From processors, to FPGAs, to ASICs, and back again, Tony Li joins Network Collective’s History of Networking to talk through the impact that the Cisco SSE and hardware switching has had on the networking industry.
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post History Of Networking – Tony Li – SSE and Hardware Switching appeared first on Network Collective.
Late last spring, we were seeking to expand our connections inside of IBM. IBM had first become a direct Cloudflare customer in 2016, when its X-force Exchange business selected Cloudflare, instead of traditional scrubbing center solutions, for DDoS protection, WAF, and Load Balancing. We had friendly relationships with several people inside of IBM’s Softlayer business. We learned that the IBM “Networking Tribe” was evaluating various solutions to fill product gaps that their cloud customers were experiencing for DDoS, DNS, WAF, and load balancing.
In trying to engage with the people leading the effort, I made a casual phone call late on a Friday afternoon to one of the IBMers based in Raleigh, NC. When he understood that I was from Cloudflare, he replied, “Oh, I know Cloudflare. You guys do DDoS protection, right?” I replied, “Well, yes, we do offer DDoS protection, but we also offer a number of other security and performance services.” He indicated that he would be in the Bay Area two weeks later, and that he would bring his team to our office if we could make the time.
Also late last spring, my wife delivered our baby Continue reading
Organizations that have embraced DevOps and cloud-native architecture might also want to investigate SRE. Interop ITX expert Rob Hirschfeld explains why.
One of my readers sent me a question along these lines after reading the anti-automation blog post:
Your blog post has me worried as we're currently reviewing offers for NGFW solution... I understand the need to keep the lid on the details rather than name and shame, but is it possible to get the details off the record?
I always believed in giving my readers enough information to solve their challenges on their own (you know, the Teach a man to fish idea).
Read more ...Short post this time.
If you on Linux set up your Yubikey in smartcard mode then you can use that Yubikey without any setup at all on Windows.
Just open
PuttyWincrypt, put
in the host to log in to, and under Connection > SSH > Auth
set
Private key file for authentication
to cert://*
, then click
Open
.
It’ll ask for the PIN, you’ll have to touch the Yubikey when it’s blinking, and you’re in.
Cohesity and Rubrik lead the sector.
Aryaka's Passport service integrates security from Palo Alto Networks, Zscaler, and Radware.
The OSCP Security Technology course is for those interested in learning advanced ethical hacking and penetration testing. This course is designed to prepare students to for the Penetration Testing with Kali (PWK) course offered by Offensive Security. The PWK course is a prerequisite to the Offensive Security Certified Professional (OSCP) exam. Students should be familiar with Linux command line, Bash and Python scripting, and basic networking concepts before attempting the course.
This Course is 9 hours and 22 minutes long and taught by Heath Adams. You can view the full OSCP course on our streaming site.
About The Instructor:
Heath Adams is a cybersecurity professional. He currently holds the OSCP, OSWP, CEH, CCNA, Security+, Linux+, Network+, and A+ certifications. When he is not developing courses with INE, he spends his work life as a senior network engineer with a national lab in the United States. He is also currently an Army Officer in the Reserves.
In his free time, Heath enjoys spending time with his fiance and their 4 animal children. He enjoys playing video games, running, playing the guitar, watching sports, and binge-watching more TV shows than he should admit.
Cisco took FOUR YEARS to patch disclosed vulnerabilities in NX-OS.
It uses Intel and Fortanix software.