Archive

Category Archives for "Networking"

Is BGP Safe Yet? No. But we are tracking it carefully

Is BGP Safe Yet? No. But we are tracking it carefully

BGP leaks and hijacks have been accepted as an unavoidable part of the Internet for far too long. We relied on protection at the upper layers like TLS and DNSSEC to ensure an untampered delivery of packets, but a hijacked route often results in an unreachable IP address. Which results in an Internet outage.

The Internet is too vital to allow this known problem to continue any longer. It's time networks prevented leaks and hijacks from having any impact. It's time to make BGP safe. No more excuses.

Border Gateway Protocol (BGP), a protocol to exchange routes has existed and evolved since the 1980s. Over the years it has had security features. The most notable security addition is Resource Public Key Infrastructure (RPKI), a security framework for routing. It has been the subject of a few blog posts following our deployment in mid-2018.

Today, the industry considers RPKI mature enough for widespread use, with a sufficient ecosystem of software and tools, including tools we've written and open sourced. We have fully deployed Origin Validation on all our BGP sessions with our peers and signed our prefixes.

However, the Internet can only be safe if the major network operators deploy Continue reading

Member News: Internet Society Chapters Focus on Connecting People During Pandemic

Staying connected: Several Internet Society Chapters are focusing on ways to help people stay connected while living under stay-at-home orders or following social-distancing guidelines related to the COVID-19 pandemic. The Netherlands Chapter has released a toolbox of open source tools to help people work from home.

Resources for the people: Meanwhile, the Dominican Republic Chapter has released a list of COVID-related resources for residents. The list includes information on virtual private networks, on teleworking, and on the country’s cybersecurity resources. The Chapter also released a set of recommendations for the government, for Internet service providers, and for other companies. For example, the Chapter recommends that ISPs offer flexible or low-cost service plans to customers during the pandemic.

Pandemic privacy: One of the many concerns during the COVID-19 pandemic is a loss of privacy as governments and private organizations track mobile phones as a way to monitor the spread of the virus and the effectiveness of social-distancing programs. The Canada Chapter notes that the pandemic has raised fears about the surveillance state. In Canada, the prime minister has ruled against cell phone surveillance for tracking the spread of the virus, but “if the virus rapidly spreads further, no doubt device tracking Continue reading

Creating Conspicuously Compelling Content

It’s funny how little things change in the middle of big, world changing experiences. I’ve noticed that my daily blog viewership has gone down, as have many other folks I’ve talked to. The number of people reading has been reduced for some reason. However the number of video views of content on other platforms like Youtube has gone up dramatically. It’s almost like the people that were reading because they wanted to get a quick digest now have the free time to watch a whole video on a topic.

I got on the bandwagon too, recently publishing my first episode of Tomversations this week. I’ve also talked to several friends that are either starting or restarting a podcast. The gold mine for content creation has opened for business. However, I still hear the same refrains about content that I’ve heard for years when I talk about writing:

  • “I don’t have anything to say!”
  • “It’s hard to write things down!”
  • “Isn’t it easier to just talk about stuff?”

These are all valid questions, no matter what medium you’re developing for. But let me give you a roadmap to take those objections, turn them on their heads, and be Continue reading

How to Utilize Your Networking Capability for Business Relationships

Building a solid relationship is essential for success between parties involved in a business. A good relationship is the bedrock that determines the outcome of the business itself, because everything comes down to communication, understanding, and mutual agreement. Therefore, it’s worth every effort put into it.

Your networking capability can be of great benefit in building a good business relationship if properly utilized. But first, what does the term “networking capability” mean? Networking capability can be defined as the ability to build, sustain, and put to beneficial use the relationships built with external organizations and/or individual partners.

The main purpose and effect of utilizing your networking capability for business relationships become much clearer when you understand that business relationships are in three stages. You know when and how to get to each stage as a result of your networking capability. These three stages include:

  • Relationship initiation capability
  • Relationship developing/building capability
  • Relationship termination capability

These three networking capabilities (skills) are a must-have in the relationship aspect of your business. Let’s take a look at them more closely.

3 Networking Capability Skills

Relationship Initiation Capability

Under this stage, there are two things you should do first.

·       Select highly valued Continue reading

Waiting for a Rainy Day to Do Security Training? It’s Pouring

The FortiGuard Labs team as recently as April 4 reported seeing an average of about 600 new...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Time-Based One-Time Passwords for Phone Support

Time-Based One-Time Passwords for Phone Support
Time-Based One-Time Passwords for Phone Support

As part of Cloudflare’s support offering, we provide phone support to Enterprise customers who are experiencing critical business issues.

