Archive

Category Archives for "Networking"

Day Two Cloud 206: Making The Most Of Red Teaming With Gemma Moore

Red teams attack a customer's security systems. The idea of a red team, whether consultants or in-house, is to approach the target like an attacker would. A red team includes technical and human-based exploit and attempts to test defenses, probe for weaknesses, and identify vulnerable systems and processes. On today's episode we look at how to get the most out of a red team engagement--it's much more than just an attack and a report.

The post Day Two Cloud 206: Making The Most Of Red Teaming With Gemma Moore appeared first on Packet Pushers.

Day Two Cloud 206: Making The Most Of Red Teaming With Gemma Moore

Red teams attack a customer's security systems. The idea of a red team, whether consultants or in-house, is to approach the target like an attacker would. A red team includes technical and human-based exploit and attempts to test defenses, probe for weaknesses, and identify vulnerable systems and processes. On today's episode we look at how to get the most out of a red team engagement--it's much more than just an attack and a report.

HPE teams with PhoenixNAP for bare metal cloud offerings

IT cloud services provider PhoenixNAP is expanding its bare metal cloud offerings by deploying HPE ProLiant servers with Ampere’s Arm-based server processors rather than x86 chips.Ampere, the chip startup founded by former Intel executive Renee James, makes Arm-based server processors specifically for cloud use. It doesn't use multithreading in its chips, unlike Intel and AMD, because it feels performance is not consistent across threads. Rather, it goes for core count, delivering chips that have 80 to 128 cores.The new server, the HPE ProLiant RL300 Gen11, is a cloud-native server designed for service providers and enterprises. HPE says it offers improved compute performance and energy savings over x86 systems.To read this article in full, please click here

Can We Trust Worldcoin’s Aspirin For AI Headaches?

This post originally appeared in the Packet Pushers’ Human Infrastructure newsletter, a weekly mailing of essays, links to technical blogs and IT news, and whatever else think is interesting. Subscribe for free here. Let’s say I invent an autonomous mobile robot. It can lift heavy items for you, wash your dishes, do your grocery shopping, […]

The post Can We Trust Worldcoin’s Aspirin For AI Headaches? appeared first on Packet Pushers.

Pipes and more pipes on Linux

Most people who spend time on the Linux command line move quickly into using pipes. In fact, pipes were one of the things that really got me excited when I first used the command line on a Unix system. My appreciation of their power and convenience continues even after decades of using Linux. Using pipes, I discovered how much I could get done by sending the output of one command to another command, and sometimes a command after that, to further tailor the output that I was looking for. Commands incorporating pipes – like the one shown below – allowed me to extract just the information that I needed without having to compile a program or prepare a script.To read this article in full, please click here

Pipes and more pipes on Linux

Most people who spend time on the Linux command line move quickly into using pipes. In fact, pipes were one of the things that really got me excited when I first used the command line on a Unix system. My appreciation of their power and convenience continues even after decades of using Linux. Using pipes, I discovered how much I could get done by sending the output of one command to another command, and sometimes a command after that, to further tailor the output that I was looking for. Commands incorporating pipes – like the one shown below – allowed me to extract just the information that I needed without having to compile a program or prepare a script.To read this article in full, please click here

Kyndryl taps Microsoft generative AI for new service, moves toward future profitability

Kyndryl said it would tap into Microsoft’s enterprise-grade generative AI technology to develop business applications with Microsoft Cloud.The IT infrastructure provider announced the joint project with Microsoft on the heels of announcing significant 1Q 2024 earnings where Kyndryl executives said the company will return to profitability in the next year, at least a year ahead of what financial analysts predicted after the company spun out of IBM in November 2021.In addition, Kyndryl chairman and chief executive officer Martin Schroeter told analysts on the company’s first quarter financial call that he expects the company to return to revenue growth in calendar year 2025 and that the company will reach its medium-term profit goals – in what he called significant progress for a company that has been independent for only 6 quarters.To read this article in full, please click here

Introducing per hostname TLS settings — security fit to your needs

Introducing per hostname TLS settings — security fit to your needs
Introducing per hostname TLS settings — security fit to your needs

One of the goals of Cloudflare is to give our customers the necessary knobs to enable security in a way that fits their needs. In the realm of SSL/TLS, we offer two key controls: setting the minimum TLS version, and restricting the list of supported cipher suites. Previously, these settings applied to the entire domain, resulting in an “all or nothing” effect. While having uniform settings across the entire domain is ideal for some users, it sometimes lacks the necessary granularity for those with diverse requirements across their subdomains.

