Archive

Category Archives for "Networking"

Texas ransomware attacks: to pay or not to pay? | TECH(feed)

Nearly two dozen cities in Texas have been hit by a ransomware attack executed by a single threat actor. These attacks beg the question: Is it ever worth it to pay a cyber attacker’s ransom? In this episode of TECH(feed), Juliet discusses the pattern of ransomware attacks on local governments, how municipalities have responded and how to prevent a ransomware attack in the first place.

AfPIF Day Three: A Record Number of Women

It’s been a record-breaking year: 97 women attended AfPIF 2019, the highest ever, showing the fruits of diversity efforts from organizers and sponsors.

In the last three years, there have been fellowships targeting women in engineering, supported by organizations like Workonline, Google, LINX, and Akamai. There’s also been a working lunch, where participants discuss the best way AfPIF can be more inclusive to women.

As the curtains fell on the tenth edition of AfPIF, it was clear that the future is looking bright, with 367 men and women attending, representing 59 countries: 202 from Africa, 36 from Europe, 16 from America, and 13 from Asia.

The first panel of the day was dedicated to looking back at the challenges in the last ten years, identifying the opportunities going forward, and what we all must do in order to guarantee business growth and better connectivity for the region.

One of the key points was that the traditional telco model is changing, and companies will have to adapt in order to stay relevant. Seacom, for instance is exploring other business opportunities as the demand for traditional infrastructure falls and local content grows, leading to formation of ISPs that can survive largely Continue reading

Edge Internet Economy Will Hit $4.1 Trillion by 2030, Study Says

The edge internet economy will surpass $4.1 trillion by 2030, according to a study by Chetan Sharma...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

AT&T Polishes Its Hybrid Cloud Strategy

AT&T polished its hybrid cloud strategy following a 30-day stretch that included major new...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

InfoBlox Pushes DDI to Branch Offices

The company claims the service will help enterprises fully realize the benefits of SD-WAN, simplify...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Don’t worry about shadow IT. Shadow IoT is much worse.

For years, IT departments have been railing about the dangers of shadow IT and bring-your-own-device. The worry is that these unauthorized practices bring risks to corporate systems, introducing new vulnerabilities and increasing the attack surface.That may be true, but it’s not the whole story. As I’ve long argued, shadow IT may increase risks, but it can also cut costs, boost productivity and speed innovation. That’s why users are often so eager to circumvent what they see as slow and conservative IT departments by adopting increasingly powerful and affordable consumer and cloud-based alternatives, with or without the blessing of the powers that be. Just as important, there’s plenty of evidence of that enlightened IT departments should work to leverage those new approaches to serve their internal customers in a more agile manner.To read this article in full, please click here

Don’t worry about shadow IT. Shadow IoT is much worse.

For years, IT departments have been railing about the dangers of shadow IT and bring-your-own-device. The worry is that these unauthorized practices bring risks to corporate systems, introducing new vulnerabilities and increasing the attack surface.That may be true, but it’s not the whole story. As I’ve long argued, shadow IT may increase risks, but it can also cut costs, boost productivity and speed innovation. That’s why users are often so eager to circumvent what they see as slow and conservative IT departments by adopting increasingly powerful and affordable consumer and cloud-based alternatives, with or without the blessing of the powers that be. Just as important, there’s plenty of evidence of that enlightened IT departments should work to leverage those new approaches to serve their internal customers in a more agile manner.To read this article in full, please click here

Day Two Cloud 016: Checking Up On Azure Kubernetes Service

On today's Day Two Cloud podcast, host Ned Bellavance checks in on Azure Kubernetes Service (AKS), which launched to the public in June of 2018. Ned and guest Justin Luk discuss why Microsoft rolled out AKS when it already had existing container services, business drivers for AKS, customer adoption, lessons learned, and more.

The post Day Two Cloud 016: Checking Up On Azure Kubernetes Service appeared first on Packet Pushers.

