It doesn’t immediately make sense, does it: the terms peace and cyber hygiene in the same breath. Still, there is a reason why these two come together at the Paris Peace forum this week. That reason is simple though. Cyber hygiene – taking basic and common measures to secure software, devices, and networks – reduces the attack vectors that can be used by criminals and state actors alike. Cyber hygiene will reduce the odds that your network is seen as a belligerent actor just because it has been hacked by others. Cyber hygiene helps to create a more trustworthy and secure environment where people can go about their daily business in confidence that nothing dreadful will happen to them. It is one of the tools in the toolbox of confidence-building measures that enable peace.
Supporters of the Paris Peace Call, which was launched at the Peace Forum last year, are committed to working together to, among other things, “improve the security of digital products and services as well as everybody’s ‘cyber hygiene.’” The Internet Society has joined with a significant number of states, companies, and organizations to sign the Paris Call.
The topic of cyber hygiene is not Continue reading
MPLS Traffic Engineering Fast Reroute Link Protection – I will explain it in plain English and the most important point of MPLS TE FRR Link Protection among other Fast Reroute mechanisms.
IPv6 Business drivers can be many and different businesses have different reasons to deploy IPv6 on their network.
IPv6 is more commonly deployed in the Service Providers than Enterprises or Small Medium Businesses. Do you know why ?
What is PLR, Point of Local Repair in MPLS Traffic Engineering ?
PLR is the term is used in the context of Fast Reroute. I briefly mentioned from PLR in the MPLS Traffic Engineering Fast Reroute Link Protection post earlier and in this post, will explain it in more detail.
Cloud security posture management includes processes and tools to avoid cloud misconfigurations...
There are many broadband services Service Providers offer to their customers today. As a network engineer you need to know the most common services and their advantages, disadvantages, design characteristics and so on.
What is last mile and first mile ? This is an important telecommunication term which is used in all broadband communication methods. In this post, I will explain the term, differences and some detail about this term.
Network complexity plays a very important role during network design. Every network designer tries to find the simplest design.
MP-BGP (Multiprotocol BGP) is an extensions to BGP protocol. Standard BGP only supports IPv4 unicast address family, whereas MP-BGP supports more than 15 different BGP address families.
Inter AS Option B is highly scalable, reasonably secure, but operationally complex inter autonomous MPLS VPN architecture.
Inter AS Option A is the easiest, most flexible, most secure Inter autonomous system MPLS VPN technology.
One of the most important thing about CCDE exam is security. We all think that it is secure, it is not cheatable. There is no CCDE dump. We all believe that. CCDE exam has been around for more than 10 years and there are still only less than 500 people in the world. It seems what we think about exam security is correct.
Today, there are many networking technologies which haven’t been widely deployed. And among them are Internet Multicast and IPv6 although these two protocols have many benefits .
BGP PIC Edge provides sub second convergence time in the case of edge link or node failure. BGP PIC is a useful for MPLS VPN service and can be provided by the Service provider as a value added service thus might provide additional revenue.
BFD is not a fast convergence mechanism. BFD stands for Bidirectional Forwarding Detection. It is an important tool for the IP layer but there is a confusion in the network community about it.
After publishing the Disaster Recovery Faking, Take Two blog post (you might want to read that one before proceeding) I was severely reprimanded by several people with ties to virtualization vendors for blaming virtualization consultants when it was obvious the firewall clusters stretched across two data centers caused the total data center meltdown.
Let’s chase that elephant out of the room first. When you drive too fast on an icy road and crash into a tree who do you blame?
For whatever reason some people love to blame the tires ;)
Read more ...