A locked-down Internet in Iran; Private pictures; More app choices; Returning the booty; Closing the divide.
The post The Week in Internet News: Iran Plans “Blanket Ban” of International Internet Services appeared first on Internet Society.
Open Source has proven instrumental in accelerating software development — providing developers with feature velocity, ease of customization, and quality reusable code. However, the open-source security landscape has clearly changed: it’s clear that the unwritten rule among the open-source community has expired, and open season on hacking open-source software projects has begun. Today’s threat actors have no qualms about injecting malicious code upstream as a way to target downstream applications. Developers need to recognize this new reality and rethink security across the software supply chain.
How did we get here? The push to accelerate digital transformation may be inadvertently introducing vulnerabilities into the software supply chain. Developers, under constant pressure to deliver new software to market faster, often rely on containerized open-source software and public repositories to meet dynamic, agile needs. According to Gartner, nearly three-quarters of global organizations will be running three or more containerized applications in their production environments by 2023. The Cloud Native Computing Foundation (CNCF) also confirmed a similar pattern in its survey, which found the use of containers in production has increased to 92 percent since 2019. With Kubernetes the dominant container orchestration solution, 32% of respondents in the CNCF survey indicated that security Continue reading
Your team likely uses more SaaS applications than you realize. The time your administrators spend vetting and approving applications sanctioned for use can suddenly be wasted when users sign up for alternative services and store data in new places. Starting today, you can use Cloudflare for Teams to detect and block unapproved SaaS applications with just two clicks.
SaaS applications save time and budget for IT departments. Instead of paying for servers to host tools — and having staff ready to monitor, upgrade, and troubleshoot those tools — organizations can sign up for a SaaS equivalent with just a credit card and never worry about hosting or maintenance again.
That same convenience causes a data control problem. Those SaaS applications sit outside any environment that you control; the same reason they are easy for your team is also a potential liability now that your sensitive data is kept by third parties. Most organizations keep this in check through careful audits of the SaaS applications being used. Depending on industry and regulatory impact, IT departments evaluate, approve, and catalog the applications they use.
However, users can intentionally or accidentally bypass those approvals. For example, if your organization Continue reading
After almost a decade of bickering and haggling (trust me, I got my scars to prove how the consensus building works), the authors of Operational Security Considerations for IPv6 Networks (many of them dear old friends I haven’t seen for way too long) finally managed to turn a brilliant document into an Informational RFC.
Regardless of whether you already implemented IPv6 in your network or believe it will never be production-ready (alongside other crazy stuff like vaccines) I’d consider this RFC a mandatory reading.
After almost a decade of bickering and haggling (trust me, I got my scars to prove how the consensus building works), the authors of Operational Security Considerations for IPv6 Networks (many of them dear old friends I haven’t seen for way too long) finally managed to turn a brilliant document into an Informational RFC.
Regardless of whether you already implemented IPv6 in your network or believe it will never be production-ready (alongside other crazy stuff like vaccines) I’d consider this RFC a mandatory reading.
In Crystal, code is imported with the require statement. Considerations The compiler combines all required files together. A file can be required more than once, but only the first require statement has any effect. The standard library on Linux is located in the ...continue reading
Hello my friend,
In the previous blogpost we covered the installation of Proxmox as a core platform for building open source virtualisation environment. Today we’ll continue this discussion and will show how to create a multi server cloud in order to better spread the load and provide resiliency for your applications.
1
2
3
4
5 No part of this blogpost could be reproduced, stored in a
retrieval system, or transmitted in any form or by any
means, electronic, mechanical or photocopying, recording,
or otherwise, for commercial purposes without the
prior permission of the author.
In many cases, Linux is a major driving power behind modern clouds. In fact, if you look across all current big clouds, such as Amazon Web Services, Google Cloud Platform, Microsoft Azure, you will see Linux everywhere: on servers and on network devices (e.g., data centre switches). Therefore, knowledge how to deal with Linux and how to automate it is crucial to be successful in automation current IT systems.
At our trainings, advanced network automation and automation with Nornir (2nd step after advanced network automation), we give you detailed knowledge of all the technologies relevant:
Today, my beloved Lenovo P14s Gen 1 had a "computer says noooooo" moment. Since purchasing this machine 6 months ago, it has been rock solid. Then, out of the blue it hits me with a rotating carousel of full screen colours: red, blue, green, white and black. OMG! This is my work...continue reading
Recently, I was trying to reset the root password on an EX2200. Following the normal process of entering single user mode did not work. In this post I will cover the workaround to reset the root password. The Issue On an EX2200/3200/3300/4200/4500/4550 running code version 15.1R1 -...continue reading
A new Internet exchange point will launch in Georgia in September. We look at the motivations for developing the IXP and plans for the future.
The post Georgia Prepares to Launch a New Internet Exchange Point appeared first on Internet Society.
More broadband, please: The Internet Society’s Israel Chapter has reached out to the Israeli government about a number of issues affecting the country’s broadband service. Commenting on a plan by telecom provider Bezeq to roll out fiber broadband to 80 percent of households in the country within six years, it said the Ministry of Communications should […]
The post Member News: Israel Chapter Pushes for Better Internet Access appeared first on Internet Society.
On today’s Heavy Networking, we drill into VMware’s vRealize Network Insight (vRNI) to learn how it provides end-to-end monitoring, how it uses flow records and other data sources, and its architecture. We’ll also discuss modeling/digital twin capabilities, and applying vRNI to security, troubleshooting, and other use cases. VMware is our sponsor.
The post Heavy Networking 593: Network Observability With VMware vRealize Network Insight (Sponsored) appeared first on Packet Pushers.
I was saddened to learn last week that one of my former coworkers passed away unexpectedly. Duane Mersman started at the same time I did at United Systems and we both spent most of our time in the engineering area working on projects. We worked together on so many things that I honestly couldn’t keep count of them if I tried. He’s going to be missed by so many people.
Duane was, in many ways, my polar opposite at work. I was the hard-charging young buck that wanted to learn everything there was to know about stuff in about a week and just get my hands dirty trying to break it and learn from my mistakes. If you needed someone to install a phone system next week with zero formal training or learn how iSCSI was supposed to operate based on notes sketched on the back of a cocktail napkin I was your nerd. That meant we could often get things running quickly. It also meant I spent a lot of time trying to figure out why things weren’t working. I left quite a few forehead-shaped dents in data center walls.
Duane was not any of those Continue reading