Archive

Category Archives for "Networking"

Introducing Cloudflare Orbit: A Private Network for IoT Devices

In October, we wrote about a 1.75M rps DDoS attack we mitigated on our network, launched by 52,467 unique IP’s, mostly hacked CCTV cameras.

We continued to see more IoT devices in DDoS attacks, and so we started to put together a security solution to protect the devices from becoming part of the botnet in the first place. Today we’re announcing it: Cloudflare Orbit.

PC-era security doesn’t work in IoT-era computing

As we talked to IoT companies, over and over again we heard the same thing. In the consumer electronics space, IoT manufacturers were telling us that they were shipping patches to their devices, but their end users didn’t always download and install them. (Reserve your judgment, how many times have you pressed ignore when your phone asked you to update its operating system?) In the industrial control, medical and automotive spaces, where devices are used in life-critical functions, we heard a different story. Even if someone wanted to apply a patch, it just wasn’t that easy. For example, even if the manager of a nuclear power plant wants to update software on their thermostats, shutting down operations long enough to do that means the update has to Continue reading

Visa Inc. Gains Speed and Operational Efficiency with Docker Enterprise Edition

DockerCon 2017 was an opportunity to hear from customers across multiple industries and segments on how they are leveraging Docker technology to accelerate their business. In the keynote on Day 2 and also a breakout session that afternoon, Visa shared how Docker Enterprise Edition is empowering them on their mission is to make global economies safer by digitizing currency and making electronic payments available to everyone, everywhere.

Docker Enterprise Edition at Visa 

Visa is the world’s largest retail electronic payment network that handles 130 billion transactions a year, processing $5.8 trillion annually. Swamy Kocherlakota, Global Head of Infrastructure and Operations, shared that Visa got here by expanding their global footprint which has put pressure on his organization which has remained mostly flat in headcount during that time. Since going into production with their Docker Containers-as-a-Service architecture 6 months ago, Mr. Kocherlakota has seen a 10x increase in scalability, ensuring that his organization will be able to support their overall mission and growth objectives well into the future.

Global Growth Fuels Need for A New Operating Model

In aligning his organization to the company mission, Swamy decided to focus on two primary metrics: Speed and Efficiency.

Cyberespionage, ransomware big gainers in new Verizon breach report

Verizon released its tenth annual breach report this morning, and cyberespionage and ransomware were the big gainers in 2016.Cyberspionage accounted for 21 percent of cases analyzed, up from 13 percent last year, and was the most common type of attack in the manufacturing, public sector, and education.In fact, in the manufacturing sector, cyberespionage accounted for 94 percent of all breaches. External actors were responsible for 93 percent of breaches, and, 91 percent of the time, the target was trade secrets.Meanwhile, the number of ransomware attacks doubled compared to the previous year.To read this article in full or to leave a comment, please click here

Cyberespionage, ransomware big gainers in new Verizon breach report

Verizon released its tenth annual breach report this morning, and cyberespionage and ransomware were the big gainers in 2016.Cyberspionage accounted for 21 percent of cases analyzed, up from 13 percent last year, and was the most common type of attack in the manufacturing, public sector, and education.In fact, in the manufacturing sector, cyberespionage accounted for 94 percent of all breaches. External actors were responsible for 93 percent of breaches, and, 91 percent of the time, the target was trade secrets.Meanwhile, the number of ransomware attacks doubled compared to the previous year.To read this article in full or to leave a comment, please click here

How Veritas is getting its cloud on

Bill Coleman, a 25-year veteran of the tech industry, became Veritas Technologies' CEO a little over a year ago. He's been leading the charge to help the software vendor transition from selling legacy point storage products to creating an integrated information-management platform. The goal is to provide something that's agnostic -- will work in the cloud or on-premises or both -- and that won't require customers to invest in a constant stream of upgrades to get there.I want to spend some more time talking about the cloud strategy and go into a little more depth on that. Before we do that, when you are finished rolling out this data management platform, how will that change the competitive landscape? Who will you view as your competitors at that point and how will it change the existing competitive relationships?To read this article in full or to leave a comment, please click here(Insider Story)

