Archive

Category Archives for "Networking"

Threat Landscape Report – Threats Evading Perimeter Defenses

Today’s reality is that security breaches are a given. Sophisticated attackers are too numerous and too determined to get caught by perimeter defenses. A new VMware Threat Analysis Unit report bears this out. In North-by-South-West: See What Evaded Perimeter Defenses, the findings are clear: despite a cadre of perimeter defenses being deployed, malicious actors are actively operating in the network. The research presents a clear picture of how attackers evade perimeter detection, infect systems, and then attempt to spread laterally across the network to execute their objective.

Watch Chad Skipper, Global Security Technologist, provide an overview of the findings.

Key insights include:

  • The best offense is to evade defense: Threat actors’ first order of business is to evade detection. Evasion of defense systems is the most encountered MITRE ATT&CK ® tactic used by malware, followed by execution and discovery.
  • Email attacks lead the pack: Email continues to be used as the most common attack vector to gain initial access with more than four percent of all business emails analyzed contained a malicious component
  • ZIP-ing through defenses: More than half of all malicious artifacts analyzed were delivered by a Zip archive. Attackers have massively scaled up operations Continue reading

Avoiding Azure VNet Spaghetti With Virtual WAN feat. Microsoft’s Pierre Roman – Video

Pierre Roman talks Day Two Cloud podcast hosts Ned Bellavance & Ethan Banks through joining different Azure networks together, and how to avoid that spaghetti. You can listen to the full episode here. SO MUCH MORE FOR IT PROS at Packetpushers.net/subscribe. You can subscribe to the Packet Pushers’ YouTube channel for more videos as they […]

The post Avoiding Azure VNet Spaghetti With Virtual WAN feat. Microsoft’s Pierre Roman – Video appeared first on Packet Pushers.

Humanity wastes about 500 years per day on CAPTCHAs. It’s time to end this madness

Humanity wastes about 500 years per day on CAPTCHAs. It’s time to end this madness
Humanity wastes about 500 years per day on CAPTCHAs. It’s time to end this madness

Select all the buses. Click on bikes. Does this photo have traffic lights? As ridiculous as these questions are, you’re almost guaranteed to have seen one recently. They are a way for online services to separate humans from bots, and they’re called CAPTCHAs. CAPTCHAs strengthen the security of online services. But while they do that, there’s a very real cost associated with them.

Based on our data, it takes a user on average 32 seconds to complete a CAPTCHA challenge. There are 4.6 billion global Internet users. We assume a typical Internet user sees approximately one CAPTCHA every 10 days.

This very simple back of the envelope math equates to somewhere in the order of 500 human years wasted every single day — just for us to prove our humanity.

Today, we are launching an experiment to end this madness. We want to get rid of CAPTCHAs completely. The idea is rather simple: a real human should be able to touch or look at their device to prove they are human, without revealing their identity. We want you to be able to prove that you are human without revealing which human you are! You may ask if this is Continue reading

AMD chips keep claiming more of the server market

AMD saw another quarter of outstanding growth in sales of its server chips, giving the company its highest single-quarter gain for server CPUs since 2006 and eating into Intel’s most valuable market segment, according to the latest market report from Mercury Research.We’ll get to the desktop segment later, but AMD’s server CPU share grew 1.8 percentage points from Q4 2020 to Q1 2021, from 7.1% to 8.9%. That is astonishing as server numbers just don’t move like that so quickly. In the same single-quarter period, Intel slipped 1.8 percentage points, from 92.9% to 91.1%.[Get regularly scheduled insights by signing up for Network World newsletters.] There is seasonality in the server market, where it is normal for sales to go down in Q1, Dean McCarron, president of Mercury Research, told me. Cloud-server companies like AWS and Google go through a build/burn cycle where they buy a lot, then take time to deploy it all. Right now we are at the very bottom of build cycle where they buy the least amount, so if they are putting up these kinds of numbers during a low point, it will be even better when they Continue reading

AMD chips keep claiming more of the server market

AMD saw another quarter of outstanding growth in sales of its server chips, giving the company its highest single-quarter gain for server CPUs since 2006 and eating into Intel’s most valuable market segment, according to the latest market report from Mercury Research.We’ll get to the desktop segment later, but AMD’s server CPU share grew 1.8 percentage points from Q4 2020 to Q1 2021, from 7.1% to 8.9%. That is astonishing as server numbers just don’t move like that so quickly. In the same single-quarter period, Intel slipped 1.8 percentage points, from 92.9% to 91.1%.[Get regularly scheduled insights by signing up for Network World newsletters.] There is seasonality in the server market, where it is normal for sales to go down in Q1, Dean McCarron, president of Mercury Research, told me. Cloud-server companies like AWS and Google go through a build/burn cycle where they buy a lot, then take time to deploy it all. Right now we are at the very bottom of build cycle where they buy the least amount, so if they are putting up these kinds of numbers during a low point, it will be even better when they Continue reading

Does Small Packet Forwarding Performance Matter in Data Center Switches?

