The post Presidential Palace Courtyard appeared first on rule 11 reader.
Data Center cyber security is a fast-moving target where the IT teams need to constantly stay ahead of those that wish to do evil things. As security attacks can come from all directions, externally, and internally as well, the IT teams must fortify all the data, with a zero-trust security approach. Perimeter security augmented with intrusion detection and protection at the application level are the tools of choice for most data centers. This protects outsiders from getting in, as well as ensuring that the applications do not get impacted by a virus or other forms of malicious activities.
What has not been addressed is the intercommunications of applications amongst themselves, especially within the hypervisor layer, where virtual machines are communicating in an East-West traffic pattern. Traffic never hits the perimeter, and the conversations are happening several layers below the application layers where IDS sits. East-west traffic, from within the data center, has been an area overlooked as there is a gap organizationally. Simply put no one is paying attention to this area of vulnerability. The network infrastructure security teams are fortifying the perimeter, while the server teams are deploying IDS/IPS solutions. What has gone unnoticed is the East-West Continue reading
Todays Weekly Show episode is part 2 of the Packet Pushers Ask Me Anything series. We answer listener questions on certifications, skills development, imposter syndrome, and preferences for fighting giant ducks or small horses (we did say you could ask anything). The post Show 337: Ethan & Greg Ask Me Anything Part 2 appeared first on Packet Pushers.
DT joins the Industrial Data Space Association; Huawei and Intel sign MOU.
The post Worth Reading: Hijacking merchant accounts appeared first on rule 11 reader.
The cornerstone of SDN is making the network’s control logic centralized and software-based.