9 things your service provider wants you to know

The relationship between enterprise IT and service providers can be difficult. IT has frustrations in achieving optimal service levels. Service providers, as it turns out, have an equal number of bugaboos when it comes to their enterprise clients' readiness for and acceptance of provider intervention.We asked providers across a range of services what advice they can offer to smooth out some typical bumps in the road for their clients. Here's a look at what they had to say.1. Focus on the business users' needs, not the technology. One of the biggest mistakes that enterprise IT makes when engaging a service provider is focusing too much on finding technology to solve the problem instead of fully understanding the problem that needs to be solved.To read this article in full or to leave a comment, please click here

9 things your service provider wants you to know

The relationship between enterprise IT and service providers can be difficult. IT has frustrations in achieving optimal service levels. Service providers, as it turns out, have an equal number of bugaboos when it comes to their enterprise clients' readiness for and acceptance of provider intervention.We asked providers across a range of services what advice they can offer to smooth out some typical bumps in the road for their clients. Here's a look at what they had to say.1. Focus on the business users' needs, not the technology. One of the biggest mistakes that enterprise IT makes when engaging a service provider is focusing too much on finding technology to solve the problem instead of fully understanding the problem that needs to be solved.To read this article in full or to leave a comment, please click here

Foiled! 15 tricks to hold off the hackers

Malicious hackers have outsize reputations. They are über-geniuses who can guess any password in seconds, hack any system, and cause widespread havoc across multiple, unrelated networks with a single keystroke—or so Hollywood says. Those of us who fight hackers every day know the good guys are usually far smarter. Hackers simply have to be persistent.Each year, a few hackers do something truly new. But for the most part, hackers repeat the tried and true. It doesn’t take a supergenius to check for missing patches or craft a social engineering attack. Hacking by and large is tradework: Once you learn a few tricks and tools, the rest becomes routine. The truly inspired work is that of security defenders, those who successfully hack the hackers.To read this article in full or to leave a comment, please click here

Foiled! 15 tricks to hold off the hackers

Malicious hackers have outsize reputations. They are über-geniuses who can guess any password in seconds, hack any system, and cause widespread havoc across multiple, unrelated networks with a single keystroke—or so Hollywood says. Those of us who fight hackers every day know the good guys are usually far smarter. Hackers simply have to be persistent.Each year, a few hackers do something truly new. But for the most part, hackers repeat the tried and true. It doesn’t take a supergenius to check for missing patches or craft a social engineering attack. Hacking by and large is tradework: Once you learn a few tricks and tools, the rest becomes routine. The truly inspired work is that of security defenders, those who successfully hack the hackers.To read this article in full or to leave a comment, please click here

Federal CIOs tackle the next phase of cloud migration

The cloud has been the default setting in federal government IT for long enough now that most agencies have migrated over some basic operations like email, but that still leaves the hard work undone.After some quick wins -- moving relatively lightweight applications over to a cloud environment -- many federal CIOs are now trying to figure out what comes next. That requires a more challenging calculus and a nuanced evaluation of the agency's IT portfolio to determine what applications and systems really belong in the cloud."Agencies are struggling with that idea of how do they really in an affirmative sort of way adopt cloud technologies," Bill Zielinski, director of the Office of Strategic Programs at the General Services Administration, said during a recent panel discussion hosted by Federal News Radio. "It's one thing to find those kind of freestanding, low-hanging brand-new sorts of things to put in -- quote unquote -- the cloud, but when you really start talking about constituting your IT enterprise with a significant portion of it being cloud, they're struggling."To read this article in full or to leave a comment, please click here

10 ways to achieve ROI on a network solution

Measuring ROIImage by ThinkstockWith the advent of Bring Your Own Device (BYOD), WLAN network access to customers and visitors and virtualized systems, the demand for IP addresses has exploded. Small companies might have to manage more than 1,000 IP addresses and it is not unusual for larger companies to have 10,000 or more spread across many locations. Setting up and protecting the network infrastructure is a major challenge and needs to be even more sophisticated and dynamic than ever before.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Managing data by business objectives

