The company said AIOps has the potential to significantly reduce downtime, enable faster fault...
If the Pentagon suffers a security breach, there’s a lot more to worry about than cost. That’s...
The Google angle hardens the underlying Google Kubernetes Engine node against rootkits and...
Here are some of the most prominent venture capital and merger and acquisition news items from...
AquaSec’s Daniel Sagi recently authored a blog post about DNS spoofing in Kubernetes. TLDR is that if you use default networking in Kubernetes you might be vulnerable to ARP spoofing which can allow pods to spoof (impersonate) the IP addresses of other pods. Since so much traffic is dialed via domain names rather than IPs, spoofing DNS can allow you to redirect lots of traffic inside the cluster for nefarious purposes.
So this is bad, right? Fortunately, Calico already prevents ARP spoofing out of the box. Furthermore, Calico’s design prevents other classes of spoofing attacks. In this post we’ll discuss how Calico keeps you safe from IP address spoofing, and how to go above and beyond for extra security.
ARP spoofing is an attack that allows a malicious pod or network endpoint to receive IP traffic that isn’t meant for it. Sagi’s post already describes this well, so I won’t repeat the details here. An important thing to note, however, is that ARP spoofing only works if the malicious entity and the target share the same layer 2 segment (e.g. have direct Ethernet connectivity). In Calico, the network is fully routed at layer 3, meaning that Continue reading
In the new era of 5G, mobile network operators have the opportunity to move up the value chain and...
The vendor claims it competes against companies like Amazon, Cisco, and Oracle. It also directly...
Cisco issued a patch for a critical bug in its IOS XE operating system that could allow a remote...
Today we are announcing the general availability of API Tokens - a scalable and more secure way to interact with the Cloudflare API. As part of making a better internet, Cloudflare strives to simplify manageability of a customer’s presence at the edge. Part of the way we do this is by ensuring that all of our products and services are configurable by API. Customers ranging from partners to enterprises to developers want to automate management of Cloudflare. Sometimes that is done via our API directly, and other times it is done via open source software we help maintain like our Terraform provider or Cloudflare-Go library. It is critical that customers who are automating management of Cloudflare can keep their Cloudflare services as secure as possible.
Securing software systems is hard. Limiting what a piece of software can do is a good defense to prevent mistakes or malicious actions from having greater impact than they could. The principle of least privilege helps guide how much access a given system should have to perform actions. Originally formulated by Jerome Saltzer, “Every program and every privileged user of the system should operate using Continue reading
IBM and Orange Business Services top the list of U.K. SDN vendors, according to an ISG report that...
Toronto-based cloud services provider OnX Canada is now offering Cisco's SD-WAN as a managed...
“Part of winning is that with great power comes great responsibility,” noted Red Hat CTO Chris...
Check Point expanded its CloudGuard portfolio with the launch of two new security suites aimed at...
VMware rolled out updates to its NSX networking platform including a new analytics engine and load...
Rackspace rolled out five new enhancements to its hybrid cloud portfolio aimed at helping customers...
Mellanox today introduced a pair of SmartNICs for data center servers and storage systems at...
IBM predicts that due to the rate of progress in quantum computing data protected by current...