Archive

Category Archives for "Networking"

Open source, programmability, and as-a-service to play a big role in future networks

Networks of the not-to-distant future could feature many more open-source software components, advanced programmability, and be delivered as-a-service, according to experts speaking at the Future:Net 2021 symposium.Attendees of the virtual event heard predictions from vendors such as Cisco, Google, and Microsoft as well as academics and analyst firms such as Gartner and 451 Research. Who's selling SASE, and what do you get? A key theme from many of the speakers was that networks and networking technology of the future will feature way more software controls and programmability than most enterprise customers see in their environments today. To read this article in full, please click here

Open source, programmability, and as-a-service to play a big role in future networks

Networks of the not-to-distant future could feature many more open-source software components, advanced programmability, and be delivered as-a-service, according to experts speaking at the Future:Net 2021 symposium.Attendees of the virtual event heard predictions from vendors such as Cisco, Google, and Microsoft as well as academics and analyst firms such as Gartner and 451 Research. Who's selling SASE, and what do you get? A key theme from many of the speakers was that networks and networking technology of the future will feature way more software controls and programmability than most enterprise customers see in their environments today. To read this article in full, please click here

Page Shield: Protect User Data In-Browser

Page Shield: Protect User Data In-Browser
Page Shield: Protect User Data In-Browser

Today we're excited to introduce Page Shield, a client-side security product customers can use to detect attacks in end-user browsers.

Starting in 2015, a hacker group named Magecart stole payment credentials from online stores by infecting third-party dependencies with malicious code. The infected code would be requested by end-user browsers, where it would execute and access user information on the web page. After grabbing the information, the infected code would send it to the hackers, where it would be resold or used to launch additional attacks such as credit card fraud and identity theft.

Since then, other targets of such supply chain attacks have included Ticketmaster, Newegg, British Airways, and more. The British Airways attack stemmed from the compromise of one of their self-hosted JavaScript files, exposing nearly 500,000 customers’ data to hackers. The attack resulted in GDPR fines and the largest class-action privacy suit in UK history. In total, millions of users have been affected by these attacks.

Writing secure code within an organization is challenging enough without having to worry about third-party vendors. Many SaaS platforms serve third-party code to millions of sites, meaning a single compromise could have devastating results. Page Shield helps customers monitor these potential Continue reading

Protecting Cloudflare Customers from BGP Insecurity with Route Leak Detection

Protecting Cloudflare Customers from BGP Insecurity with Route Leak Detection
Protecting Cloudflare Customers from BGP Insecurity with Route Leak Detection

Border Gateway Protocol (BGP) route leaks and hijacks can ruin your day — BGP is insecure by design, and incorrect routing information spreading across the Internet can be incredibly disruptive and dangerous to the normal functioning of customer networks, and the Internet at large. Today, we're excited to announce Route Leak Detection, a new network alerting feature that tells customers when a prefix they own that is onboarded to Cloudflare is being leaked, i.e., advertised by an unauthorized party. Route Leak Detection helps protect your routes on the Internet: it tells you when your traffic is going places it’s not supposed to go, which is an indicator of a possible attack, and reduces time to mitigate leaks by arming you with timely information.

In this blog, we will explain what route leaks are, how Cloudflare Route Leak Detection works, and what we are doing to help protect the Internet from route leaks.

What are route leaks and why should I care?

A route leak occurs when a network on the Internet tells the rest of the world to route traffic through their network, when the traffic isn’t supposed to go there normally. A great example of this Continue reading

Relative Speed of Public Cloud Orchestration Systems

When I was complaining about the speed (or lack thereof) of Azure orchestration system, someone replied “I tried to do $somethingComplicated on AWS and it also took forever

Following the “opinions are great, data is better” mantra (as opposed to “never let facts get in the way of a good story” supposedly practiced by some podcasters), I decided to do a short experiment: create a very similar environment with Azure and AWS.

I took simple Terraform deployment configuration for AWS and Azure. Both included a virtual network, two subnets, a route table, a packet filter, and a VM with public IP address. Here are the observed times:

Linux tricks to speed up your workday

One of the really nice things about working on the Linux command line is that you can get a lot of work done very quickly. With a handle on the most useful commands and some command-line savvy, you can take a lot of the tedium out of your daily work. This post will walk you through several handy tricks that can make your work load feel a little lighter and maybe be a little bit more enjoyable.Emptying files with > Any time you have an important file that you need to empty because it's become too large or the data is no longer needed, you can do that by using the command > filename. This is much faster than removing the file and recreating it with the original permissions. The > sign followed by the file name works the same as typing cat /dev/null > filename, but is wonderfully quick. It empties the file, but leaves permissions and ownership intact.To read this article in full, please click here

