Recently when logging into one of my credit card providers, I was greeted by a familiar screen. After entering in my username, the service asked me to supply 3 random characters from my password to validate ownership of my account.
It is increasingly common knowledge in the InfoSec community that this practice is the antithesis of, what we now understand to be, secure password management.
For starters; sites prompting you for Partial Password Validation cannot store your passwords securely using algorithms like BCrypt or Argon2. If the service provider is ever breached, such plain-text passwords can be used to login to other sites where the account holder uses the same password (known as a Credential Stuffing attack).
Increased difficulty using long, randomly-generated passwords from Password Managers, leads to users favouring their memory over securely generated unique passwords. Those using Password Managers must extract their password from their vault, paste it somewhere else and then calculate the correct characters to put in. With this increased complexity, it further incentivises users to (re-)use simple passwords they can remember and count off on their fingers (and likely repeatedly use on other sites).
This is not to distinct thinking that originally bought us complex Continue reading
Holidays are a great time of year to take a moment and reflect. In 2018 at VMware Networking & Security, we’ve had yet another exciting year for us—we’re very proud of many achievements. For example, NSX now being deployed by 82% of Fortune 100 companies is a substantial industry adoption data point. But rather than focus on those numbers, I wanted to take a moment to highlight one of our biggest accomplishments this year (in my opinion). Oh, and in case you missed some of those 2018 highlights, you can catch a replay of Tom Gillis’ keynote Building the Network of the Future with the Virtual Cloud Network from VMWorld US 2018.
Earlier this year (the end of April to be precise), at Dell Technologies World, we had our external launch of the Virtual Cloud Network. The problem statement was simple: our customers were embarking on a digital transformation journey in their respective lines of business and with those efforts came challenges around a new level of networking complexity. Their goal within their organizations was to move from centralized data centers to hyper-distributed centers of applications and data, typically spanning multiple locations, multiple geos, Continue reading
IoT devices have two types of update mechanisms: an API call or user-initiated update. Phosphorus covers all that with its update-all button for IoT.
The latest flaw was coincidentally announced on the same day as the latest version of Kubernetes was released. Project members said security concerns do not impact the release cycle.
According to reports, the deal was cleared after Deutsche Telekom and SoftBank offered to stop using Huawei equipment.
The managed firewall, integrated with CenturyLink’s Security Log Monitoring platform, gives companies better threat intelligence capabilities and visibility across their hybrid network environments.
The networking-focused hardware is built for the Open19 Foundation infrastructure platform.
The two groups will combine memberships to develop industry guidance and best practices for Industrial IoT as well as fog and edge computing.
On average, it takes $10,500 for a wish. And the Foundation must balance the need to grant wishes with the need to update its IT infrastructure.
I’m spending the week in some great company at Security Field Day with awesome people. They’re really making me think about security in some different ways. Between our conversations going to the presentations and the discussions we’re having after hours, I’m starting to see some things that I didn’t notice before.
Watch the embedded demo below or view on the NSX YouTube channel here to see several cool NSX-T networking and security capabilities within VMware Cloud on AWS. The demo shows connectivity from VMware Cloud on AWS SDDC to on-prem via AWS Direct Connect Private VIF. Access to native AWS services from VMware Cloud on AWS SDDC is also shown. Additionally, Edge security policies, distributed firewall/micro-segmentation, and port mirroring are demonstrated. Continue reading
The company was pretty revolutionary with its idea to layer SDN on top of multiple third-party transport before all the SD-WAN vendors conceived of this.
The service provider is hoping to launch a cost-effective uCPE platform that supports more VNFs along with its SD-WAN early next year.
DPDK has extended its reach beyond packet processing and could be a universal API for other acceleration functions needed for effective NFV.
The big hyperscalers use field programmable gate array technology on standard servers in their data centers. But there’s a trend for other enterprises to emulate these hyperscalers.
Adding these policy-based security capabilities to the Pivot3 Intelligence Engine enables customers to integrate data encryption and key management into the same workflow for managing applications and storage.
Etcd is the primary storage location for Kubernetes and needs to be established before Kubernetes can be run on a system.