For account security, specific account settings and sensitive details are not discussed via phone. From today, we are providing Enterprise customers with the ability to configure phone authentication to allow for greater support to be offered over the phone without need to perform validation through support tickets.

After providing your email address to a Cloudflare Support representative, you can now provide a token generated from the Cloudflare dashboard or via a 2FA app like Google Authenticator. So, a customer is able to prove over the phone that they are who they say they are.

Configuring Phone Authentication

If you are an existing Enterprise customer interested in phone support, please contact your Customer Success Manager for eligibility information and set-up. If you are interested in our Enterprise offering, please get in contact via our Enterprise plan page.

If you already have phone support eligibility, you can generate single-use tokens from the Cloudflare dashboard or configure an authenticator app to do the same remotely.

On the support page, you will see a card called “Emergency Phone Support Hotline – Authentication”. From here you Continue reading

Video: Going Beneath the Cisco SD-WAN Surface

David Penaloza decided to demystify Cisco’s SD-WAN, provide real world experience beyond marketing hype, and clear confusing and foggy messages around what can or cannot be done with Cisco SD-WAN.

He started the first part of his Cisco SD-WAN Foundations and Design Aspects webinar with a quick look beneath the surface of shiny marketing and corporate slidess.

You need Free ipSpace.net Subscription to watch the video.

Heavy Networking 512: Production Ready Automation With Cumulus Networks (Sponsored)

In today's Heavy Networking episode, we talk Production Ready Automation. That's a topic we've covered before on Packet Pushers, so what wondrous newness does sponsor Cumulus Networks bring to the table? The idea is a system that's ready for you to use. Why? Because a lot of folks are finding that rolling their own artisanal network automation takes considerable time both to create and maintain. Our guests are Pete Lumbis, Director of Technical Marketing and Rama Darbha, Director of Services at Cumulus Networks.

The post Heavy Networking 512: Production Ready Automation With Cumulus Networks (Sponsored) appeared first on Packet Pushers.

Heavy Networking 512: Production Ready Automation With Cumulus Networks (Sponsored)

In today's Heavy Networking episode, we talk Production Ready Automation. That's a topic we've covered before on Packet Pushers, so what wondrous newness does sponsor Cumulus Networks bring to the table? The idea is a system that's ready for you to use. Why? Because a lot of folks are finding that rolling their own artisanal network automation takes considerable time both to create and maintain. Our guests are Pete Lumbis, Director of Technical Marketing and Rama Darbha, Director of Services at Cumulus Networks.

Microsegmentation architecture choices and how they differ

Despite a string of improvements over the past several years, enterprises can no longer rely on perimeter defenses alone to keep out network attackers. Microsegmentation directly addresses the challenge of unauthorized lateral movements by dividing IT environments into controllable compartments, enabling adopters to securely isolate workloads from each other while making network protection more granular. As cyber-attackers continue to try new ways to dodge security measures and roam across IT environments, microsegmentation is moving into the mainstream.To read this article in full, please click here

How microsegmentation architectures differ

Despite a string of improvements over the past several years, enterprises can no longer rely on perimeter defenses alone to keep out network attackers. Microsegmentation directly addresses the challenge of unauthorized lateral movements by dividing IT environments into controllable compartments, enabling adopters to securely isolate workloads from each other while making network protection more granular. As cyber-attackers continue to try new ways to dodge security measures and roam across IT environments, microsegmentation is moving into the mainstream.To read this article in full, please click here

Daily Roundup: Google Slows Hiring Due to COVID-19

Google slowed hiring and data center spend due to COVID-19; GSMA marched on with MWC; and Storage...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Feds Downplay JEDI Ethics Violations

The DoD report found the decision to award Microsoft the $10B JEDI cloud contract was...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

AWS Boosts Snowball Edge Device Performance

Snowball Edge Storage devices now feature 40 virtual CPUs compared to 24 in the previous version...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

GSMA Sees ‘Strong Momentum’ for Future MWC Events

Barcelona will now host the event through 2024. The Catalonia region has reported nearly 7,100...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Google Slows Hiring, Data Center Spend Due to COVID-19

“We are reevaluating the pace of our investment plans for the remainder of 2020,” Alphabet and...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Coronavirus Stunts IoT Insurgence

The rapid reversal is significant because the convergence of 5G, networks especially suited for...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Telefónica’s Security Biz Taps Google Cloud’s Chronicle

The deal comes as Google Cloud makes an all-out push to support mobile network operators.

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Vast Data Grows War Chest With $100M Funding Round, $1.2B Valuation

“Vast Data now has a $140 million war chest that we will spend like camels, not like unicorns,”...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.