Storage vendors pitch new systems in innumerable ways. Whether they tout performance claims about IOPS and low latency, protection, reliability, and security features or sell on convenience, capacity, cost, or even brand reputation, there are many options vendors can offer an IT team looking to fix a problem.Although these various abilities have been around for many years, they have long been confined to a storage-centric ecosystem. With the advent of advanced data management software, it finally becomes possible to shift to a data-centric architecture that enables IT admins to automatically align data with storage that meets enterprises’ business objectives.To read this article in full or to leave a comment, please click here

10 ways to achieve ROI on a network solution

Measuring ROIImage by ThinkstockWith the advent of Bring Your Own Device (BYOD), WLAN network access to customers and visitors and virtualized systems, the demand for IP addresses has exploded. Small companies might have to manage more than 1,000 IP addresses and it is not unusual for larger companies to have 10,000 or more spread across many locations. Setting up and protecting the network infrastructure is a major challenge and needs to be even more sophisticated and dynamic than ever before.To read this article in full or to leave a comment, please click here

10 ways to achieve ROI on a network solution

Measuring ROIImage by ThinkstockWith the advent of Bring Your Own Device (BYOD), WLAN network access to customers and visitors and virtualized systems, the demand for IP addresses has exploded. Small companies might have to manage more than 1,000 IP addresses and it is not unusual for larger companies to have 10,000 or more spread across many locations. Setting up and protecting the network infrastructure is a major challenge and needs to be even more sophisticated and dynamic than ever before.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Managing data by business objectives

Storage vendors pitch new systems in innumerable ways. Whether they tout performance claims about IOPS and low latency, protection, reliability, and security features or sell on convenience, capacity, cost, or even brand reputation, there are many options vendors can offer an IT team looking to fix a problem.Although these various abilities have been around for many years, they have long been confined to a storage-centric ecosystem. With the advent of advanced data management software, it finally becomes possible to shift to a data-centric architecture that enables IT admins to automatically align data with storage that meets enterprises’ business objectives.To read this article in full or to leave a comment, please click here

Latest OWASP Top 10 looks at APIs, web apps

The new release of the OWASP Top 10 list is out for public comment from the Open Web Application Security Project, and while most of it remains the same there are a couple of new additions, focusing on protections for web applications and APIs.To make room for the new items, a couple of older ones were either removed or merged into new items.The fact that the list hasn't changed much since its first release in 2003 is both good and bad, said Jeff Williams, CTO and co-founder at Contrast Security.To read this article in full or to leave a comment, please click here

Latest OWASP Top 10 looks at APIs, web apps

The new release of the OWASP Top 10 list is out for public comment from the Open Web Application Security Project, and while most of it remains the same there are a couple of new additions, focusing on protections for web applications and APIs.To make room for the new items, a couple of older ones were either removed or merged into new items.The fact that the list hasn't changed much since its first release in 2003 is both good and bad, said Jeff Williams, CTO and co-founder at Contrast Security.To read this article in full or to leave a comment, please click here

BlackBerry KeyOne to launch in US and Canada in late May

The BlackBerry KeyOne, an Android-based smartphone with a hardware keyboard, will be available in the U.S. and Canada from May 31, the phone's maker said Thursday.TCL Communications, the Chinese company that acquired rights to produce BlackBerry-brand handsets, originally had said the phone would go on sale in April, so the delay may disappoint potential users. This could be a bad time to test the patience of potential buyers, as Samsung and LG are both heavily promoting their new flagship handsets, the S8 and G6.To read this article in full or to leave a comment, please click here

BlackBerry KeyOne to launch in US and Canada in late May

The BlackBerry KeyOne, an Android-based smartphone with a hardware keyboard, will be available in the U.S. and Canada from May 31, the phone's maker said Thursday.TCL Communications, the Chinese company that acquired rights to produce BlackBerry-brand handsets, originally had said the phone would go on sale in April, so the delay may disappoint potential users. This could be a bad time to test the patience of potential buyers, as Samsung and LG are both heavily promoting their new flagship handsets, the S8 and G6.To read this article in full or to leave a comment, please click here