Archive

Category Archives for "Networking"

Big Red Button for Network Automation

A while ago I was enjoying a few beers with a longtime friend of mine who happens to be running the networking team for one of the rare companies that understands how infrastructure should be built and operated.

Of course, I had to ask him what he thinks about the imminent death of CLI and all-encompassing automatic provisioning from some central orchestration system. Here’s the gist of his response:

Read more ...

Take Application Security to the Next Level – VMware and Carbon Black team up

 

 

 

Perhaps you’ve already begun to secure virtualized applications by rolling out micro-segmentation with NSX, but segmentation of the network is only the beginning to embracing least privilege in your environment.

 

VMware has teamed up with Carbon Black to go beyond network protection and change the way your data center endpoints themselves are protected. By leveraging the unique properties of virtualization and the hypervisor, along with next-generation detection and response, VMware and Carbon Black are able to shrink your environment’s attack surface and respond to detected threats with precision and speed.

Learn more here, and come see the solution in action at the Cloud Force Security road show (coming to a city near you)!

 

The post Take Application Security to the Next Level – VMware and Carbon Black team up appeared first on Network Virtualization.

Dell EMC Introduces New Certifications to Establish and Validate IT Skills of the Future

Dell EMC Introduces New Certifications to Establish and Validate IT Skills of the Future Four new certifications help organizations maximize technology investments, modernize IT, build in-house transformation expertise Highest-level certification, Dell EMC Certified Master – Enterprise Architect, validates ability to design and implement secure IT-as-a-Service solutions for the digital economy Additional certifications focused on converged/hyper-converged infrastructure, multi-cloud administration and infrastructure security Dell EMC unveiled new certifications that establish and... Read more →

Validating Leaked Passwords with k-Anonymity

Validating Leaked Passwords with k-Anonymity

Validating Leaked Passwords with k-Anonymity

Today, v2 of Pwned Passwords was released as part of the Have I Been Pwned service offered by Troy Hunt. Containing over half a billion real world leaked passwords, this database provides a vital tool for correcting the course of how the industry combats modern threats against password security.

I have written about how we need to rethink password security and Pwned Passwords v2 in the following post: How Developers Got Password Security So Wrong. Instead, in this post I want to discuss one of the technical contributions Cloudflare has made towards protecting user information when using this tool.

Cloudflare continues to support Pwned Passwords by providing CDN and security functionality such that the data can easily be made available for download in raw form to organisations to protect their customers. Further; as part of the second iteration of this project, I have also worked with Troy on designing and implementing API endpoints that support anonymised range queries to function as an additional layer of security for those consuming the API, that is visible to the client.

This contribution allows for Pwned Passwords clients to use range queries to search for breached passwords, without having to disclose a complete unsalted Continue reading

How Developers got Password Security so Wrong

How Developers got Password Security so Wrong

How Developers got Password Security so Wrong

Both in our real lives, and online, there are times where we need to authenticate ourselves - where we need to confirm we are who we say we are. This can be done using three things:

  • Something you know
  • Something you have
  • Something you are

Passwords are an example of something you know; they were introduced in 1961 for computer authentication for a time-share computer in MIT. Shortly afterwards, a PhD researcher breached this system (by being able to simply download a list of unencrypted passwords) and used the time allocated to others on the computer.

As time has gone on; developers have continued to store passwords insecurely, and users have continued to set them weakly. Despite this, no viable alternative has been created for password security. To date, no system has been created that retains all the benefits that passwords offer as researchers have rarely considered real world constraints[1]. For example; when using fingerprints for authentication, engineers often forget that there is a sizable percentage of the population that do not have usable fingerprints or hardware upgrade costs.

Cracking Passwords

In the 1970s, people started thinking about how to better store passwords and cryptographic hashing started to Continue reading

History of Networking: Policy with Joel Halpern

Policy at Internet scale is a little understood, and difficult (potentially impossible) to solve problem. Joel Halpern joins the History of Networking over at the Network Collective to talk about the history of policy in the Internet at large, and networked systems in general.

BrandPost: How to accelerate multi-cloud migration

As we begin 2018, enterprises continue to accelerate their migration of workloads to public cloud service providers (AWS, Azure and Google), often as part of an overall digital transformation (DT) and cloud-first IT strategy. This is not surprising as IDC predicts that by the end of this year, nearly 80% of workloads will be processed in cloud data centers.To read this article in full, please click here

What is NAS and how do NAS servers excel at corralling unstructured data?

Network-attached storage (NAS) is a category of file-level storage that’s connected to a network and enables data access and file sharing across a heterogeneous client and server environment.“Ideally, NAS is platform- and OS-independent, appears to any application as another server, can be brought online without shutting down the network and requires no changes to other enterprise servers,” says research firm Gartner in its definition of NAS. BE SURE NOT TO MISS: What do users really think of all-flash arrays? What is hyperconvergence? Hyperconvergence gathers speed in 2018 Micro-modular data centers set to multiply NAS history: the evolution of network-attached storage NAS evolved from file servers used in the 1980s to provide access to files for network clients. NAS devices typically consist of bundled hardware and software with a built-in operating system, and they typically use industry-standard network protocols such as SMB and NFS for remote file service and data sharing and TCP/IP for data transfer. In an enterprise setting, NAS can allow IT teams to streamline data storage and retrieval while consolidating their server and storage infrastructure.To read this article in full, please click here

We now offer live, on-site Google Cloud Architect training!



 

We’re excited to announce the release of our newest bootcamp: The Google Cloud Architect Exam Bootcamp. Currently the only course of it’s kind on the market, this bootcamp focuses specifically on what candidates need to know to pass the GCP Cloud Architect Exam. Like our other bootcamps, this class is taught live, on-site by an expert INE Instructor and will feature 5 days of intensive, hands-on, real world exercises, practice exams, and in-depth case study discussions. Attendees will also be provided access to a complete series of GCP based cloud labs.

The goal of our GCP Cloud Architect Exam Bootcamp is to equip students with a foundation-level knowledge of Google Cloud Platform to pass the exam. The primary focus of the class is core concepts and topics found on the GCP Cloud Architect written exam.

This bootcamp is currently only offered in May and August of 2018, at our NC location, but more dates and locations will likely be added in the future.

Who Should Take it?

Our Written Exam Bootcamp is for anyone who is beginning their GCP Cloud Architect certification journey, but already has at least basic knowledge of cloud computing. We strongly recommend at least 1 Continue reading