BrandPost: Back to School: Your SD-WAN Reading List

Summer is about to end. Time to head back to work, understand next year’s projects and plans, and set your IT infrastructure objectives accordingly. SD-WAN and MPLS transformation are huge trends that cannot be overlooked. How will it impact your existing IT?MPLS transformations can send chills down any IT pro’s spine but these suggested readings will help calm the nerves. They’re a series of clear, concise, and practical manuals divided into lessons on how to migrate from the prehistoric world of MPLS into the light of SD-WAN.  Finish all of them and you’ll have an A+ in WAN Transformation 101.To read this article in full, please click here

Red Hat’s OpenShift Service Mesh Nears Prime Time

The OpenShift Service Mesh handles service-to-service communication of Kubernetes-orchestrated...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Supercharging Firewall Events for Self-Serve

Supercharging Firewall Events for Self-Serve

Today, I’m very pleased to announce the release of a completely overhauled version of our Firewall Event log to our Free, Pro and Business customers. This new Firewall Events log is now available in your Dashboard, and you are not required to do anything to receive this new capability.

Supercharging Firewall Events for Self-Serve

No more modals!

We have done away with those pesky modals, providing a much smoother user experience. To review more detailed information about an event, you simply click anywhere on the event list row.

Supercharging Firewall Events for Self-Serve

In the expanded view, you are provided with all the information you may need to identify or diagnose issues with your Firewall or find more details about a potential threat to your application.

Additional matches per event

Cloudflare has several Firewall features to give customers granular control of their security. With this control comes some complexity when debugging why a request was stopped by the Firewall. To help clarify what happened, we have provided an “Additional matches” count at the bottom for events triggered by multiple services or rules for the same request. Clicking the number expands a list showing each rule and service along with the corresponding action.

Supercharging Firewall Events for Self-Serve

Search for any field within a Firewall Event

Continue reading

Must Read: When Redundancy Actually Helps

Stumbled upon an excellent redundancy-focused blog post (HT: High Scalability). Here are just a few important points:

  • Don’t make things too complex;
  • Don’t add more risk than you take away;
  • You’ve got to fail over in the right direction;
  • You must be able to return to fully-redundant mode.

I’m guessing that people promoting stretched VLANs, vSphere and/or NSX clusters running across multiple sites, weird combination of EVPN and OTV, and a dozen similar shenanigans never considered any one of these points.

AfPIF Day Two: International Traffic, the Economics of Peering, and a Look Ahead to 2030

In the last five years, Africa’s international traffic patterns have changed, with international and  intra regional traffic growing, according to the latest statistics from Telegeography, presented at this year’s AfPIF.

Johannesburg, Cape Town, Lagos, and Nairobi maintain their top hub status, but Cotonou, Kigali, Libreville, Abidjan, and Dakar have emerged as major hubs as international traffic grows. Cotonou recorded 88Gps between 2018 and 2019, showing a 77% growth, while Kigali recorded 75Gbps, a 92% growth, and Libreville had 113Gbps at 71% growth.

This was attributed to a drastic reduction in connectivity costs, which led to more data center space and eventual demand for more capacity to other international hubs. West African connection, especially between Dakar, Abidjan, Accra, and Lagos has also increased.

Telegeography monitors international transit traffic and the presentation was one of the highlights of the day. Domestic traffic is a bit harder to capture but Telegeography promised to work with more providers to get future snapshots of the growing traffic.

The presentation by Telegeography explored the shifting connectivity landscape in Africa and its effect on interconnection hubs, showing that new hubs may soon emerge, as more and more cities reduce the cost of connectivity and invest in more Continue reading

Install Golang Ubuntu1804

This will just be a quick post on how to install Golang on Ubuntu 1804. There will be no earth shattering knowledge bombs, it's more of a documentation post for myself. Others may or may not find it useful. Code versions used for this lab Ubuntu - 1804 Golang - 1.15.1 Download Download...

Veritas Moves Into VMware-Based Clouds

Veritas announced availability of its Enterprise Data Services Platform for VMware environments...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Splunk Plunks Down $1.05B, Acquires SignalFx

Splunk today announced an agreement to acquire SignalFx, which provides real-time monitoring and...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.