Archive

Category Archives for "Networking"

Day Two Cloud 207: Making Sense Of SSE, SASE, And SD-WAN

On today's Day Two Cloud we examine the similarities and differences among SSE and SASE, which provide cloud-delivered security; and SD-WAN, which can provide connections to these services. We also discuss the drivers for cloud-delivered security, the role of networking, where and how zero trust can come into play, some of the big players in these spaces, and more.

The post Day Two Cloud 207: Making Sense Of SSE, SASE, And SD-WAN appeared first on Packet Pushers.

Day Two Cloud 207: Making Sense Of SSE, SASE, And SD-WAN

On today's Day Two Cloud we examine the similarities and differences among SSE and SASE, which provide cloud-delivered security; and SD-WAN, which can provide connections to these services. We also discuss the drivers for cloud-delivered security, the role of networking, where and how zero trust can come into play, some of the big players in these spaces, and more.

Introducing Cloudflare’s 2023 phishing threats report

Introducing Cloudflare's 2023 phishing threats report
Introducing Cloudflare's 2023 phishing threats report

After shutting down a ‘phishing-as-a-service’ operation that impacted thousands of victims in 43 countries, INTERPOL recently noted, “Cyberattacks such as phishing may be borderless and virtual in nature, but their impact on victims is real and devastating.” Business email compromise (BEC), a type of malware-less attack that tricks recipients into transferring funds — for example — has cost victims worldwide more than $50 billion, according to the FBI.

It is estimated that 90% of successful cyber attacks start with email phishing, which continues to be very lucrative for attackers. There is not much today that can be done to stop phishing attempts. However, to prevent successful attacks, it is important to understand (and proactively address) evolving phishing trends — including the ways attackers cleverly exploit intended victims’ trust in “known” email senders. To that end, this week Cloudflare published its first Phishing Threats Report.

This report explores key phishing trends and related recommendations, based on email security data from May 2022 to May 2023. During that time, Cloudflare processed approximately 13 billion emails, which included blocking approximately 250 million malicious messages from reaching customers’ inboxes. The report is also informed by a Cloudflare-commissioned survey Continue reading

Free Subscription No Longer Needed to Watch the ipSpace.net Videos

I’m publishing a link to a free ipSpace.net video several times each month, usually with a notice saying you need free subscription to watch the video. I had to put that limitation in place when I was hosting videos on AWS S3 – unlimited streaming could explode my AWS bill.

Recently I moved the video storage to Cloudflare R2. Cloudflare claims they will never charge egress fees, and as long as that’s true (and they don’t start chasing me for generating too much traffic) I see no reason to bother you with registration and login procedures – starting immediately, you can watch the free ipSpace.net videos without an ipSpace.net account.

Free Subscription No Longer Needed to Watch the ipSpace.net Videos

I’m publishing a link to a free ipSpace.net video several times each month, usually with a notice saying you need free subscription to watch the video. I had to put that limitation in place when I was hosting videos on AWS S3 – unlimited streaming could explode my AWS bill.

Recently I moved the video storage to Cloudflare R2. Cloudflare claims they will never charge egress fees, and as long as that’s true (and they don’t start chasing me for generating too much traffic) I see no reason to bother you with registration and login procedures – starting immediately, you can watch the free ipSpace.net videos without an ipSpace.net account.

AWS CLIv2 on OpenBSD

The AWS CLI is a tool set that lets you manage your AWS resources. The CLI comes in two versions which, at the time of this writing, are developed concurrently: version 1 and version 2.

Internally, the AWS CLIv1 and v2 are quite different. Version 2 pulls in AWS libraries--libraries which are used across the AWS SDK ecosystem--rather than reinventing the wheel when it comes to common tasks, such as talking to Amazon S3. Running AWS CLIv2 on your operating system of choice requires building and installing these common AWS libraries.

I contributed changes to s2n-tls, aws-lc, the Python runtime, some build tooling, and various other libraries. As a result, the AWS CLIv2 now builds and runs on OpenBSD.

To make installation simple, I've created an OpenBSD port for CLIv2 and its dependencies. Instructions for installing the port are below.

Read the rest of this post.

