recent Internet Protocol Journal:
If you don’t subscribe to or read IPJ, you should—it’s a great source of information written by industry leaders and thinkers.
Ping Identity also launched a new product that builds on Elastic Beam’s technology, as well as its own API security product, and uses AI to identify and block attacks targeting API infrastructures in public and hybrid clouds.
The Wi-Fi Alliance officially launches its latest protocol, which offers new capabilities for personal, enterprise, and IoT wireless networks.
The cloud provider’s global network includes 16 regions across 12 countries. It plans to launch additional regions in Zurich, Hong Kong, and Osaka, Japan in the future.
This week on Tuesday, 26 June, the Internet Society and NIC.BR signed a Memorandum of Understanding (MoU) to work together to increase routing security in Brazil, including the MANRS initiative. Mutually Agreed Norms for Routing Security is a global initiative that provides crucial fixes to reduce the most common routing threats.
We are excited to strengthen our efforts to work together with NIC.br, and in fact this MoU only formalizes an existing long-term relationship between the two organizations. Our goal is to help increase the number of Brazilian Internet Service Providers and Internet Exchange Points joining efforts for a more secure and resilient Internet.
Not a single day goes by without dozens of incidents affecting the Internet’s routing system. Route hijacking, route leaks, IP address spoofing, and other harmful activities can lead to Denial of Service (DoS) attacks, traffic inspection and surveillance, lost revenue, reputational damage, and more. As one of the biggest countries with high access rates, Brazil is also facing these incidents on a daily basis.
NIC.BR is responsible for the coordination and integration of all Internet service initiatives in Brazil, including long-standing activities related to Internet security. They are also responsible for many projects that Continue reading
On Tuesday, 17 July, during IETF 102 in Montreal, the Global Commission on the Stability of Cyberspace (GCSC) will host a lunch panel on “Cyber Diplomacy Meets InfoSec and Technology.” During this session, the Commission wants to inform and engage with the IETF community on its work so far and the work that is in the pipeline.
The Global Commission on the Stability of Cyberspace is developing norms and policy initiatives that intend to counter the risk to the overall security and stability of cyberspace due to rise of offensive cyber-activities, and especially those by states.
In this global environment we see conflict between states takes new forms, and cyber-activities are playing a leading role. There is an increasing risk of undermining the peaceful use of cyberspace and a growing for need norms and policies to enhance international security and stability.
The Global Commission on the Stability of Cyberspace, with commissioners from diverse backgrounds, sets out to develop proposals for norms and policies to enhance international security and stability and guide responsible state and non-state behavior in cyberspace.
During this lunch panel we want to engage with the IETF community to discuss the norms the commission Continue reading
As a part of some content development and revision on MPLS, I was trying to capture some MPLS Pcap Files from the Vmx Router. The problem was that every time I capture a file, I had to first scp or sftp into the device and then after successful import, I had to run Wireshark on it.
The Aim of the post is to fetch the pcap file and run Wireshark on it. Am not a decent programmer by any stretch of the imagination, anyone can see that from my code
but the point that matters is that it works and you should give it a try too.
https://github.com/yukthr/auts/blob/master/junos_pyez/getfile_executewireshark.py– Is the file
When I run this program to fetch a non-existent Pcap file
And when I query for an existent file
-Rakesh
Silver Peak differentiates itself from other SD-WAN vendors with its Unity EdgeConnect SD-WAN physical or virtual appliance.
Users weigh in on pros and cons of Dell EMC ScaleIO, HPE StoreVirtual, IBM Spectrum Virtualize, Red Hat Ceph, and StorPool.
The EVPN in the Data Center book by Dinesh Dutt, the author of EVPN Technical Deep Dive webinar and member of ipSpace.net ExpertExpress team has finally been published. It’s currently kept safe behind Cumulus Networks regwall, but as O’Reilly published it, I would expect it to be available through other channels in the future.