TL&DR: No.

Here’s another never-ending vi-versus-emacs-type discussion: merchant silicon like Broadcom Trident cannot forward small (64-byte) packets at line rate. Does that matter, or is it yet another stimulating academic talking point and/or red herring used by vendor marketing teams to justify their high prices?

Here’s what I wrote about that topic a few weeks ago:

VMware picks an in-house exec for its new CEO

VMware says its COO for products and cloud services, Raghu Raghuram, will be its next permanent CEO, a signal that the company’s board intends to keep VMware on its present course.When Raghuram takes the reins in June, it will end a four-month interregnum, during which the company has been helmed by CFO Zane Rowe. Former CEO Pat Gelsinger became the CEO at Intel in February, returning to the company where he had worked for 30 years.VMware is the unquestioned 800-pound gorilla of the enterprise hypervisor market and has pursued both internal technology development and a succession of strategic acquisitions to diversify its business. The company’s hypervisor business, buttressed by deals with AWS, Azure, Google Cloud and other hyperscalers to provide its core products as cloud services, is still the main revenue stream. But VMware also plays in security, containerization, and cloud-native applications.To read this article in full, please click here

VMware picks an in-house exec for its new CEO

VMware says its COO for products and cloud services, Raghu Raghuram, will be its next permanent CEO, a signal that the company’s board intends to keep VMware on its present course.When Raghuram takes the reins in June, it will end a four-month interregnum, during which the company has been helmed by CFO Zane Rowe. Former CEO Pat Gelsinger became the CEO at Intel in February, returning to the company where he had worked for 30 years.VMware is the unquestioned 800-pound gorilla of the enterprise hypervisor market and has pursued both internal technology development and a succession of strategic acquisitions to diversify its business. The company’s hypervisor business, buttressed by deals with AWS, Azure, Google Cloud and other hyperscalers to provide its core products as cloud services, is still the main revenue stream. But VMware also plays in security, containerization, and cloud-native applications.To read this article in full, please click here

IT vendors push on-prem, pay-per-use hardware

A flurry of announcements from hardware vendors points to a change in how enterprises are purchasing servers, storage and networking resources for their data centers and edge deployments.To entice companies to keep workloads on premises, hardware vendors including Cisco, Dell, HPE, IBM, Lenovo and others are offering consumption-based pricing for data-center infrastructure. These pay-per-use products are designed to shorten procurement cycles, allow customers to scale up or down with demand, and more economically link hardware spending with usage.HPE, for example, pledged to transform its entire portfolio to pay-per-use and as-a-service offerings by 2022, and last week, the company added to its GreenLake lineup with new data services and infrastructure. Dell, for its part, unveiled the first products in its Apex portfolio of managed storage, servers, and hyperconverged infrastructure.To read this article in full, please click here

IT vendors push on-prem, pay-per-use hardware

A flurry of announcements from hardware vendors points to a change in how enterprises are purchasing servers, storage and networking resources for their data centers and edge deployments.To entice companies to keep workloads on premises, hardware vendors including Cisco, Dell, HPE, IBM, Lenovo and others are offering consumption-based pricing for data-center infrastructure. These pay-per-use products are designed to shorten procurement cycles, allow customers to scale up or down with demand, and more economically link hardware spending with usage.HPE, for example, pledged to transform its entire portfolio to pay-per-use and as-a-service offerings by 2022, and last week, the company added to its GreenLake lineup with new data services and infrastructure. Dell, for its part, unveiled the first products in its Apex portfolio of managed storage, servers, and hyperconverged infrastructure.To read this article in full, please click here

Day Two Cloud 097: Azure Cloud Networking Essentials

Today's Day Two Cloud podcast explores essential networking capabilities in Azure, including Virtual WAN, VPN gateways, availability zones, SSL termination options, connecting premises and branch offices to the cloud, and more. Our guest is Pierre Roman, Sr Cloud Ops Advocate at Microsoft. This is not a sponsored episode.

The post Day Two Cloud 097: Azure Cloud Networking Essentials appeared first on Packet Pushers.

Highly available and highly scalable Cloudflare tunnels

Highly available and highly scalable Cloudflare tunnels
Highly available and highly scalable Cloudflare tunnels

Starting today, we’re thrilled to announce you can run the same tunnel from multiple instances of cloudflared simultaneously. This enables graceful restarts, elastic auto-scaling, easier Kubernetes integration, and more reliable tunnels.

What is Cloudflare Tunnel?

