The open RAN framework is 40% cheaper than traditional telecommunication infrastructure, according...
The low-code vendor is Apple's only direct software play in the B2B space.
Nokia CEO walked the plank; VMware's winning streak came to a screeching halt; and Marvell injected...
When Cisco acquired Duo Security, Nather’s was the only CISO advisory team. Cisco quickly saw the...
The chips are designed to power networking equipment like switches, routers, secure gateways,...
SAP revamps organizational structure, exits 2 board members; coronavirus kills MWC Barcelona; and...
From the very beginning Cloudflare used Intel CPU-based servers (and, also, Intel components for things like NICs and SSDs). But we're always interested in optimizing the cost of running our service so that we can provide products at a low cost and high gross margin.
We're also mindful of events like the Spectre and Meltdown vulnerabilities and have been working with outside parties on research into mitigation and exploitation which we hope to publish later this year.
We looked very seriously at ARM-based CPUs and continue to keep our software up to date for the ARM architecture so that we can use ARM-based CPUs when the requests per watt is interesting to us.
In the meantime, we've deployed AMD's EPYC processors as part of Gen X server platform and for the first time are not using any Intel components at all. This week, we announced details of this tenth generation of servers. Below is a recap of why we're excited about the design, specifications, and performance of our newest hardware.
Every server can run every service. This architectural decision has helped us achieve higher efficiency across the Cloudflare network. It has also given us more Continue reading
The company began to lose momentum coming out of its latest fiscal year in which it made 10...
Huawei CSO mocked US security policy; Palo Alto Networks added X factor to $560M Demisto buy; and...
Perimeter-based security is no longer sufficient, security surfaces and compute demands are...
Palo Alto Network’s product announcement coincided with its quarterly earnings report, which fell...
Hacking isn’t new. If you follow the 2600 Magazine culture of know the name Mitnick or Draper you know that hacking has been a part of systems as long as their have been systems. What has changed in recent years is the malicious aspect of what’s going on in the acts themselves. The pioneers of hacking culture were focused on short term gains or personal exploitation. It was more about proving you could break into a system and getting the side benefit of free phone calls or an untraceable mobile device. Today’s hacking cultures are driven by massive amounts of theft and exploitation of resources to a degree that would make any traditional hacker blush.
It’s much like the difference between petty street crime and “organized” crime. With a patron and a purpose, the organizers of the individual members can coordinate to accomplish a bigger goal than was ever thought possible by the person on the street. Just like a wolf pack or jackals, you can take down a much bigger target with come coordination. I talked a little bit about how the targets were going to start changing almost seven years ago and how we needed to start figuring Continue reading
Security is a serious business, one that we do not take lightly at Cloudflare. We have invested a lot of effort into ensuring that our services, both external and internal, are protected by meeting or exceeding industry best practices. Encryption is a huge part of our strategy as it is embedded in nearly every process we have. At Cloudflare, we encrypt data both in transit (on the network) and at rest (on the disk). Both practices address some of the most common vectors used to exfiltrate information and these measures serve to protect sensitive data from attackers but, what about data currently in use?
Can encryption or any technology eliminate all threats? No, but as Infrastructure Security, it’s our job to consider worst-case scenarios. For example, what if someone were to steal a server from one of our data centers? How can we leverage the most reliable, cutting edge, innovative technology to secure all data on that host if it were in the wrong hands? Would it be protected? And, in particular, what about the server’s RAM?
Data in random access memory (RAM) is usually stored in the clear. This can leave data vulnerable to software or hardware probing by Continue reading
Huawei security concerns ignited RSA panel discussion; Airline exec dished advice to security...
The expansion more than doubles the reach of the U.S.-based carrier's SD-WAN service compared to a...
“We see a tremendous opportunity to create a multi-billion-dollar security company,” Poonen...
“We need to combine AI with that human apathy,” she said during an RSA keynote. “We need both...
A discussion with panelists from the U.S. Department of Defense, Huawei, a conservative think tank,...
Informed consent of genetic data is critical, but people aren’t always clear about what they are...