If you’re running a typical (somewhat outdated) enterprise data center, you’re using tons of VLANs and firewalls, use VLANs as security zones, and push inter-VLAN traffic through firewalls for inspection. Security vendors love that approach - when inspecting traffic they can add no value to (like database- or backup sessions), the firewalls quickly become choke points that have to be upgraded.
Read more ...Today's Network Break analyzes an HPE/Cumulus Networks deal on Ethernet storage switches, yet another open-source network OS project from the Linux Foundation, Accenture's purchase of Symantec's security services biz from Broadcom, a Cisco reorganization of its enterprise networking businesses, and more tech and IT news.
The post Network Break 266: Accenture Buys Symantec Security Services Biz; Cisco Reorganizes Around Intent-Based Networking appeared first on Packet Pushers.
The bug impacts Citrix's ACD platform; Samsung acquired TeleWorld to boost its U.S. RAN efforts;...
5G network sharing deals have gained momentum as carriers look to decrease the cost of deploying...
Unomaly's technology will allow users to proactively take action before network disruptions impact...
The group will share its work on 5G and MEC including working toward international MEC standards to...
Samsung has earned 5G RAN contracts in the U.S. with Verizon, AT&T, and Sprint, but is behind...
Over the weekend two groups released proof-of-concept (PoC) exploit codes for this vulnerability on...
On today's Tech Bytes podcast, sponsored by Silver Peak, we talk with Cushman & Wakefield about how the global real estate company is using SD-WAN to enable its cloud-first goals. Our guest is Chris Butcher, Platform Architect, Global Networks, Cloud and Perimeter Security at Cushman & Wakefield.
The post Tech Bytes: Cushman & Wakefield Taps Silver Peak SD-WAN For Cloud-First Goals (Sponsored) appeared first on Packet Pushers.
Everyone’s invited: Politicians in Mexico and New York City announced plans for universal Internet access in recent days. Mexican President Andres Manuel Lopez Obrador announced a plan to bring access to the large swaths of the country that don’t have it, including a government investment of more than $500,000, according to AA News. Meanwhile, New York City Major Bill de Blasio is pushing an “Internet master plan” to improve access. About 18 percent of the city’s residents have neither mobile nor home Internet connections, and about 40 percent have one or the other, but not both, the New York Daily News reports.
New pressure campaign: The U.S. FBI is asking Apple for help to access encrypted communications on an iPhone that belonged to the Saudi military student who killed three people last month at a naval base in Pensacola, Fla., the Washington Post reports. It’s unclear what information the FBI is looking for, given that the shooter is dead, but the request is a new step in the long-running fight between the U.S. government and large tech vendors over the use of encryption on smartphones and other devices.
Cyber retaliation: Many cybersecurity experts expect Iran to retaliate with cyberattacks Continue reading
What is Human Permafrost in IT Infrastructure ?
The post Dictionary: Human Permafrost appeared first on EtherealMind.
Here’s an interesting tidbit from “Last Week in AWS” blog:
From a philosophical point of view, AWS fundamentally considers an API to be a promise. Services that aren’t promoted anymore are still available […] Think about that for a second - a service launched 13 years ago is still actively supported to the point where you can use it today.
Compare that to Killed By Google graveyard, and you might understand why I’m a bit reluctant to cover GCP in my webinars.
Read more ...Yesterday, Citrix sent an updated notification to customers warning of a vulnerability in their Application Delivery Controller (ADC) product. If exploited, malicious attackers can bypass the login page of the administrator portal, without authentication, to perform arbitrary code execution.
No patch is available yet. Citrix expects to have a fix for certain versions on January 20 and others at the end of the month.
In the interim, Citrix has asked customers to attempt to mitigate the vulnerability. The recommended steps involve running a number of commands from an administrator command line interface.
The vulnerability relied on by attackers requires that they first be able to reach a login portal hosted by the ADC. Cloudflare can help teams secure that page and the resources protected by the ADC. Teams can place the login page, as well as the administration interface, behind Cloudflare Access’ identity proxy to prevent unauthenticated users from making requests to the portal.
Citrix ADC, also known as Citrix NetScaler, is an application delivery controller that provides Layer 3 through Layer 7 security for applications and APIs. Once deployed, administrators manage the installation of the ADC through a portal available at a dedicated URL on Continue reading