Archive

Category Archives for "Networking"

Tech Bytes: Getting A Full-Fidelity View Of Network Security With Riverbed (Sponsored)

On today's Tech Bytes we discuss the essential role that visibility plays in network security. Riverbed is our sponsor. We explore how Riverbed brings together logs, flow records, and packet capture to provide a full-fidelity view from multiple angles to help you respond to analyze security events. Our guests are Marco Di Benedetto, SVP and CTO; and Vincent Berk, VP and Chief Architect for Security at Riverbed.

Tech Bytes: Getting A Full-Fidelity View Of Network Security With Riverbed (Sponsored)

On today's Tech Bytes we discuss the essential role that visibility plays in network security. Riverbed is our sponsor. We explore how Riverbed brings together logs, flow records, and packet capture to provide a full-fidelity view from multiple angles to help you respond to analyze security events. Our guests are Marco Di Benedetto, SVP and CTO; and Vincent Berk, VP and Chief Architect for Security at Riverbed.

The post Tech Bytes: Getting A Full-Fidelity View Of Network Security With Riverbed (Sponsored) appeared first on Packet Pushers.

Verizon Warns of Rising Enterprise Mobile Security Risk

The operator’s third annual survey on mobile security concluded that 43% of respondents believe...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Cisco SecureX Unifies Network, Cloud, Endpoint Security

Cisco’s 2020 CISO Benchmark Study found that 28% of security professionals say that managing a...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Network Break 272: Dell Technologies Sells RSA; Nubeva Cracks TLS 1.3 With Out-Of-Band Decryption

The latest Network Break podcast analyzes Dell Technologies' sale of its RSA business unit; what sponsor cancellations at the RSA Conference might mean for large tech events going forward; Arista Networks' financial results; new capabilities in products from ExtraHop, Nubeva, and Spirent; and more tech news.

The post Network Break 272: Dell Technologies Sells RSA; Nubeva Cracks TLS 1.3 With Out-Of-Band Decryption appeared first on Packet Pushers.

Leading Japan to a Better Future with KCME’s Hyungbae Kim

We hear from KCME's Hyungbae Kim on his work on mobile development to create a more sustainable and...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

The Week in Internet News: ISPs Sue Maine Over New Privacy Law

Protesting privacy: Four ISP trade groups are suing the state of Maine for a privacy law that goes into effect this year, Ars Technica reports. Among other things, the law supposedly violates ISP free speech rights because it limits their ability to advertise to their customers and to offer discounts in exchange for customers’ personal information. The Maine law requires ISPs to get customers’ opt-in consent before using or sharing sensitive data.

DSL over fiber: The California Advanced Services Fund, a program launched in 2008 to connect all Californians to broadband, was an early success, but recent actions in the state legislature have encouraged slow speeds of 6 Mbps and eliminated the fund’s ability to serve public housing already served by slow DSL service, the EFF says in a blog post. “By establishing an abysmally low standard based on DSL technology that made its debut more than a decade ago, the state’s regulator is forced to conclude that basically everyone has useful broadband access today,” the EFF says. “This has kept the state from closing the digital divide.”

It’s getting better: Nigeria is making great strides in getting residents connected to the Internet, the BBC reports. More than Continue reading

Intel Doubles Down on 5G, Edge, and Data Center

Intel had projected that it would be the leader in base station silicon by 2022, but is now...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

RSA Caps Chronicle’s Rollercoaster Ride to Google Cloud

At the annual security event, Google Cloud rolled out new security features including threat...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Cloudflare’s Gen X: Servers for an Accelerated Future

Cloudflare’s Gen X: 
Servers for an Accelerated Future
“Every server can run every service.”
Cloudflare’s Gen X: 
Servers for an Accelerated Future

We designed and built Cloudflare’s network to be able to grow capacity quickly and inexpensively; to allow every server, in every city, to run every service; and to allow us to shift customers and traffic across our network efficiently. We deploy standard, commodity hardware, and our product developers and customers do not need to worry about the underlying servers. Our software automatically manages the deployment and execution of our developers’ code and our customers’ code across our network. Since we manage the execution and prioritization of code running across our network, we are both able to optimize the performance of our highest tier customers and effectively leverage idle capacity across our network.

An alternative approach might have been to run several fragmented networks with specialized servers designed to run specific features, such as the Firewall, DDoS protection or Workers. However, we believe that approach would have resulted in wasted idle resources and given us less flexibility to build new software or adopt the newest available hardware. And a single optimization target means we can provide security and performance at the same time.

