Archive

Category Archives for "Networking"

Open Networking for Large-Scale Networks

Shawn Zandi and I recently recorded a new webinar for Ivan over at ipspace.net around open source and disaggregated networking. If you have ever wanted to find out about these topics, this webinar is a great place to start in understanding what options are available, and how easy/hard it is to get this kind of thing running.

The webinar is available here.

The post Open Networking for Large-Scale Networks appeared first on rule 11 reader.

IDG Contributor Network: Learn What NIST’s Cybersecurity Framework Can Do For You

The meteoric rise of cybercrime has caught many organizations unawares. Malware has spread from PCs to smartphones, phishing scams have grown more sophisticated, and ransomware is running rampant.You can hire hackers and botnets, or buy cybercrime software, complete with technical support, all too easily. The rapidly expanding Internet of Things is woefully insecure, creating many more access points that can be exploited by hackers.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Learn What NIST’s Cybersecurity Framework Can Do For You

The meteoric rise of cybercrime has caught many organizations unawares. Malware has spread from PCs to smartphones, phishing scams have grown more sophisticated, and ransomware is running rampant.You can hire hackers and botnets, or buy cybercrime software, complete with technical support, all too easily. The rapidly expanding Internet of Things is woefully insecure, creating many more access points that can be exploited by hackers.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Sumo Logic wants to make machine data analysis available to companies of all sizes

Kalyan Ramanathan, VP of Product Marketing for Sumo Logic, dropped by to discuss the company's machine data analytics platform and a new pricing/licensing model for large enterprises that the company is calling "Cloud Flex."Ramanathan stressed that Sumo Logic understands that all operational and machine data cannot be treated the same. Some data is highly important while other data is of less importance. Some must be watched over the long term and other data has a very short life expectancy. Some data must be accessible at high speed and with low levels of latency while other data can be accessed at slower speeds.Unified Machine Data Analytics The challenges all organizations face is that their IT infrastructure is increasingly complex and has many moving parts. Each of these parts is generating large amounts of operational and machine data. Analysis of this data can be very challenging because it is stored in many places and kept in many different formats. Sumo Logic's idea is to unify both the storage and to provide equal access to make predictive analysis much easier.To read this article in full or to leave a comment, please click here

Experts: The future of IoT will be fascinating and also potentially catastrophic

The Internet of Things is going to be inescapable, pervasive, and riddled with insecurity, but it’s at least going to be interesting, according to a raft of prominent technologists surveyed by the Pew Research Center.Unsurprisingly, IoT security was the name of the game, the experts agreed, but it’s the effect of the present insecurity in IoT and the possible future effects that have them fascinated. The security breaches that have happened already were clearly on the minds of the respondents. Not only has IoT contributed to general online chaos via the Mirai botnet and other incidents, the trend of integrating connected devices ever more deeply into vital infrastructure reveals the potential for even more destructive attacks.To read this article in full or to leave a comment, please click here

Feds charge NSA contractor for leaking Top Secret report about Russia hacking election

Russian military intelligence hackers, believed to be working within the Russian General Staff Main Intelligence Directorate (GRU), tried to break into VR Systems, a company that sells voting registration equipment which was used in the 2016 election. That’s what the NSA determined, according to a classified intelligence report which was leaked to The Intercept.An hour after The Intercept published the NSA document, the Justice Department announced charges against Reality Leigh Winner, a 25-year-old intelligence contractor working for Pluribus International Corporation in Georgia. She had only been working as a Pluribus contractor since Feb. 13. Winner, accused of “removing classified material from a government facility and mailing it to a news outlet,” has been charged with Espionage Act.To read this article in full or to leave a comment, please click here

Feds charge NSA contractor for leaking Top Secret report about Russia hacking election

Russian military intelligence hackers, believed to be working within the Russian General Staff Main Intelligence Directorate (GRU), tried to break into VR Systems, a company that sells voting registration equipment which was used in the 2016 election. That’s what the NSA determined, according to a classified intelligence report which was leaked to The Intercept.An hour after The Intercept published the NSA document, the Justice Department announced charges against Reality Leigh Winner, a 25-year-old intelligence contractor working for Pluribus International Corporation in Georgia. She had only been working as a Pluribus contractor since Feb. 13. Winner, accused of “removing classified material from a government facility and mailing it to a news outlet,” has been charged with Espionage Act.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Armis wants to resolve the IoT security issue

