Archive

Category Archives for "Networking"

Is your data center ready for generative AI?

Enterprise adoption of generative artificial intelligence (AI), which is capable of generating text, images, or other media in response to prompts, is in its early stages, but is expected to increase rapidly as organizations find new uses for the technology.“The generative AI frenzy shows no signs of abating,” says Gartner analyst Frances Karamouzis.  “Organizations are scrambling to determine how much cash to pour into generative AI solutions, which products are worth the investment, when to get started and how to mitigate the risks that come with this emerging technology.”To read this article in full, please click here

Is your data center ready for generative AI?

Enterprise adoption of generative artificial intelligence (AI), which is capable of generating text, images, or other media in response to prompts, is in its early stages, but is expected to increase rapidly as organizations find new uses for the technology.“The generative AI frenzy shows no signs of abating,” says Gartner analyst Frances Karamouzis.  “Organizations are scrambling to determine how much cash to pour into generative AI solutions, which products are worth the investment, when to get started and how to mitigate the risks that come with this emerging technology.”To read this article in full, please click here

Heavy Wireless 007: Why Networking And Security Convergence Is Important For Wireless Pros (Sponsored)

Wireless pros sit at the intersection of networking and security. On today's Heavy Wireless, sponsored by Fortinet, Keith Parsons and guest Ben Wilson discuss this convergence, why visibility into the WLAN and device identity are essential, how Fortinet integrates its Fortigate firewalls with wired and wireless neteworks for unified management and policy enforcement, and more.

The post Heavy Wireless 007: Why Networking And Security Convergence Is Important For Wireless Pros (Sponsored) appeared first on Packet Pushers.

Heavy Wireless 007: Why Networking And Security Convergence Is Important For Wireless Pros (Sponsored)

Wireless pros sit at the intersection of networking and security. On today's Heavy Wireless, sponsored by Fortinet, Keith Parsons and guest Ben Wilson discuss this convergence, why visibility into the WLAN and device identity are essential, how Fortinet integrates its Fortigate firewalls with wired and wireless neteworks for unified management and policy enforcement, and more.

Network giants unite to fight security risks

A group of industry stalwarts is banding together to help enterprises, services providers and telcos fight cyber foes.The Network Resilience Coalition includes AT&T, Broadcom, BT Group, Cisco Systems, Fortinet, Intel, Juniper Networks, Lumen Technologies, Palo Alto Networks, Verizon and VMware. Its aim is to deliver open and collaborative techniques to help improve the security of network hardware and software across the industry.The coalition was brought together under the Center for Cybersecurity Policy & Law, a nonprofit organization dedicated to improving the security of networks, devices and critical infrastructure. The Center has a broad security mission, but at least for now, it wants the Resilience group to focus on routers, switches and firewalls that are older, may have reached end-of-life vendor support, or have been overlooked for security patching or replacement. To read this article in full, please click here

Network giants unite to fight security risks

A group of industry stalwarts is banding together to help enterprises, services providers and telcos fight cyber foes.The Network Resilience Coalition includes AT&T, Broadcom, BT Group, Cisco Systems, Fortinet, Intel, Juniper Networks, Lumen Technologies, Palo Alto Networks, Verizon and VMware. Its aim is to deliver open and collaborative techniques to help improve the security of network hardware and software across the industry.The coalition was brought together under the Center for Cybersecurity Policy & Law, a nonprofit organization dedicated to improving the security of networks, devices and critical infrastructure. The Center has a broad security mission, but at least for now, it wants the Resilience group to focus on routers, switches and firewalls that are older, may have reached end-of-life vendor support, or have been overlooked for security patching or replacement. To read this article in full, please click here

Preventing Vulnerable Container Deployments with Admission Control

In a previous blog post, Hands-on guide: How to scan and block container images to mitigate SBOM attacks, we looked at how Software Supply Chain threats can be identified and assessed. The severity of these vulnerabilities determine the posture or scan result for an image i.e. Pass, Warning or Fail. The next question is “What can we do with these results?”. To improve the security posture to reduce attacks on your workload we must ensure that workloads have the fewest possible vulnerabilities and layer on configuration security with KSPM, egress controls, and microsegmentation.

In this post we will cover how the scan results can be leveraged to add an additional layer of protection during Deploy Time in application deployment lifecycles.

It’s worth noting that Calico’s Image Scanner is an offline binary which can be run locally. This means the Image Scanner can be baked into any existing Continuous Integration/Continuous Delivery(CI/CD) pipeline. For example, after an image has been built the image can be scanned by the Image Scanner in an Execution Environment. Here checks can be configured to prevent the image from being pushed to a registry should vulnerabilities be detected. This is effectively how image scanning Continue reading

The real risk of AI in network operations

OK, you used to worry about nuclear war, then pandemics, then maybe an asteroid hitting earth or the sun going nova. Now, some want you to add AI to the list of things to worry about, and yes, you should probably do that. I’d hold off on worrying that AI will end life on earth, but users themselves tell me that AI does pose some risks, particularly the current ultra-hot “generative AI” that ChatGPT popularized. That’s particularly true for those who want to apply it to network operations.I got input from 197 senior IT and network professionals over the last month, and none of them believed that AI could lead to the mass extinction of humanity. Well over half said that they hadn’t seen any crippling long-term downsides to AI use, and all of them said that their company used AI “somewhere.” Thirty-four offered real insight into the use of AI in network operations, and I think this group offers us the best look at AI in network missions.To read this article in full, please click here

How Cloudflare is staying ahead of the AMD Zen vulnerability known as “Zenbleed”

How Cloudflare is staying ahead of the AMD Zen vulnerability known as “Zenbleed”
How Cloudflare is staying ahead of the AMD Zen vulnerability known as “Zenbleed”

Google Project Zero revealed a new flaw in AMD's Zen 2 processors in a blog post today. The 'Zenbleed' flaw affects the entire Zen 2 product stack, from AMD's EPYC data center processors to the Ryzen 3000 CPUs, and can be exploited to steal sensitive data stored in the CPU, including encryption keys and login credentials. The attack can even be carried out remotely through JavaScript on a website, meaning that the attacker need not have physical access to the computer or server.

