If that happens, neither side will look good in the short term. The FBI won’t look good because it went to court and claimed it had no alternatives when an alternative existed. The whole case was for nothing, which will raise suspicions about why the government filed the case and the timing of this new discovery. But Apple won’t look good either. Apple claimed that the sky would fall if it had to create the code in light of the risk outsiders might steal it and threaten the privacy of everyone. If outsiders already have a way in without Apple’s help, then the sky has already fallen. Apple just didn’t know Continue reading
According to the police report and interviews with officials, none of the attackers’ emails or other electronic communications have been found, prompting the authorities to conclude that the group used encryption. What kind of encryption remains unknown, and is among the details that Mr. Abdeslam’s capture could help reveal.
Welcome to Technology Short Take #63. I’ve managed to (mostly) get back to my Friday publishing schedule, though I’m running much later in the day this time around than usual. I’ll try to correct that for the next one. In any case, here’s another collection of links and articles from around the Net on the major data center technology areas. Have fun reading!
Companies have struggled for years on how to allow third parties access to specific systems that they manage or support? These systems and access requirements range from HVAC and phones systems to full IT outsourcing or development.
The problem has always been twofold; one, how to provide secure access into the datacenter, and two, how do you secure the third party access to only the systems they require access to. Basically, how do you limit the hop to hop once they are inside your datacenter.
In the paper, I show you how leveraging VMware’s NSX and VMware Horizon products, you now have two different deployment modules that will allow you to control third party access and restrict that user’s inter-datacenter hopping abilities.
Here you will find the full paper: https://communities.vmware.com/docs/DOC-31415
Hadar
The post Securing Access to and from your Jump Box and VDI with VMware NSX appeared first on The Network Virtualization Blog.
The debate on encryption has heated up significantly in the last couple of months. Most of the recent discussion has revolved around a particular device in a specific case but encryption is older than that. Modern encryption systems represent the culmination of centuries of development of making sure things aren’t seen.
Did you know that twenty years ago the U.S. Government classified encryption as a munition? Data encryption was classified as a military asset and placed on the U.S. Munitions List as an auxiliary asset. The control of encryption as a military asset meant that exporting strong encryption to foreign countries was against the law. For a number of years the only thing that could be exported without fear of legal impact was regular old Data Encryption Standard (DES) methods. Even 3DES, which is theoretically much stronger but practically not much better than it’s older counterpart, was restricted for export to foreign countries.
While the rules around encryption export have been relaxed since the early 2000s, there are still some restrictions in place. Those rules are for countries that are on U.S. Government watch lists for terror states or governments deemed “rogue” states. Continue reading
Security service provider focuses on zero-trust computing.
Kentik turns NetFlow, BGP, GeoIP and other network data into actionable intelligence for network monitoring, DDoS detection, peering analytics, and planning.
The post Analyzing NetFlow Details To Go Beyond DDoS Detection appeared first on Packet Pushers.
Kentik turns NetFlow, BGP, GeoIP and other network data into actionable intelligence for network monitoring, DDoS detection, peering analytics, and planning.
The post Analyzing NetFlow Details To Go Beyond DDoS Detection appeared first on Packet Pushers.
Last fall, the Interior Minister of Ukraine announced the creation of a national Cyberpolice (Кіберполіцію) to protect the country from everything from credit card fraud to malware. Here’s something that would be great to add to their list: fraudulent BGP routing out of Ukraine. Last year, we reported on an incident in which Ukrainian ISP Vega hijacked routes from British Telecom (including that of the UK’s Atomic Weapons Establishment), an event that could perhaps be chalked up to an innocent mistake. However, the fraudulent routing we’re now seeing from Ukraine is deliberately designed to go unnoticed. We’ll review some of this new behavior in this blog.
Governments take note
The profile of this issue has grown in the past year as governments have had to respond to their address space being fraudulently used. Last July, the Dutch Minister of Foreign Affairs (pictured right) was confronted with parliamentary questions concerning an incident where “attackers” had commandeered IP address space belonging to the Ministry of Foreign Affairs the previous year. In that incident, on 18 November 2014, Decision Marketing (AS62228) out of Sofia, Bulgaria began globally announcing eleven BGP routes that did not belong to Continue reading |
The government is right that the software must be signed by Apple and made to only work on Farook's phone, but the situation is more complicated than that.Tech help: What are the best responses to DOJ claims in new Apple/FBI brief re whether code could be misused? Thks. pic.twitter.com/V08EcV9Rev— Orin Kerr (@OrinKerr) March 11, 2016
Startup Cato Networks combines cloud security services and SD-WAN techniques to build a single, logical network optimized for traffic protection.
The post Startup Radar: Cato Networks Offers Unified Security Via SD-WAN appeared first on Packet Pushers.
Startup Cato Networks combines cloud security services and SD-WAN techniques to build a single, logical network optimized for traffic protection.
The post Startup Radar: Cato Networks Offers Unified Security Via SD-WAN appeared first on Packet Pushers.
Little security company has been latching onto some big names.
Versa recently added SD-security to its SD-WAN.
Let's face it, security is overcrowded.
In December of 2014 I wrote an article about a legal agreement that was discouraging network operators from implementing an important Internet security function. I am happy to report, the situation has improved: ARIN no longer requires operators explicitly accept a click-through agreement in order to access the Trust Anchor Locator (TAL). Resource Public Key […]
The post RPKI ARIN Agreement Update appeared first on Packet Pushers.
In December of 2014 I wrote an article about a legal agreement that was discouraging network operators from implementing an important Internet security function. I am happy to report, the situation has improved: ARIN no longer requires operators explicitly accept a click-through agreement in order to access the Trust Anchor Locator (TAL). Resource Public Key […]
The post RPKI ARIN Agreement Update appeared first on Packet Pushers.