Archive

Category Archives for "Networking"

Wireless Doctors

Wireless is a complicated thing. Even when you try to distill it down to networking basics on the wired side of the access point, you still have a very hard problem to solve on the radio side. Even I’ve talked in the past about how wireless is now considered a “solved” problem. But, the more I interact with wireless professionals and the more I think about the problem, the issue isn’t that IT departments think wireless is solved, it’s that they don’t appreciate the value of a specialist.

The Last Place Doctor

There’s an old joke that goes, “What do you call the person that graduated last in their medical school class? Doctor.” Professionals spend a lot of their time learning a tradecraft and practicing it to get better. And it’s not just doctors. So do plumbers, electricians, and teachers. Anyone that has ever tried to do any of these trades will tell you that the basics are capable of being figured out by the average non-professional, but the details are a huge leap.

You’d never assume that being able to put on a Band-Aid on a scrape would qualify you to do brain surgery. Or that changing a Continue reading

Future Thinking: Cyrating on Cyber Threats

In 2017, the Internet Society unveiled the 2017 Global Internet Report: Paths to Our Digital Future. The interactive report identifies the drivers affecting tomorrow’s Internet and their impact on Media & Society, Digital Divides, and Personal Rights & Freedoms. In February 2018, we interviewed two stakeholders – Cyrating, a cybersecurity ratings agency, and Niel Harper, Senior Manager, Next Generation Leaders at the Internet Society – to hear their different perspectives on the forces shaping the Internet’s future.

Cyrating is the first cybersecurity ratings agency anchored in Europe, and helps forward-thinking organizations maximize their cybersecurity performance and investments. It identifies potential for improvement, benchmarks it against industry best practices, and provides standardized cybersecurity metrics. We spoke to François Gratiolet, one of Cyrating’s founders, about the future of a secure and trusted Internet.

(You can read Niel Harper’s interview here).

The Internet Society: Experts predict an increase of frequency and impact of cyberattacks. What form are they likely to take in the next three to five years?

François Gratiolet: We believe cyberattacks will intensify in the next three to five years; targeting both Internet users and the Internet’s underlying infrastructure. User attacks will move from phishing to social media, with Continue reading

#PressForProgress – International Women’s Day 2018 | A Cloudflare & Branch Event

#PressForProgress - International Women’s Day 2018 | A Cloudflare & Branch Event

Almost a year ago, I began my journey in the tech industry at a growing company called Cloudflare. I’m a 30-something paralegal and although I didn’t know how to write code (yet), I was highly motivated and ready to crush. I had worked hard for the previous two years, focused on joining a thriving company where I could grow my intelligence, further develop my skill set and work alongside successful professionals. And finally, my hard work paid off; I landed the job at Cloudflare and booked a seat on the rocket ship.

After the initial whirlwind that accompanies this fast-paced field subsided, motivation, inspiration, success, momentum and endurance began to flood my neurons. I loved the inner workings of a successful startup, felt the good and bad of the tech industry, related to and admired the female executives and most importantly, wanted to give something back to the community that adopted me.

#PressForProgress - International Women’s Day 2018 | A Cloudflare & Branch Event
Venus Approaching the Sun Source: Flickr

During a routine chat with my dad, I pitched what I thought was a crazy idea. Crazy because I was so used to being told “no” at previous jobs, used to not having my ideas taken seriously, and also used to not Continue reading

Big Changes Ahead for Core Internet Protocols – IETF Journal

Excellent summary of what seems to be poorly understood. IPv6 is going nowhere slowly but the higher level protocols are changing today. Now, significant changes to the core Internet protocols are underway. While they are intended to be compatible with the Internet at large (since they won’t get adoption otherwise), they might be disruptive to […]

IDG Contributor Network: Emerging blockchain-based distribution storage market and its effect on cloud computing

