Archive

Category Archives for "Networking"

We Are None Of Us Imposters: An Allegory

Sitting in the conference room, I looked up at the whiteboard covered in a clever design. I hadn’t understood the design immediately, but then as my mentor explained it to me, I comprehended the brilliance of it.

“That was…that was clever. Really. Elegant even. I never would have come up with that on my own. I learned something from you today, and I appreciate it. Thanks for taking the time.”

“Oh, I can’t take credit for the design. I got most of it from this book here. If anything, the credit goes to the author.”

And so I took a look at the book, and searched online for the author’s name. Her information popped up in my browser, and I sent her an e-mail.

“Thanks for the design you recommended in your book. It’s very clever, and we’re going to be testing it for use in our company. I think you’ve solved some problems for us. We really appreciate it.”

After a few days, her reply came back.

“Naturally, I’m happy that the book is a benefit to you, but honestly, that design is a reflection of an interview I had with a research team. They did all the heavy lifting and Continue reading

Beyond Trust: privilege, vulnerability management available through Azure

Users of Azure cloud services have a new option for stopping the misuse of privileges as well as managing vulnerabilities through an alliance with Beyond Trust.Azure customers who buy Beyond Trust licenses can host PowerBroker, the company’s privileged access management (PAM) and its vulnerability management (VM) platform, Retina, in their Azure cloud instances.They can host BeyondSaaS perimeter vulnerability scanning in Azure as well. Both are available via the Azure Marketplace.These new services give Beyond Trust customers a third option for how they deploy PAM and VM. Before they could extend a local instance of Beyond Trust’s security to the Azure cloud via software connectors or deploy it within the cloud using software agents deployed on virtual machines there.To read this article in full or to leave a comment, please click here

Beyond Trust: privilege, vulnerability management available through Azure

Users of Azure cloud services have a new option for stopping the misuse of privileges as well as managing vulnerabilities through an alliance with Beyond Trust.Azure customers who buy Beyond Trust licenses can host PowerBroker, the company’s privileged access management (PAM) and its vulnerability management (VM) platform, Retina, in their Azure cloud instances.They can host BeyondSaaS perimeter vulnerability scanning in Azure as well. Both are available via the Azure Marketplace.These new services give Beyond Trust customers a third option for how they deploy PAM and VM. Before they could extend a local instance of Beyond Trust’s security to the Azure cloud via software connectors or deploy it within the cloud using software agents deployed on virtual machines there.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Speed up slow web pages with this simple trick

Increasing the size of images and text will speed up web page delivery, say scientists. This counter-intuitive idea has been put forward as a solution to latency in browser page loading.The reason the idea works, in theory at least, is that the larger image pushes subsequent, following images farther down the page and out of the browser’s work area. Consequently the browser has less to do, pulls less data and provides a faster delivery of content.The researchers, who are from Northwestern’s McCormick School of Engineering, say this fiendishly simple idea will work particularly well for developers working with airplane networks, where it will stop browsers struggling to load a page. Airplane Wi-Fi can be hindered by latency, they explain.To read this article in full or to leave a comment, please click here

UEFI flaws can be exploited to install highly persistent ransomware

Over the past few years, the world has seen ransomware threats advance from living inside browsers to operating systems, to the bootloader, and now to the low-level firmware that powers a computer's hardware components.Earlier this year, a team of researchers from security vendor Cylance demonstrated a proof-of-concept ransomware program that ran inside a motherboard's Unified Extensible Firmware Interface (UEFI) -- the modern BIOS.On Friday, at the Black Hat Asia security conference, the team revealed how they did it: by exploiting vulnerabilities in the firmware of two models of ultra compact PCs from Taiwanese computer manufacturer Gigabyte Technology.To read this article in full or to leave a comment, please click here

UEFI flaws can be exploited to install highly persistent ransomware

Over the past few years, the world has seen ransomware threats advance from living inside browsers to operating systems, to the bootloader, and now to the low-level firmware that powers a computer's hardware components.Earlier this year, a team of researchers from security vendor Cylance demonstrated a proof-of-concept ransomware program that ran inside a motherboard's Unified Extensible Firmware Interface (UEFI) -- the modern BIOS.On Friday, at the Black Hat Asia security conference, the team revealed how they did it: by exploiting vulnerabilities in the firmware of two models of ultra compact PCs from Taiwanese computer manufacturer Gigabyte Technology.To read this article in full or to leave a comment, please click here

Microsoft shutters CodePlex in favor of GitHub

Microsoft announced on Friday it is shutting down CodePlex, its code hosting site for open-source projects, in favor of the more widely used GitHub. The move is something of a formality, since Microsoft has already been transitioning its open-source projects to GitHub for some time and you never hear about CodePlex any more. The company has had problems with the site, with spammers hitting it in 2015 seeking to take advantage of the CodePlex.com domain to boost their illicit activities. And Microsoft admits over the past few years, it has watched many CodePlex projects migrate to GitHub. Brian Harry, a corporate vice president at Microsoft, wrote in his blog announcing the closing of CodePlex that there has been a substantial decrease in usage. To read this article in full or to leave a comment, please click here

