Question marks include Nervana and the security business.
I’m a big fan of Let’s Encrypt (free, widely trusted SSL certificates) but not a big fan of most of the client software available for requesting and renewing certificates. Unlike a typical certificate authority, Let’s Encrypt doesn’t have a webui for requesting/renewing certs; everything is driven via an automated process that is run between a Let’s Encrypt software client and the Let’s Encrypt web service.
Since the protocols that Let’s Encrypt uses are standards-based, there are many open source clients available. Being security conscious, I have a few concerns with most of the clients:
I can’t remember how, but I discovered a very clean, very simple client called acme-tiny at github.com/diafygi/acme-tiny. This script was obviously written by someone who shares the same concerns as I do and I highly recommend it to others.
I used acme-tiny to request my initial certificates — and it Continue reading
Welcome to Technology Short Take #70! In this post you’ll find a collection of links to articles discussing the major data center technologies—networking, hardware, security, cloud computing, applications, virtualization…you name it! (If there’s a topic you think I’m missing, I’d love to hear from you.)
--allowed_address_pairs
extension to build a highly-available proxy server instead of using LBaaS. Rackspace Managed Security includes a response team.
Intel seems more interested in what Nervana can do for CPUs.
Deep learning goes deeper than machine learning.
When Seungwon Shin was a grad student, few people wanted to talk about software-defined networking (SDN) security. So say two of his grad students, Seungsoo Lee and Changhoon Yoon (left and right, respectively, in the photo above). But along with Shin, who’s now an assistant professor at the Korea Advanced Institute of Science and Technology... Read more →
Privacy catastrophe, financial catastrophe, and performance catastrophe are three vulnerabilities hackers might take advantage of.
As with many emerging technologies, there are pros and cons to SD-WAN adoption.
A smart-bulb worm is possible, but Philips at least made it hard to do.
About 350 employees will be laid off.
Infosec could take some hints from the art of design.
Black Hat keynoter Dan Kaminsky has a few rants on his mind.
Black Duck's technology scans a software repository, checking for license-compliance issues and known vulnerabilities.
It all comes back to people. People are the users of the system. They are the source of great imagination and great innovation. They are also the reason why security professionals pull their hair out day in and day out. Because computer systems don’t have the capability to bypass, invalidated, and otherwise screw up security quite like a living, breathing human being.
Security is designed to make us feel safe. Door locks keep out casual prowlers. Alarm systems alert us when our home or business is violated. That warm fuzzy feeling we get when we know the locks are engaged and we are truly secure is one of bliss.
But when security gets in our way, it’s annoying. Think of all the things in your life that would be easier if people just stopped trying to make you secure. Airport security is the first that comes to mind. Or the annoying habit of needing to show your ID when you make a credit card purchase. How about systems that scan your email for data loss prevention (DLP) purposes and kick back emails with sensitive data that you absolutely need to share?
Security only benefits us when it’s Continue reading
Because Watson can't do it all.
Distil CEO mentions they are looking into another small acquisition.
Secure-hosting specialist Armor reaches into other clouds.
Savvius' Vigil 2.0 will complement IBM QRadar in archiving suspicious network traffic.