Kneron drives automotive AI chip market with new KL730 release

Kneron has rolled out a new type of neural processing unit, the KL730, which integrates image signal processing and high energy efficiency for use in edge, security and automotive applications.The San Diego-based chip designer, in an announcement Tuesday, said that the KL730 is powered by a quad-core ARM Cortex A55 CPU, along with its own-brand, fourth- generation neural processing unit, as well as a host of connectivity options, including SD, USB 2 and 3, and Ethernet. Its image processing technology also packs in the ability to read high-definition inputs at up to 8MP at 90 frames per second, hardware dewarping for full panoramic views, and several other image signal processing features.To read this article in full, please click here

Hybrid mesh firewall platforms gain interest as management challenges intensify

As enterprise networks get more complex, so do the firewall deployments.There are on-premises firewalls to manage, along with firewalls that are deployed in virtual machines and firewalls deployed in containers. There are firewalls for clouds and firewalls for data centers, firewalls for network perimeters, and firewalls for distributed offices. According to Gartner, by 2026, more than 60% of organizations will have more than one type of firewall deployment."A firewall used to be a box or a chasse with multiple cards," says Omdia analyst Fernando Montenegro. "Then we had a firewall in a virtual machine. And now we have a container form factor for a firewall because customers are deploying containers. And, oh, we need firewalls-as-a-service to support SASE."To read this article in full, please click here

Hybrid mesh firewall platforms gain interest as management challenges intensify

As enterprise networks get more complex, so do the firewall deployments.There are on-premises firewalls to manage, along with firewalls that are deployed in virtual machines and firewalls deployed in containers. There are firewalls for clouds and firewalls for data centers, firewalls for network perimeters, and firewalls for distributed offices. According to Gartner, by 2026, more than 60% of organizations will have more than one type of firewall deployment."A firewall used to be a box or a chasse with multiple cards," says Omdia analyst Fernando Montenegro. "Then we had a firewall in a virtual machine. And now we have a container form factor for a firewall because customers are deploying containers. And, oh, we need firewalls-as-a-service to support SASE."To read this article in full, please click here

Predicting and Surviving Correlated Failures Redundancy

In this archived panel discussion, Frank Ohlhorst, Henry Sow, and Stephen Lawton connect to deliver an in-depth conversation detailing the need for 'Predicting and Surviving Correlated Failures Redundancy' during our 'Network Resilience Boot Camp' presented by Data Center Knowledge and Network Computing. This excerpt is from our live 'Network Resilience Boot Camp' virtual event moderated by Bonnie D. Graham.

Hybrid workforce demands change from network ops

The pandemic forced businesses to send employees home to work, but even in recovery, the workforce trend is going strong. Some remote work measures were considered a temporary fix, and now the hybrid work reality demands IT organizations reassess how they can deliver consistent support, service, and technology to employees wherever they decide to work.“There have been a lot of conversations about return to work, but it’s not really happening,” said Shamus McGillicuddy, vice president of research at Enterprise Management Associates, during a recent webinar.To read this article in full, please click here

Hiding from history on Linux

Linux shells like bash have a convenient way of remembering commands that you type, making it easy to run them again without having to retype them. Just use the history command (which is a bash built-in) and then use an exclamation point followed by the number shown in front of the command in the history command output that you want to rerun. Alternatively, you can back up to that command by pressing the up arrow key as many times as needed to reach that command and then press return. Don’t forget, though, that you can also set up commands you are likely to use often as aliases by adding a line like this to your ~/.bashrc file so that you don’t need to search for them in your command history. Here’s an example:To read this article in full, please click here

Hiding from history on Linux

Linux shells like bash have a convenient way of remembering commands that you type, making it easy to run them again without having to retype them. Just use the history command (which is a bash built-in) and then use an exclamation point followed by the number shown in front of the command in the history command output that you want to rerun. Alternatively, you can back up to that command by pressing the up arrow key as many times as needed to reach that command and then press return. Don’t forget, though, that you can also set up commands you are likely to use often as aliases by adding a line like this to your ~/.bashrc file so that you don’t need to search for them in your command history. Here’s an example:To read this article in full, please click here

Backblaze sees rise in hard drive failure rates

The latest quarterly report from Backblaze on hard drive reliability reveals a rise in failures among certain drives.Backblaze is a pure storage provider; cloud storage is all they do, and they dig deep into the statistics of hard drive failure and share their data with the industry. The company currently has a massive inventory of 241,297 hard disk drives of varying capacities and from various brands. (In recent quarters, Backblaze has added SSD performance to its measurements, but SSDs are still early in their deployment lifecycle, so patterns over time have yet to fully emerge.)To read this article in full, please click here

ECL set to build modular, hydrogen-powered data centers

ECL has announced what it says will be the world’s first modular, sustainable, off-grid data center that uses hydrogen as its primary power source, promising carbon neutral performance and 99.9999% uptime.Modular data centers are designed to go together like building blocks, allowing companies to start small and grow as their capacity needs increase. The ECL data centers will come in 1 megawatt blocks.ECL's data-center-as-a-service offering is geared primarily to mid-sized data center operators, as well as large companies with a mix of cloud and on-premises IT environments. It claims its data centers will have a total cost of ownership that's two-thirds of what a traditional colocation data center environment would cost when measured over five years.To read this article in full, please click here