We use Anycast to route a web request to the Continue reading

Juniper Fuses AI, Connected Security at RSA

It’s also getting a little bit SASE with its secure SD-WAN, but executives say they’ll talk...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

BrandPost: Why Network Segmentation Matters

When IT leaders hear about segmentation, their first thought is usually about dividing a network up using VLANs or VXLANs. But segmentation also plays a critical security role in securing dynamic multi-cloud environments, IoT and BYOD strategies, and automated workflows in today’s highly distributed environments.Digital Innovation is disrupting enterprise organizations, adding new networks such as dynamic multi-cloud to enable new services and business opportunities. However, these new environments also create increased risk. The explosive adoption of IoT and mobile devices, as well as applications and services from multiple clouds, are pushing the attack surface beyond the traditional network boundaries. And because workflows, applications, and transactions have to span all of these new environments, traditional network-based segmentation strategies stop at the edge of each network environment without putting cumbersome and complex solutions in place.To read this article in full, please click here

BrandPost: Innovation, customer-centric philosophy makes Huawei a trusted partner

The need to stay connected anytime, anywhere has led to connectivity being one of the core elements of large campuses and public spaces. In recent years, the development only goes faster, where world-class infrastructure is gradually getting well-equipped with the right settings to keep people online. This leads to the exponential growth on the demand for excellent network coverage with extremely low latency.Let’s take St. Jakob Park as an example. As the home field of FC Basel, St. Jakob Park is Switzerland’s largest football stadium, with the requirement to keep 40,000 visitors, spectator stand, shops, and parking lots connected with large bandwidth, high concurrency, and low latency. The Park needs an advanced Wi-Fi network that delivers full wireless coverage and achieves secure connections.To read this article in full, please click here

AT&T, Raytheon, Armis Join Open Cybersecurity Alliance

The group also today made available OpenDXL Ontology, which it says is the first open source...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Automation Story: Add a Web UI

Imagine you followed the steps taken by Anne Baretta and stored network inventory into a database. What could you do with that information (apart from creating reports)? How about adding a web UI to help less-skilled network operators perform automated tasks?

Notes

  • While we won’t tell you how to build a web UI in our network automation course, we will tell you how to build a system out of numerous components (and what components you might need).

Automation Story: Add a Web UI

Imagine you followed the steps taken by Anne Baretta and stored network inventory into a database. What could you do with that information (apart from creating reports)? How about adding a web UI to help less-skilled network operators perform automated tasks?

Notes

  • While we won’t tell you how to build a web UI in our network automation course, we will tell you how to build a system out of numerous components (and what components you might need).

20 years of maintaining an open source program

It’s been almost 10 years since my previous post about this. And 20 years since 2000-02-24, which is when arping 0.1 was released. It was a 208 line C file, with a hand made Makefile.

As of today when Arping 2.21 is overdue to be released, the code in .c and .h files (excluding tests) is 3863 lines, and it uses the amazing autotools framework for analyzing dependencies.

I’ve recently had the displeasure of working with cmake, which is just the worst. Why anyone would think cmake is even remotely acceptable I’ll never understand.

CMake sucks

But the Arping story continues. It isn’t getting many new major features. Still, since the last post there’s been 205 commits, and 10 releases.

Things like:

  • Change from gettimeofday() to clock_gettime(), when available. More info about that in this blog post.
  • Don’t check for uid=0 and stop. Capabilities can come in other ways
  • Change from poll() to select() to work around bug in MacOS X
  • Use nice and modern getifaddrs() to resolve interfaces
  • Update documentation
  • Improve error messages
  • Update author email address
  • Fix warnings and general code cleanup
  • Used coverity to find and fix suspicious code
  • Add some more stats to output
  • Continue reading

Managed 4G/5G service connects to Amazon, Microsoft clouds

Federated Wireless is launching a turnkey 4G/5G service through a partnership with Amazon Web Services and  Microsoft Azure that runs over Citizens Broadband Radio Service (CBRS), which the Federal Communications Commission opened up to public use in January.The idea is pretty simple: Federated’s new connectivity-as-a-service offering can be purchased directly through both the AWS Marketplace and Azure for a monthly fee. The company’s consultants and engineers do a walkthrough or site survey, ship CBRS equipment, install it on the customer’s network and monitor and manage the system afterwards.To read this article in full, please click here