The blockchain industry, historically tied directly to cryptocurrency, has made a right turn in recent months. It has extended its legion of users to offer distributed storage. This threatens to undercut the pricing market established by cloud computing storage giants like AWS and Dropbox.How it works Blockchain-based distribution storage is centered around the idea that there are large amounts of unused storage space on the hard drives of people all over the world. Using cryptocurrency as an incentive, blockchain distribution companies monetize that storage space for their members. It is an upgraded version of what BitTorrent was in the early 2000s, using peer-to-peer (P2P) networks to form an aggregate of computer resources. But with cryptocurrencies built in to blockchains as a method of payment, users have a monetary incentive to offer up their unused data space to consumers.  Because of its extreme distribution of data - known as sharding - blockchain-based storage has the potential to be more secure than cloud-based storage. And by using the in-place hardware maintained by others, it can drastically cut the cost for the end-user.    To read this article in full, please click here

IoT: Sensor-as-a-service, run by blockchain, is coming

Telecommunications equipment maker Nokia has launched a turnkey, sensor-as-a-service offering for Internet of Things (IoT) networks.The idea behind the product is to provide a way for mobile network operators (MNOs), many of which use Nokia cell site equipment, to monetize existing infrastructure, such as towers, by selling live environmental sensor data to cities and others.Read also: When IoT met blockchain | Sign up: Receive daily tech news updates MNOs increasingly are looking for new revenue sources as consumer smartphone growth plateaus. And cities need to adopt digital strategies to manage assets, increase efficiencies, and keep stakeholders happy. For example, they need granular real-time data about public transportation flow and air quality to ensure they comply with regulations—that the traffic is flowing and no illegal garbage is burning.To read this article in full, please click here

Big Red Button for Network Automation

A while ago I was enjoying a few beers with a longtime friend of mine who happens to be running the networking team for one of the rare companies that understands how infrastructure should be built and operated.

Of course, I had to ask him what he thinks about the imminent death of CLI and all-encompassing automatic provisioning from some central orchestration system. Here’s the gist of his response:

Read more ...

Take Application Security to the Next Level – VMware and Carbon Black team up

 

 

 

Perhaps you’ve already begun to secure virtualized applications by rolling out micro-segmentation with NSX, but segmentation of the network is only the beginning to embracing least privilege in your environment.

 

VMware has teamed up with Carbon Black to go beyond network protection and change the way your data center endpoints themselves are protected. By leveraging the unique properties of virtualization and the hypervisor, along with next-generation detection and response, VMware and Carbon Black are able to shrink your environment’s attack surface and respond to detected threats with precision and speed.

Learn more here, and come see the solution in action at the Cloud Force Security road show (coming to a city near you)!

 

The post Take Application Security to the Next Level – VMware and Carbon Black team up appeared first on Network Virtualization.

Dell EMC Introduces New Certifications to Establish and Validate IT Skills of the Future

Dell EMC Introduces New Certifications to Establish and Validate IT Skills of the Future Four new certifications help organizations maximize technology investments, modernize IT, build in-house transformation expertise Highest-level certification, Dell EMC Certified Master – Enterprise Architect, validates ability to design and implement secure IT-as-a-Service solutions for the digital economy Additional certifications focused on converged/hyper-converged infrastructure, multi-cloud administration and infrastructure security Dell EMC unveiled new certifications that establish and... Read more →

Validating Leaked Passwords with k-Anonymity

Validating Leaked Passwords with k-Anonymity

Validating Leaked Passwords with k-Anonymity

Today, v2 of Pwned Passwords was released as part of the Have I Been Pwned service offered by Troy Hunt. Containing over half a billion real world leaked passwords, this database provides a vital tool for correcting the course of how the industry combats modern threats against password security.

I have written about how we need to rethink password security and Pwned Passwords v2 in the following post: How Developers Got Password Security So Wrong. Instead, in this post I want to discuss one of the technical contributions Cloudflare has made towards protecting user information when using this tool.

Cloudflare continues to support Pwned Passwords by providing CDN and security functionality such that the data can easily be made available for download in raw form to organisations to protect their customers. Further; as part of the second iteration of this project, I have also worked with Troy on designing and implementing API endpoints that support anonymised range queries to function as an additional layer of security for those consuming the API, that is visible to the client.

This contribution allows for Pwned Passwords clients to use range queries to search for breached passwords, without having to disclose a complete unsalted Continue reading