It may (or may not!) come as surprise, but a few months ago we migrated Cloudflare’s edge SSL connection termination stack to use BoringSSL: Google's crypto and SSL implementation that started as a fork of OpenSSL.
We dedicated several months of work to make this happen without negative impact on customer traffic. We had a few bumps along the way, and had to overcome some challenges, but we ended up in a better place than we were in a few months ago.
We have already blogged extensively about TLS 1.3. Our original TLS 1.3 stack required our main SSL termination software (which was based on OpenSSL) to hand off TCP connections to a separate system based on our fork of Go's crypto/tls standard library, which was specifically developed to only handle TLS 1.3 connections. This proved handy as an experiment that we could roll out to our client base in relative safety.
However, over time, this separate system started to make our lives more complicated: most of our SSL-related business logic needed to be duplicated in the new system, which caused a few subtle bugs to pop up, and made it Continue reading
Verizon also plans to integrate unified communications into the VNS platform.
Updates focused on attacks against security and compliance processes.
We’ll be at AWS re:INVENT in Las Vegas all week (Nov 27 – Dec 1, 2017)!
Come say hi to the NSX Team at the VMware booth (#900 right as you walk in the main entrance) in the Expo Hall at the Venetian Hotel. Stop by our booth to…
As always, continue the conversation with us on Twitter @vmwarensx or use the hashtag #RunNSX or #NSXMindset. We hope to see you at the show!
The post Come Visit Us at AWS re:Invent! appeared first on Network Virtualization.
Think of Blockchain as primarily two things. 1) A peer-to-peer technology 2) A way of keeping a public record.
The technological backing of Blockchain is the ability to have many (many) computers host the same information. Snippets of code (known as blocks) are duplicated and maintained in so many different places rendering fraud impossible. The fact that each of these blocks is timestamped and unique makes it increasingly challenging to outsmart. If you’re interested in learning more about the technological specifics there are a number of great resources online including this presentation by Binh Nguyen, IBM’s Blockchain Fabric Chief Architect.
Today, Blockchain is most commonly thought of in connection to Bitcoin as it describes the technology and process that we’ve all come to know as being so secure. Bitcoin’s past affiliations with illegalities of all sorts have given a bad name to Blockchain but there are many benefits to secure transactions all with a public record as our purchases and currency become increasingly digital.
Want to learn more? Check out these sources:
Terminology Tuesday is a new blog series. What would you like Continue reading
Company sees its "agentless approach" as well suited to function-as-a-service platforms.
The security-as-a-service is based on a zero-trust approach.
Gartner predicts that 85 percent of enterprises will use a CASB by 2020.
What we see in this number is a steady trend of these statistics since the Great Recession, with no evidence Continue readingNeed something to discuss over #Thanksgiving dinner? Try this— Donald Trump Jr. (@DonaldJTrumpJr) November 23, 2017
Stock markets at all time highs
Lowest jobless claims since 73
6 TRILLION added to economy since Election
1.5M fewer people on food stamps
Consumer confidence through roof
Lowest Unemployment rate in 17 years #maga
Tomorrow is Thanksgiving in the United States. It’s a holiday for getting together with family characterized by turkey dinner and whatever it is that happens in American football. While celebrating with family is great, if you use a computer for your main line of work, sometimes the conversation turns to how to setup the home wifi or can Russia really use Facebook to hack the US election. Just in case you’re a geek who finds yourself in that position this week, we wanted to give you something to play with. To that end, we’re opening the Warp beta to all Cloudflare users. Feel free to tell your family there’s been an important technical development you need to attend to immediately and enjoy!
Warp allows you to expose a locally running web server to the internet without having to open up ports in the firewall or even needing a public IP address. Warp connects a web server directly to the Cloudflare network where Cloudflare acts as your web server’s network gateway. Every request reaching your origin must travel to the Cloudflare network where you can apply rate limits, access policies and authentication before the request hits your Continue reading
The FCC plans to completely repeal #NetNeutrality this week.— Christian J. (@dtxErgaOmnes) November 22, 2017
Here's the censorship of speech that actually happened without Net Neutrality rules:#SaveNetNeutrality pic.twitter.com/6R29dajt44
Firstly, it's not a NetNeutrality issue (which applies only to the Internet), but an issue with text-messages. In other words, it's something that will continue to happen even with NetNeutrality rules. People relate this to NetNeutrality as an analogy, not because it actually is such an issue.The FCC plans to completely repeal #NetNeutrality this week.— Christian J. (@dtxErgaOmnes) November 22, 2017
Here's the censorship of speech that actually happened without Net Neutrality rules:#SaveNetNeutrality pic.twitter.com/6R29dajt44
The FCC plans to completely repeal #NetNeutrality this week.— Christian J. (@dtxErgaOmnes) November 22, 2017
Here's the censorship of speech that actually happened without Net Neutrality rules:#SaveNetNeutrality pic.twitter.com/6R29dajt44
As businesses evaluate their applications in the constantly evolving world of IT, new strategies are emerging for delivery. These strategies include keeping applications on-premises or moving them to one or more public cloud providers.
These public clouds come with their own networking and security constructs and policy management. This results in a new set of technology siloes that increases expense, complexity and risk:
This blog series will discuss the challenges of providing consistent networking and security policies for native cloud workloads, the value of VMware NSX Cloud, and walk through the process of securing and connecting applications running natively in the public cloud.
VMware’s strategy is to enable businesses to create and deliver applications. To support new delivery strategies, VMware NSX Cloud provides consistent networking and security for native applications running in multiple public and private clouds. Utilizing a single management console and a common application programming interface, VMware NSX Cloud offers numerous benefits:
The company added 2,500 new customers in the quarter.
The platform is compatible with open source container orchestration projects, including Kubernetes.