Archive

Category Archives for "Networking"

Network Break 266: Accenture Buys Symantec Security Services Biz; Cisco Reorganizes Around Intent-Based Networking

Today's Network Break analyzes an HPE/Cumulus Networks deal on Ethernet storage switches, yet another open-source network OS project from the Linux Foundation, Accenture's purchase of Symantec's security services biz from Broadcom, a Cisco reorganization of its enterprise networking businesses, and more tech and IT news.

The post Network Break 266: Accenture Buys Symantec Security Services Biz; Cisco Reorganizes Around Intent-Based Networking appeared first on Packet Pushers.

BGP in 2019

It has become a tradition each January for me to report on the behaviour of the inter-domain routing system over the past year, looking in some detail at some metrics from the routing system that can show the essential shape and behaviour of the underlying interconnection fabric of the Internet.

Daily Roundup: Citrix Bug Gets Uglier

The bug impacts Citrix's ACD platform; Samsung acquired TeleWorld to boost its U.S. RAN efforts;...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Vodafone UK Activates 5G Multi-Operator RAN

5G network sharing deals have gained momentum as carriers look to decrease the cost of deploying...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

BrandPost: Survey Says End-to-End NVMe™ is in Your Future

There’s always an adoption curve when it comes to new technologies. In today’s digital landscape, where industries are constantly being disrupted by new applications and use cases driven by IoT, machine learning, AI, and analytics, those not on the NVMe™ adoption curve may get left behind. Simply put, IT managers must design for the future.Today, many IT organizations have started embracing NVMe for its high performance and low latency— and as a better alternative to legacy protocols such as SATA for accessing flash storage. But for others, the question is not “if,” but “when” you will bring NVMe into your organization.To read this article in full, please click here

LogicMonitor Gobbles Up AIOps Provider Unomaly

Unomaly's technology will allow users to proactively take action before network disruptions impact...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

SK Telecom Launches APAC-Focused MEC Task Force

The group will share its work on 5G and MEC including working toward international MEC standards to...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Samsung Taps TeleWorld Solutions to Elevate US 5G RAN

Samsung has earned 5G RAN contracts in the U.S. with Verizon, AT&T, and Sprint, but is behind...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Citrix ACD, Gateway Bug Gets Even Uglier

Over the weekend two groups released proof-of-concept (PoC) exploit codes for this vulnerability on...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Tech Bytes: Cushman & Wakefield Taps Silver Peak SD-WAN For Cloud-First Goals (Sponsored)

On today's Tech Bytes podcast, sponsored by Silver Peak, we talk with Cushman & Wakefield about how the global real estate company is using SD-WAN to enable its cloud-first goals. Our guest is Chris Butcher, Platform Architect, Global Networks, Cloud and Perimeter Security at Cushman & Wakefield.

The post Tech Bytes: Cushman & Wakefield Taps Silver Peak SD-WAN For Cloud-First Goals (Sponsored) appeared first on Packet Pushers.

The Week in Internet News: Mexico, NYC Push for Internet Access for All

Everyone’s invited: Politicians in Mexico and New York City announced plans for universal Internet access in recent days. Mexican President Andres Manuel Lopez Obrador announced a plan to bring access to the large swaths of the country that don’t have it, including a government investment of more than $500,000, according to AA News. Meanwhile, New York City Major Bill de Blasio is pushing an “Internet master plan” to improve access. About 18 percent of the city’s residents have neither mobile nor home Internet connections, and about 40 percent have one or the other, but not both, the New York Daily News reports.

New pressure campaign: The U.S. FBI is asking Apple for help to access encrypted communications on an iPhone that belonged to the Saudi military student who killed three people last month at a naval base in Pensacola, Fla., the Washington Post reports. It’s unclear what information the FBI is looking for, given that the shooter is dead, but the request is a new step in the long-running fight between the U.S. government and large tech vendors over the use of encryption on smartphones and other devices.

Cyber retaliation: Many cybersecurity experts expect Iran to retaliate with cyberattacks Continue reading

How to deal with the impact of digital transformation on networks

Digital transformation has increased the importance of the network, particularly the edge, where customers, employees, cloud applications and IoT devices connect to the enterprise. The legacy static and non-differentiated network edge of years past is no longer sufficient for many reasons, so as companies embark on digital-transformation plans, their networks must evolve.Networking pros should be looking at, among other things, improving security and embracing software-defined networking (SDN) that supports propagating changes quickly across the network in order to accommodate the many challenges digital transformation creates.To read this article in full, please click here

How to deal with the impact of digital transformation on networks

Digital transformation has increased the importance of the network, particularly the edge, where customers, employees, cloud applications and IoT devices connect to the enterprise. The legacy static and non-differentiated network edge of years past is no longer sufficient for many reasons, so as companies embark on digital-transformation plans, their networks must evolve.Networking pros should be looking at, among other things, improving security and embracing software-defined networking (SDN) that supports propagating changes quickly across the network in order to accommodate the many challenges digital transformation creates.To read this article in full, please click here

AWS Rarely Kills a Service. What About Your Vendor?

Here’s an interesting tidbit from “Last Week in AWS” blog:

From a philosophical point of view, AWS fundamentally considers an API to be a promise. Services that aren’t promoted anymore are still available […] Think about that for a second - a service launched 13 years ago is still actively supported to the point where you can use it today.

Compare that to Killed By Google graveyard, and you might understand why I’m a bit reluctant to cover GCP in my webinars.

Read more ...

Helping mitigate the Citrix NetScaler CVE with Cloudflare Access

Helping mitigate the Citrix NetScaler CVE with Cloudflare Access

Yesterday, Citrix sent an updated notification to customers warning of a vulnerability in their Application Delivery Controller (ADC) product. If exploited, malicious attackers can bypass the login page of the administrator portal, without authentication, to perform arbitrary code execution.

No patch is available yet. Citrix expects to have a fix for certain versions on January 20 and others at the end of the month.

In the interim, Citrix has asked customers to attempt to mitigate the vulnerability. The recommended steps involve running a number of commands from an administrator command line interface.

The vulnerability relied on by attackers requires that they first be able to reach a login portal hosted by the ADC. Cloudflare can help teams secure that page and the resources protected by the ADC. Teams can place the login page, as well as the administration interface, behind Cloudflare Access’ identity proxy to prevent unauthenticated users from making requests to the portal.

Exploiting URL paths

Citrix ADC, also known as Citrix NetScaler, is an application delivery controller that provides Layer 3 through Layer 7 security for applications and APIs. Once deployed, administrators manage the installation of the ADC through a portal available at a dedicated URL on Continue reading

Must Read: Ironies of Automation

Stumbled upon a 35-year-old article describing the ironies of automation (HT: The Morning Paper). Here’s a teaser…

Unfortunately automatic control can ‘camouflage’ system failure by controlling against the variable changes, so that trends do not become apparent until they are beyond control.

In simpler words: when things fail, they fail really badly because the intermittent failures were kept hidden. Keep that in mind the next time someone tells you how wonderful software-defined AI-assisted networking is going to be.