It is for that reason that we’re excited to announce that as of today, customers will be able to set their TLS settings on a per-hostname basis.

The trade-off with using modern protocols

In an ideal world, every domain could be updated to use the most secure and modern protocols without any setbacks. Unfortunately, that's not the case. New standards and protocols require adoption in order to be effective. TLS 1.3 was standardized by the IETF in April 2018. It removed the vulnerable cryptographic algorithms that TLS 1.2 supported and provided a performance boost by requiring only one roundtrip, as opposed to two. For a user to benefit from Continue reading

Top Security Benefits of Improving Network Resiliency

In this archived panel discussion sponsored by Absolute Software, Steve Fallin connects with Ariel Robinson and Sherelle Moore to deliver an in-depth conversation detailing the 'Security Benefits of Improving Network Resiliency' during our 'Network Resilience Boot Camp' presented by Data Center Knowledge and Network Computing. This excerpt is from our live 'Network Resilience Boot Camp' virtual event moderated by Bonnie D. Graham on June 29, 2023.

TSMC, NXP, Infineon and Bosch team up for German chip foundry

TSMC, Robert Bosch, Infineon and NXP will partner to form a new firm, the European Semiconductor Manufacturing Company, and open a nearly $11 billion chipmaking facility in Germany.ESMC, as the company will be known, will be aimed at providing necessary silicon for the automotive and industrial sectors, according to a statement issued Tuesday. The planned facility, which will be located in Dresden, will be able to produce 40,000 300mm silicon wafers per month, with each wafer able to produce hundreds of chips, depending on their specific design.The facility will use TSMC’s 28/22nm planar CMOS technology for larger semiconductor nodes, as well as 16/12 FinFET process for smaller ones. CMOS stands for complementary metal-oxide semiconductor, and is an older and more established fabrication technique, whereas FinFET, or fin field-effect transistor, enables the production of faster and more advanced processors.To read this article in full, please click here

Heavy Wireless 008: 3D Printing For Wireless Engineers

3D printing is a popular activity among wireless network engineers. Given that they deal with invisible, intangible radio waves all day, maybe it's no surprise they'd enjoy making things they can touch and feel. On today's Heavy Wireless we talk about why the wireless community enjoys 3D printing, and how engineers can make and use printed objects on the job--and at home.

The post Heavy Wireless 008: 3D Printing For Wireless Engineers appeared first on Packet Pushers.

Heavy Wireless 008: 3D Printing For Wireless Engineers

3D printing is a popular activity among wireless network engineers. Given that they deal with invisible, intangible radio waves all day, maybe it's no surprise they'd enjoy making things they can touch and feel. On today's Heavy Wireless we talk about why the wireless community enjoys 3D printing, and how engineers can make and use printed objects on the job--and at home.

Aruba plugs core enterprise SASE, SSE service protection directions

Aruba Networks is showing off some enhancements to its security platform – including new zero trust and sandboxing features – that promise to help customers advance fortification of their hybrid cloud and enterprise network environments.Hewlett Packard Enterprise’s network subsidiary is also detailing the progress it has made in integrating the security technology from its March purchase of Axis Security into Aruba’s security service edge (SSE) platform with Aruba's SD-WAN and Secure Access Services Edge (SASE) offerings.Some of the new features and directions will be demoed and discussed as part of Aruba’s presence at this week’s Black Hat 2023 event which will focus on everything security including AI, automation and threat intelligence issues.To read this article in full, please click here