Serverless computing in practice

Alpha Vertex is a year-old New York City startup with an ambitious agenda: It wants to create a graph database of global financial knowledge.CTO Michael Bishop says the goal is to use predictive modeling to help companies judge risk and investors get insight on what drives the market. To do so has required the company to build a massive technical back-end that uses some hottest emerging technologies. Two of the most important are Google’s cloud-based machine learning algorithms and IBM’s OpenWhisk, a serverless or Function-as-a-Service platform.+MORE AT NETWORK WORLD: Serverless explainer: The next-generation of cloud infrastructure +To read this article in full or to leave a comment, please click here

An NDSS Newcomer’s Perspective

[Editor’s Note: A limited number of student grants are available to help pay for travel, accommodations, and NDSS Symposium registration fees for full-time students attending the 24th annual Network and Distributed System Security (NDSS) Symposium. Watch the NDSS website at https://www.internetsociety.org/events/ndss-symposium for information and deadlines as the process opens for NDSS 2018 in February of next year. The following post is a guest contribution from one 2017 grantee.]

Muhammad Talha Paracha

Serverless explainer: The next generation of cloud infrastructure

The first thing to know about serverless computing is that "serverless" is a pretty bad name to call it.Contrary to the vernacular, the technology that has burst onto the cloud computing scene in the past two years still does in fact run on servers. The name serverless instead highlights the fact that end users don’t have to manage servers that run their code anymore.+MORE AT NETWORK WORLD: Serverless computing in practice | This company runs its app without managing servers or virtual machines +To read this article in full or to leave a comment, please click here

Distributed Denial of Service Open Threat Signaling (DOTS)

When the inevitable 2AM call happens—”our network is under attack”—what do you do? After running through the OODA loop (1, 2, 3, 4), used communities to distribute the attack as much as possible, mitigated the attack where possible, and now you realist there little you can do locally. What now? You need to wander out on the ‘net and try to figure out how to stop this thing. You could try to use flowspec, but many providers do not like to support flowspec, because it directly impacts the forwarding performance of their edge boxes. Further, flowspec, used in this situation, doesn’t really work to walk the attack back to its source; the provider’s network is still impact by the DDoS attack.

This is where DOTS comes in. There are four components of DOTS, as shown below (taken directly from the relevant draft)—

The best place to start is with the attack target—that’s you, at 6AM, after trying to chase this thing down for a few hours, panicked because the office is about to open, and your network is still down. Within your network there would also be a DOTS client; this would be a small piece of software running Continue reading

30% off Garmin Forerunner 230 Running and Activity Tracking Watch – Deal Alert

Forerunner 230 is a running watch and activity tracker with smart features. It records steps, even when you’re not running. Tracks distance, pace, time, heart rate and VO2 Max on your runs. And when paired to your phone see incoming email, text messages, call alerts, calendar reminders and more. Right now its $250 list price on Amazon has been reduced 30% down to $175.84. See it now and learn more on Amazon.To read this article in full or to leave a comment, please click here

Micro-segmentation projects span enterprise organizations

Micro-segmentation is nothing new. We starting talking about the concept a few years ago with the onset of software-defined networking (SDN) technologies such as OpenFlow. More recently, micro-segmentation was most often associated with establishing trusted connections between cloud-based workloads.Micro-segmentation is simply a new software-based spin on the old practice of network segmentation that organizations have done for years with a variety of technologies—firewalls, VLANs, subnets, switch-based access control lists (ACLs), etc. In fact, many organizations use a potpourri of some or even all of these technologies. According to ESG research:To read this article in full or to leave a comment, please click here

Micro-segmentation Projects Span Enterprise Organizations

Micro-segmentation is nothing new, we starting talking about the concept a few years ago, with the onset of software-defined networking technologies like OpenFlow.  More recently, micro-segmentation was most often associated with establishing trusted connections between cloud-based workloads.Micro-segmentation is simply a new software-based spin on the old practice of network segmentation which organizations have done for years with a variety of technologies – firewalls, VLANs, subnets, switch-based access control lists (ACLs) etc.  In fact, many organizations use a potpourri of some or even all of these technologies.  According to ESG research (note: I am an ESG employee)To read this article in full or to leave a comment, please click here

Micro-segmentation Projects Span Enterprise Organizations

Micro-segmentation is nothing new, we starting talking about the concept a few years ago, with the onset of software-defined networking technologies like OpenFlow.  More recently, micro-segmentation was most often associated with establishing trusted connections between cloud-based workloads.Micro-segmentation is simply a new software-based spin on the old practice of network segmentation which organizations have done for years with a variety of technologies – firewalls, VLANs, subnets, switch-based access control lists (ACLs) etc.  In fact, many organizations use a potpourri of some or even all of these technologies.  According to ESG research (note: I am an ESG employee):To read this article in full or to leave a comment, please click here