The Internet of Things (IoT) is a big deal. A really big one.There are approximately 8 billion connected devices on the market today, collectively accounting for 50 percent of internet traffic. And that is but a taste of the future—the number of devices is anticipated to increase 150 percent in the next three years. And where growth like that is predicted, every man and his dog is keen to grab market share. The security for IoT space is no different.+ Also on Network World: A lack of IoT security is scaring the heck out of everybody + There are some justified reasons why security in this new IoT context will be different. Connected devices (e.g., laptops, webcams, HVAC systems, etc.) are designed to connect wirelessly, without corporate oversight or control. This creates a dynamic, ever-expanding matrix of connections that not only boosts employee productivity and business efficiency, but simultaneously flies under the radar of security.To read this article in full or to leave a comment, please click here

Armis wants to resolve the IoT security issue

The Internet of Things (IoT) is a big deal. A really big one.There are approximately 8 billion connected devices on the market today, collectively accounting for 50 percent of internet traffic. And that is but a taste of the future—the number of devices is anticipated to increase 150 percent in the next three years. And where growth like that is predicted, every man and his dog is keen to grab market share. The security for IoT space is no different.+ Also on Network World: A lack of IoT security is scaring the heck out of everybody + There are some justified reasons why security in this new IoT context will be different. Connected devices (e.g., laptops, webcams, HVAC systems, etc.) are designed to connect wirelessly, without corporate oversight or control. This creates a dynamic, ever-expanding matrix of connections that not only boosts employee productivity and business efficiency, but simultaneously flies under the radar of security.To read this article in full or to leave a comment, please click here

Armis wants to resolve the IoT security issue

The Internet of Things (IoT) is a big deal. A really big one.There are approximately 8 billion connected devices on the market today, collectively accounting for 50 percent of internet traffic. And that is but a taste of the future—the number of devices is anticipated to increase 150 percent in the next three years. And where growth like that is predicted, every man and his dog is keen to grab market share. The security for IoT space is no different.+ Also on Network World: A lack of IoT security is scaring the heck out of everybody + There are some justified reasons why security in this new IoT context will be different. Connected devices (e.g., laptops, webcams, HVAC systems, etc.) are designed to connect wirelessly, without corporate oversight or control. This creates a dynamic, ever-expanding matrix of connections that not only boosts employee productivity and business efficiency, but simultaneously flies under the radar of security.To read this article in full or to leave a comment, please click here

In Our New Changed World We Need New Tools (Remarks at Next Generation Internet Summit)

On 6 June 2017, Internet Society President & CEO Kathy Brown spoke at the Opening Session of the Next Generation Internet Summit at the European Parliament in Brussels, Belgium. These are her remarks as prepared.


Good Afternoon ladies and gentleman, Honorable colleagues and friends.  

Thank you, President Bonvicini for your very gracious invitation to speak at this prescient Summit on the Next Generation Internet. 

Ms. Kathryn Brown

Introducing NetQ — a fabric validation system providing unparalleled visibility

Today is a big day for us over here at Cumulus Networks! We are pleased to announce the launch of a brand new product designed to bring you unparalleled network visibility & remediation.  The newest addition to the Cumulus Networks portfolio, NetQ, is a telemetry-based fabric validation system that ensures the network is behaving as it was intended to. It allows you to test, validate and troubleshoot using advanced fabric-wide telemetry and Cumulus Linux.

Why NetQ?

To respond to the evolving industry, increasing business demands and growth, many companies have started the web-scale journey by deploying a fully programmable fabric with fully automated configurations across an open network infrastructure. Companies that have implemented some of these best practices are quickly seeing the benefits of agility, efficiency and lowered costs.

However, these organizations are also facing some unknowns: They are worried about making ad-hoc changes that disrupt the network and they can’t easily demonstrate “network correctness.” They’re interested in moving towards intent-based networking methods, but don’t have the right technology in place to do so.

Traditional operations tools and workflows weren’t built for the speed and scale that a modern cloud data center needs as they are manual, reactive and Continue reading