Firewalls are an essential part of network security, yet Gartner says 95% of all firewall breaches are caused by misconfiguration. In my work I come across many firewall configuration mistakes, most of which are easily avoidable. Here are five simple steps that can help you optimize your settings:
* Set specific policy configurations with minimum privilege. Firewalls are often installed with broad filtering policies, allowing traffic from any source to any destination. This is because the Network Operations team doesn’t know exactly what is needed so start with this broad rule and then work backwards. However, the reality is that, due to time pressures or simply not regarding it as a priority, they never get round to defining the firewall policies, leaving your network in this perpetually exposed state.
To read this article in full or to leave a comment, please click here
Martin Lund brings a semiconductor pedigree to the software company.
Q3 disappoints, but Ciena says the Cyan acquisition points to a strong SDN future.
Are white box switches less secure than proprietary alternatives like Juniper or Cisco switches?
Gregory Pickett, Founder of Hellfire Security, did a presentation about white box security during the last Black Hat conference, triggering a multitude of news articles which we will study in this post. Without dwelling on the author mixing ideas between SDN and White Box Networking (which is quite common these days – the title of the presentation is about SDN and the presentation is all about white box networking security) the security issues raised are real.
Those security issues are either network operating system (NOS) specific (which I will not comment on as none of them are related to PicOS), or Pre-Boot related (Bootkit). I will focus on the key issues relating to security of NOS boot loaders, specific to Open Networking / White Box Networking.
Rootkit and Bootkit
The typical goal of a malicious user is to install a rootkit on the device under attack. A rootkit is a collection of software designed to enable unauthorized access while masking its existence.
Because NOS’s protection mechanisms are becoming more elaborate, a new kind of attack came up. This type of attack bypasses all NOS security by Continue reading
Streamlining opex to unlock NFV capex savings.

The post Worth Reading: IWAN at Networking by Fish appeared first on 'net work.