Cloudflare’s network includes servers using AMD’s Zen line of CPUs. We have patched our entire fleet of potentially impacted servers with AMD’s microcode to mitigate this potential vulnerability. While our network is now protected from this vulnerability, we will continue to monitor for any signs of attempted exploitation of the vulnerability and will report on any attempts we discover in the wild. To better understand the Zenbleed vulnerability, read on.

Background

Understanding how a CPU executes programs is crucial to comprehending the attack's workings. The CPU works with an arithmetic processing unit called the ALU. The ALU is used to perform mathematical tasks. Operations like addition, multiplication, and floating-point calculations fall under this category. The CPU's clock Continue reading

Tech Bytes: Need Those Packets? Palo Alto Networks Introduces Traffic Replication In SASE (Sponsored)

Today on the Tech Bytes podcast we talk about traffic replication in SASE environments. Our sponsor is Palo Alto Networks, and they’ve added a new capability in Prisma Access that lets you replicate and then store traffic sent to the Prisma Access cloud service. That replicated traffic can then be used for deep packet analysis, forensics, or network analysis. We’ll talk about how Prisma Access replicates traffic, use cases, and more.

The post Tech Bytes: Need Those Packets? Palo Alto Networks Introduces Traffic Replication In SASE (Sponsored) appeared first on Packet Pushers.

Tech Bytes: Need Those Packets? Palo Alto Networks Introduces Traffic Replication In SASE (Sponsored)

Today on the Tech Bytes podcast we talk about traffic replication in SASE environments. Our sponsor is Palo Alto Networks, and they’ve added a new capability in Prisma Access that lets you replicate and then store traffic sent to the Prisma Access cloud service. That replicated traffic can then be used for deep packet analysis, forensics, or network analysis. We’ll talk about how Prisma Access replicates traffic, use cases, and more.

Network Break 439: Ethernet Gets Ultra Injection For AI; Huawei Climbs The Patent Charts

This week on Network Break we discuss the launch of the Ultra Ethernet Consortium and its intention to revamp Ethernet to support AI and HPC workloads. We also cover NOS startup Arrcus pulling in a $65 million series D round, Fortinet launching big-iron firewalls, Huawei flexing its patent muscles in 5G and wireless, and more tech news.

The post Network Break 439: Ethernet Gets Ultra Injection For AI; Huawei Climbs The Patent Charts appeared first on Packet Pushers.

Nitel goes global with international network-as-a-service plans

Nitel’s newest service offering takes the company’s existing network-as-a-service out of North America and into the international market, as the company announces the availability of its SASE capabilities and NaaS to 34 global regions.Nitel’s key offering is a full as-a-service network, leveraging relationships with data carriers — wired or wireless — at the local level to deliver basic connectivity, and then fold that into a robust enterprise networking suite, complete with SASE and private networking. The idea is to provide a more or less out-of-the-box network product that allows small and medium-size companies to hand the vast majority of their connectivity issues off to Nitel, which manages configuration and provisioning. In addition, Nitel provides SASE-standard security features like antimalware sandboxing, zero trust network access, data loss prevention and content filtering.To read this article in full, please click here

Measuring the Internet’s pulse: trending domains now on Cloudflare Radar

Measuring the Internet's pulse: trending domains now on Cloudflare Radar
Measuring the Internet's pulse: trending domains now on Cloudflare Radar

In 2022, we launched the Radar Domain Rankings, with top lists of the most popular domains based on how people use the Internet globally. The lists are calculated using a machine learning model that uses aggregated 1.1.1.1 resolver data that is anonymized in accordance with our privacy commitments. While the top 100 list is updated daily for each location, typically the first results of that list are stable over time, with the big names such as Google, Facebook, Apple, Microsoft and TikTok leading. Additionally, these global big names appear for the majority of locations.

Today, we are improving our Domain Rankings page and adding Trending Domains lists. The new data shows which domains are currently experiencing an increase in popularity. Hence, while with the top popular domains we aim to show domains of broad appeal and of interest to many Internet users, with the trending domains we want to show domains that are generating a surge in interest.

Measuring the Internet's pulse: trending domains now on Cloudflare Radar

When we started looking at the best way to generate a list of trending domains, we needed to answer the following questions:

Worth Reading: MP-TCP in Hybrid Access Networks

Wouldn’t it be nice if your home router (CPE) could use DSL (or slow-speed fibre) and LTE connection at the same time? Even better: run a single TCP session over both links? The answer to both questions is YES, of course it could do that, if only your service provider would be interested in giving you that option.

We solved similar problems with multilink PPP in the networking antiquity, today you could use a CPE with an MP-TCP proxy combined with a Hybrid Access Gateway in the service provider network. For more details, read the excellent Increasing broadband reach with Hybrid Access Networks article by prof. Olivier Bonaventure and his team.