Linux tricks to speed up your workday

One of the really nice things about working on the Linux command line is that you can get a lot of work done very quickly. With a handle on the most useful commands and some command-line savvy, you can take a lot of the tedium out of your daily work. This post will walk you through several handy tricks that can make your work load feel a little lighter and maybe be a little bit more enjoyable.Emptying files with > Any time you have an important file that you need to empty because it's become too large or the data is no longer needed, you can do that by using the command > filename. This is much faster than removing the file and recreating it with the original permissions. The > sign followed by the file name works the same as typing cat /dev/null > filename, but is wonderfully quick. It empties the file, but leaves permissions and ownership intact.To read this article in full, please click here

Cloudflare’s New Magic WAN Is A Familiar Trick

Cloudflare is building out its network and security services offerings to compete with SASE and CASB providers. The new Magic WAN and Magic Firewall offerings let customers direct traffic from branch offices, remote workers, and data centers to Cloudlfare's infrastructure for WAN transport and security inspection.

The post Cloudflare’s New Magic WAN Is A Familiar Trick appeared first on Packet Pushers.

Scientists are working on a switch to help lower the cost of using quantum computers

As IT professionals know, enterprise server farms are huge energy consumers, and the larger they are, the more voracious their appetite.Quantum computing could help because it is not only supposed to solve complex problems exponentially faster than classical computing, it’s also supposed to do so while consuming less energy. However major barriers—such as creating the extremely low temperatures required to enable superconductivity that is used in quantum-computing components—stand in the way.[Get regularly scheduled insights by signing up for Network World newsletters.] Now researchers at MIT are working on a tiny device that could help enable quantum computing and drastically reduce server-farm costs. The roots of this device—made from a superconducting nanowire—stretch back to a similar concept developed in the mid-1950s by an MIT electrical engineer who died tragically young before his vision could become reality.To read this article in full, please click here

Scientists are working on a switch to help lower the cost of using quantum computers

As IT professionals know, enterprise server farms are huge energy consumers, and the larger they are, the more voracious their appetite.Quantum computing could help because it is not only supposed to solve complex problems exponentially faster than classical computing, it’s also supposed to do so while consuming less energy. However major barriers—such as creating the extremely low temperatures required to enable superconductivity that is used in quantum-computing components—stand in the way.[Get regularly scheduled insights by signing up for Network World newsletters.] Now researchers at MIT are working on a tiny device that could help enable quantum computing and drastically reduce server-farm costs. The roots of this device—made from a superconducting nanowire—stretch back to a similar concept developed in the mid-1950s by an MIT electrical engineer who died tragically young before his vision could become reality.To read this article in full, please click here

The Hedge 76: Frederico Lucifredi and the Taxonomy of Indecision

Decision making, especially in large organizations, fails in many interesting ways. Understanding these failure modes can help us cope with seemingly difficult situations, and learn how to make decisions better. On this episode of the Hedge, Frederico Lucifredi, Ethan Banks, and Russ White discuss Frederico’s thoughts on developing a taxonomy of indecision. You can find his presentation on this topic here.

download

Witness VMware Disrupt Enterprise Data Center Security at XFD5 

The security industry needs to wake up. Today’s attackers are too numerous and too determined to get caught by simple perimeter defenses. It’s no longer a matter of if an attack will be successful, it’s a matter of when. Security pros need to recognize this reality, stop using archaic detect and respond approaches to secure the enterprise, and start focusing on blocking the spread of attacks once they make that initial breach.  

Changing the industry won’t be easy. It will require a bold step  one that we believe we’ve taken at VMware with our distributed, software-defined approach to enterprise security. This approach gives us the ability to operationalize east-west security at scale, simplify the implementation of segmentation in just a few steps, and insert advanced threat prevention inside the data center. 

We’ll showcase these latest security advances on Thursday, March 25, starting at  at 2:00 pm PST. Broadcasting live around the world during Security Field Day 5 NSX security experts will run through simple, practical steps that security teams can take to meet Continue reading

Announcing Cloudflare’s Data Loss Prevention platform

Announcing Cloudflare’s Data Loss Prevention platform

Today, we’re excited to announce that your team can use Cloudflare’s network to build Zero Trust controls over the data in your enterprise - wherever it lives and however it moves.

Stopping data loss is difficult for any team and that challenge has become harder as users have left offices and data has left on-premise storage centers. Enterprises can no longer build a simple castle-and-moat around their data. Users now connect from any location on the planet to applications that live in environments outside of that enterprise’s control.

We have talked to hundreds of customers who have resorted to applying stopgap measures to try and maintain that castle-and-moat model in some form, but each of those band-aids slow down their users or drive up costs - or both. Almost all of the short-term options available combine point solutions that ultimately force traffic to backhaul through a central location.

Announcing Cloudflare’s Data Loss Prevention platform

Part of Cloudflare One, Cloudflare’s approach to data loss prevention relies on the same infrastructure and global network that accelerates user traffic to the Internet to also perform inline inspection against all traffic regardless of how it arrives on our network.

We also know that enterprises need more than just scanning Continue reading