Aruba plugs core enterprise SASE, SSE service protection directions

Aruba Networks is showing off some enhancements to its security platform – including new zero trust and sandboxing features – that promise to help customers advance fortification of their hybrid cloud and enterprise network environments.Hewlett Packard Enterprise’s network subsidiary is also detailing the progress it has made in integrating the security technology from its March purchase of Axis Security into Aruba’s security service edge (SSE) platform with Aruba's SD-WAN and Secure Access Services Edge (SASE) offerings.Some of the new features and directions will be demoed and discussed as part of Aruba’s presence at this week’s Black Hat 2023 event which will focus on everything security including AI, automation and threat intelligence issues.To read this article in full, please click here

BrandPost: What’s the state of SASE?

By: Eve-Marie Lanza, Senior Security Solutions Marketing Manager at HPE Aruba Networking. SASE adoption among organizations is on the rise, according to research independently conducted by leading security research firm Ponemon Institute, sponsored by Hewlett Packard Enterprise.In the report, The 2023 Global Study on Closing the IT Security Gap: Addressing Cybersecurity Gaps from Edge to Cloud, 30% of organizations indicate they have adopted the Secure Access Service Edge (SASE) architecture. Nearly the same amount (29%) plan to deploy SASE.To read this article in full, please click here

A Look At Broadcom’s Jericho3-AI Ethernet Fabric: Schedules, Credits, And Cells

Broadcom has come up with some interesting mechanisms to address the challenges of building an Ethernet-based fabric that supports AI workloads. These mechanisms, which include a scheduling framework, cells, and credits, are intended to minimize congestion, latency, and dropped frames or packets in the fabric. In this post I talk about what I learned at […]

The post A Look At Broadcom’s Jericho3-AI Ethernet Fabric: Schedules, Credits, And Cells appeared first on Packet Pushers.

Grafana Network Weathermap

The screen capture above shows a simple network weathermap, displaying a network topology with links animated by real-time network analytics.
Hovering over a link in the weathermap pops up a trend chart showing traffic on the link over the last 30 minutes.

Deploy real-time network dashboards using Docker compose, describes how to quickly deploy a real-time network analytics stack that includes the sFlow-RT analytics engine, Prometheus time series database, and Grafana to create dashboards. This article describes how to extend the example using the Grafana Network Weathermap Plugin to display network topologies like the ones shown here.

First, add a dashboard panel and select the Network Weathermap visualization. Next define the three metrics shown above. The ifinoctets and ifoutoctets need to be scaled by 8 to convert from bytes per second to bits per second. Creating a custom legend entry makes it easier to select metrics to associate metric instances with weathermap links.
Add a color scale that will be used to color links by link utilization. Defining the scale first ensures that links will be displayed correctly when they are added later.
Add the nodes to the canvas and drag them to their desired locations. There is a Continue reading

Project Cybersafe Schools: Bringing security tools for free to small K-12 school districts in the US

Project Cybersafe Schools: Bringing security tools for free to small K-12 school districts in the US
Project Cybersafe Schools: Bringing security tools for free to small K-12 school districts in the US

Like other under-resourced organizations, schools face cyber attacks from malicious actors that can impact their ability to safely perform their basic function: teach children. Schools face email, phishing, and ransomware attacks that slow access and threaten leaks of confidential student data. And these attacks have real effects. In a report issued at the end of 2022, the U.S. Government Accountability Office concluded that schools serving kindergarten through 12th grade (K-12) reported significant educational impact and monetary loss due to cybersecurity incidents, such as ransomware attacks. Recovery time can extend from 2 all the way up to 9 months — that’s almost an entire school year.

Cloudflare’s mission is to help build a better Internet, and we have always believed in helping protect those who might otherwise not have the resources to protect themselves from cyberattack.

It is against this backdrop that we’re very excited to introduce an initiative aimed at small K-12 public school districts: Project Cybersafe Schools. Announced as part of the Back to School Safely: K-12 Cybersecurity Summit at the White House on August 8, 2023, Project Cybersafe Schools will support eligible K-12 public school districts with a package of Zero Trust cybersecurity solutions — for Continue reading