The virtual tour will, however, require users to sign up for a 30-day trial of Juniper's Contrail...
Aviatrix's CEO claimed SD-WAN is dead and that AWS killed it; VMware's CEO taunted IBM for paying...
Grab your tinfoil hat and a champagne cocktail, snuggle up in front of a warm fireplace, and check...
Aviatrix CEO Steve Mullaney raised eyebrows earlier this month when he predicted the demise of the...
Huawei struck back at a report claiming the Chinese vendor benefitted from government subsidies...
Broadcom paid $10.7B for Symantec; Cisco bought Acacia Communications for $2.6B; plus 2019's...
JR Rivers left Cumulus Networks for AWS; Nutanix’s Sunil Potti joined Google; plus 2019's biggest...
The past year was highlighted by ongoing security and commercialization challenges around business...
The bug was initially spotted by Cisco in June 2018 and given a “critical” rating.
SDxCentral Weekly Wrap for Dec. 30, 2019: The SD-WAN space has become a numbers game; Google Cloud...
Shape boasts that it protects more accounts from fraud than everyone else combined. Its customers...
“How do I enable GitOps for my network security policies?” This is a common question we hear from security teams. Getting started with Kubernetes is relatively simple, but moving production workloads to Kubernetes requires alignment from all stakeholders – developers, platform engineering, network engineering, and security.
Most security teams already have a high-level security blueprint for their data centers. The challenge is in implementing that in the context of a Kubernetes cluster and workload security. Network policy is a key element of Kubernetes security. Network policy is expressed as a YAML configuration and works very well with GitOps.
We will do a three-part blog series covering GitOps for network security policies. In part one (this part), we cover the overview and getting started with a working example tutorial. In part two, we will extend the tutorial to cover an enterprise-wide decentralized security architecture. In the final part, we will delve into policy assurance with examples.
Note that all policies in Calico Enterprise (network security policy, RBAC, threat detection, logging configuration, etc.) are enforced as YAML configuration files, and can be enforced via a GitOps practice.
By adopting GitOps, security teams benefit in the following ways:
Those receiving SD-WAN gifts include Hughes Networks, Braskem, and Impulse Advanced...
In April 2019 the Internet Society’s Online Trust Alliance released its 10th annual Online Trust Audit & Honor Roll. The Audit looks at the security and privacy practices of over 1,000 of the top sites in various sectors. The news and and media sector, compromised of the top 100 news and media sites according to US traffic to their websites, improved its privacy practices in 2018. Like most sites, however, there is still room for improvement in privacy statements.
In 2017 less than half (48%) of news and media sites made the Honor Roll. In 2018 that number went up significantly to 78%, largely due to improvements in privacy statements. Privacy is scored in two ways in the Audit, we look at trackers on each site and we score the privacy statements across over 30 criteria.
One area where news sites did not improve was in the use of trackers on their site. Out of all the sectors news and media scored the lowest in trackers with a score of 39 (out of 45). Part of the reason for this is the news and media sector relies on advertising revenue, which often requires the use of trackers to serve ads.
Google Cloud made some big moves in 2019, but will they be enough to best top-ranked Amazon and...
Host-based segmentation is more effective at protecting data centers and clouds against lateral...
Late last month Cisco announced it had 20,000 SD-WAN customers spread across its Viptela and...
The chipmaker issued a patch for the vulnerability, which could allow attackers to change...
Hear from Corsa's Eduardo Cervantes and his thoughts on security, the data explosion, and why...