The companies announced the deal a week before the annual RSA mega-cybersecurity conference kicks...
Take a Network Break! Global espionage tensions ratchet up between the United States and China, the CIA is revealed to have owned a company that sold doctored cryptography systems to allies and adversaries, VMware adjusts its licensing, and more tech news. Guest analysts Keith Townsend and Ned Bellavance step in for a vacationing co-host.
The post Network Break 271: Global Espionage Agita Kicks Up A Notch; Forescout Gets Bought For $1.9 Billion appeared first on Packet Pushers.
The vendor’s Annual Internet Report projects the average 5G speed will be 575 Mb/s by 2023.
This anonymized data from the operators’ security operations centers and investigations is then...
I published a blog post describing how complex the underlay supporting VMware NSX still has to be (because someone keeps pretending a network is just a thick yellow cable), and the tweet announcing it admittedly looked like a clickbait.
[Blog] Do We Need Complex Data Center Switches for VMware NSX Underlay
Martin Casado quickly replied NO (probably before reading the whole article), starting a whole barrage of overlay-focused neteng-versus-devs fun.
Read more ...I published a blog post describing how complex the underlay supporting VMware NSX still has to be (because someone keeps pretending a network is just a thick yellow cable), and the tweet announcing it admittedly looked like a clickbait.
[Blog] Do We Need Complex Data Center Switches for VMware NSX Underlay
Martin Casado quickly replied NO (probably before reading the whole article), starting a whole barrage of overlay-focused neteng-versus-devs fun.
“We see the edge as really being defined not necessarily by a specific place or a specific...
Welcome to WordPress. This is your first post. Edit or delete it, then start writing!
When having a business requirement of tenancy, most solutions will tend to lean towards VRF. That is because VLANs require a distributed L2 environment, which comes with spanning tree, mlag and a whole other glut of inefficient network control plane protocols. Upleveling the infrastructure to L3 ends up requiring VRF technology to enforce tenancy.
Once you’ve settled on this feature as the solution for the business requirement, the next question is: How do I successfully deploy VRFs in a large distributed environment at scale, that also allows me to minimize the burden of management while still enforcing tenancy in all the important parts of my network? Most conversations surrounding this question will lead down two solution paths:
VXLAN with EVPN leverages VRFs at every border and leaf switch, while all the intermediate devices (ie. spines, super spines) only see the encapsulated VXLAN traffic, and hence do not need any VRF intelligence or visibility.
A VRF Lite solution is fundamentally simpler since it uses less moving parts. The thought of enabling the EVPN address family and encapsulating traffic into a VXLAN tunnel Continue reading
Open source has been shaping the way service providers collaborate and work together, especially as...
We’re watching you: The U.S. CIA secretly had an ownership stake in Swiss encryption company Crypto AG for decades and was able to read encrypted messages sent using the company’s technology, the Washington Post reports. West German intelligence agencies worked with the CIA. Forbes columnist Jody Westby called for a congressional investigation.
We’re watching you, part two: Meanwhile, Russia’s Federal Security Service has ordered some large Internet companies in the country to give it continuous access to their systems, the New York Times reports. The FSB has targeted more than 200 companies, including popular messenger service Telegram, social network VK. and classified advertisement website Avito.ru.
Big bucks for space-based Internet: Astranis, a satellite Internet startup focused on bringing service to underserved areas, has raised $90 million in new funding, Fortune says. The new funding will help Astranis deploy its first satellite, focused on providing Internet service in Alaska.
Not so fast: Satellites, however, have some downsides, according to a story on TheConversation.com. Satellites are vulnerable to cyberattacks, with hackers potentially able to shut them down or even turn them into weapons, the story suggests.
New privacy push: U.S. Senator Kirsten Gillibrand, a New York Democrat, has Continue reading