Kentik turns NetFlow, BGP, GeoIP and other network data into actionable intelligence for network monitoring, DDoS detection, peering analytics, and planning.
The post Analyzing NetFlow Details To Go Beyond DDoS Detection appeared first on Packet Pushers.
Kentik turns NetFlow, BGP, GeoIP and other network data into actionable intelligence for network monitoring, DDoS detection, peering analytics, and planning.
The post Analyzing NetFlow Details To Go Beyond DDoS Detection appeared first on Packet Pushers.
Last fall, the Interior Minister of Ukraine announced the creation of a national Cyberpolice (Кіберполіцію) to protect the country from everything from credit card fraud to malware. Here’s something that would be great to add to their list: fraudulent BGP routing out of Ukraine. Last year, we reported on an incident in which Ukrainian ISP Vega hijacked routes from British Telecom (including that of the UK’s Atomic Weapons Establishment), an event that could perhaps be chalked up to an innocent mistake. However, the fraudulent routing we’re now seeing from Ukraine is deliberately designed to go unnoticed. We’ll review some of this new behavior in this blog.
Governments take note
The profile of this issue has grown in the past year as governments have had to respond to their address space being fraudulently used. Last July, the Dutch Minister of Foreign Affairs (pictured right) was confronted with parliamentary questions concerning an incident where “attackers” had commandeered IP address space belonging to the Ministry of Foreign Affairs the previous year. In that incident, on 18 November 2014, Decision Marketing (AS62228) out of Sofia, Bulgaria began globally announcing eleven BGP routes that did not belong to Continue reading |
The government is right that the software must be signed by Apple and made to only work on Farook's phone, but the situation is more complicated than that.Tech help: What are the best responses to DOJ claims in new Apple/FBI brief re whether code could be misused? Thks. pic.twitter.com/V08EcV9Rev— Orin Kerr (@OrinKerr) March 11, 2016
Startup Cato Networks combines cloud security services and SD-WAN techniques to build a single, logical network optimized for traffic protection.
The post Startup Radar: Cato Networks Offers Unified Security Via SD-WAN appeared first on Packet Pushers.
Startup Cato Networks combines cloud security services and SD-WAN techniques to build a single, logical network optimized for traffic protection.
The post Startup Radar: Cato Networks Offers Unified Security Via SD-WAN appeared first on Packet Pushers.
Little security company has been latching onto some big names.
Versa recently added SD-security to its SD-WAN.
Let's face it, security is overcrowded.
In December of 2014 I wrote an article about a legal agreement that was discouraging network operators from implementing an important Internet security function. I am happy to report, the situation has improved: ARIN no longer requires operators explicitly accept a click-through agreement in order to access the Trust Anchor Locator (TAL). Resource Public Key […]
The post RPKI ARIN Agreement Update appeared first on Packet Pushers.
In December of 2014 I wrote an article about a legal agreement that was discouraging network operators from implementing an important Internet security function. I am happy to report, the situation has improved: ARIN no longer requires operators explicitly accept a click-through agreement in order to access the Trust Anchor Locator (TAL). Resource Public Key […]
The post RPKI ARIN Agreement Update appeared first on Packet Pushers.
Firewalls are nice, but the security industry is turning its gaze inward.
Dell's post-EMC lineup, plus headlines from RSA.