I work on Cloudflare Tunnel, a product our customers use to connect their services and private networks to Cloudflare without poking holes in their firewall. Tunnel connections are managed by cloudflared, a tool that runs in your environment and connects your services to the Internet while ensuring that all its traffic goes through Cloudflare.

Say you have some local service (a website, an API, or a TCP server), and you want to securely expose it to the Internet using a Cloudflare Tunnel. First, download cloudflared, which is a “connector” that connects your local service to the Internet through Cloudflare. You can then connect that service to Cloudflare and generate a DNS entry with a single command:

cloudflared tunnel create --name mytunnel --url http://localhost:8080 --hostname example.com

This creates a tunnel called “mytunnel”, and configures your DNS to map example.com to that tunnel. Then cloudflared connects to the Cloudflare network. When the Cloudflare network receives an incoming request for example.com, it looks up Continue reading

Multi-Cloud Connectivity and Security Needs of Kubernetes Applications

Application initiatives are driving better business outcomes, an elevated customer experience, innovative digital services, and the anywhere workforce. Organizations surveyed by VMware report that 90% of app initiatives are focused on modernization(1). Using a container-based microservices architecture and Kubernetes, app modernization enables rapid feature releases, higher resiliency, and on-demand scalability. This approach can break apps into thousands of microservices deployed across a heterogeneous and often distributed environment. VMware research also shows 80% of surveyed customers today deploy applications in a distributed model across data center, cloud, and edge(2).

Enterprises are deploying their applications across multiple clusters in the data center and across multiple public or private clouds (as an extension of on-premises infrastructure) to support disaster avoidance, cost reduction, regulatory compliance, and more.

Applications Deployed in a Distributed Model

Fig 1: Drivers for Multi-Cloud Transformation 

The Challenges in Transitioning to Modern Apps 

While app teams can quickly develop and validate Kubernetes applications in dev environments, a very different set of security, connectivity, and operational considerations awaits networking and operations teams deploying applications to production environments. These teams face new challenges as they transition to production with existing applications — even more so when applications are distributed across multiple infrastructures, clusters, and clouds. Continue reading

6 Linux command-line tricks for fewer keystrokes

Linux commands offer a lot of flexibility. This post details some ways to make them even more convenient to use by making use of some clever tricks.Using file-name completion You can avoid typing a full file name by typing the beginning of its name and pressing the tab key. If the string uniquely identifies a file, doing this will complete the filename. Otherwise, you can enter another letter in the name and press tab again. However, you can also get a list of all files that begin with a particular string by typing the string and then hitting the tab key twice. In this example, we do both:$ ls di<tab><tab> diff-commands dig.1 directory dig.2 dimensions disk-usage-commands $ cd dir<tab> $ pwd directory [Find out how MINNIX was used as the inspiration for Linux.]   Reusing commands and changing them Reissuing recently used commands is easy in bash. To rerun the previous command, all you have to do it type !! on the command line. You can also reissue a command with changes. If you issued the first command shown below only to find that sshd wasn't running, you could issue the second command to start it. Continue reading

6 clever command-line tricks for fewer keystrokes

Linux commands offer a lot of flexibility. This post details some ways to make them even more convenient to use by making use of some clever tricks.Using file-name completion You can avoid typing a full file name by typing the beginning of its name and pressing the tab key. If the string uniquely identifies a file, doing this will complete the filename. Otherwise, you can enter another letter in the name and press tab again. However, you can also get a list of all files that begin with a particular string by typing the string and then hitting the tab key twice. In this example, we do both:$ ls di<tab><tab> diff-commands dig.1 directory dig.2 dimensions disk-usage-commands $ cd dir<tab> $ pwd directory [Find out how MINNIX was used as the inspiration for Linux.]   Reusing commands and changing them Reissuing recently used commands is easy in bash. To rerun the previous command, all you have to do it type !! on the command line. You can also reissue a command with changes. If you issued the first command shown below only to find that sshd wasn't running, you could issue the second command to start it. Continue reading

6 Linux command-line tricks for fewer keystrokes

Linux commands offer a lot of flexibility. This post details some ways to make them even more convenient to use by making use of some clever tricks.Using file-name completion You can avoid typing a full file name by typing the beginning of its name and pressing the tab key. If the string uniquely identifies a file, doing this will complete the filename. Otherwise, you can enter another letter in the name and press tab again. However, you can also get a list of all files that begin with a particular string by typing the string and then hitting the tab key twice. In this example, we do both:$ ls di<tab><tab> diff-commands dig.1 directory dig.2 dimensions disk-usage-commands $ cd dir<tab> $ pwd directory [Find out how MINNIX was used as the inspiration for Linux.]   Reusing commands and changing them Reissuing recently used commands is easy in bash. To rerun the previous command, all you have to do it type !! on the command line. You can also reissue a command with changes. If you issued the first command shown below only to find that sshd wasn't running, you could issue the second command to start it. Continue reading