The service provider is hoping to launch a cost-effective uCPE platform that supports more VNFs along with its SD-WAN early next year.
DPDK has extended its reach beyond packet processing and could be a universal API for other acceleration functions needed for effective NFV.
The big hyperscalers use field programmable gate array technology on standard servers in their data centers. But there’s a trend for other enterprises to emulate these hyperscalers.
Adding these policy-based security capabilities to the Pivot3 Intelligence Engine enables customers to integrate data encryption and key management into the same workflow for managing applications and storage.
Etcd is the primary storage location for Kubernetes and needs to be established before Kubernetes can be run on a system.
The collaboration focuses on the three biggest container pain areas for enterprises: 1) networking; 2) visibility; and 3) security.
On April 4, 2018, the Canadian Multistakeholder Process: Enhancing Internet of Things (IoT) Security held its first convening in partnership with the Canadian Internet Registration Authority (CIRA); CANARIE; Innovation, Science and Economic Development (ISED) Canada; and the Canadian Internet Policy and Public Interest Clinic (CIPIC). Over 80 participants from government, academia, public interest, industry, and other organizations attended the first meeting and many have continued to engage at in-person and virtual meetings ever since. Over the past eight months, this group has experienced significant success in the areas of consumer education, labeling, and network resiliency. And these achievements have been well-noted on a global scale.
A delegation from Senegal came to Canada in July to meet with members of the Enhancing IoT Security oversight committee. The group was comprised of government officials, Senegal Chapter members, and staff from the Internet Society’s African Bureau. The delegation met with Canadian government officials, technologists, public interest groups, and North American Bureau staff to learn more about how and why the IoT security project was initiated, and what the group had accomplished to date. The group discussed the significant successes the Canadian multistakeholder group had already achieved, the challenges it faced, Continue reading
The NSX Service Mesh beta will initially support Cloud PKS (formerly known as VMware Kubernetes Engine or VKE), but VMware plans to extend it to any Kubernetes environment.
SDxCentral Weekly Wrap for Dec. 7, 2018: Huawei deals with a new scandal, Symantec's shakeup continues, and more of what you missed this week.
Huawei's' chief financial officer who is also the daughter of the founder of Huawei, was arrested in Canada at the request of the United States. The reason for the arrest has not been disclosed.
Regardless of size cybersecurity has become a massive source of frustration for organizations all sizes. A greater percentage of IT spending is now being consumed by cybersecurity products and services.
Achieving standard, commodity uCPEs will be a longer journey than anticipated.
It affects all Kubernetes-based products and services, and it gives hackers full administrative privileges on any compute node being run in a Kubernetes cluster.
“If you have an IoT device and it has any vulnerability and it’s visible from the Internet, it will be attacked in a number of minutes,” said Kevin McNamee, director of Nokia’s Threat Intelligence Lab and lead author of the report.
How do we coordinate responses to attacks against Internet infrastructure and users? Internet technology has to scale or it won’t survive for long as the network of networks grows ever larger. But it’s not just the technology, it’s also the people, processes and organisations involved in developing, operating and evolving the Internet that need ways to scale up to the challenges that a growing global network can create.
One such challenge is unwanted traffic, ranging from spam and other forms of messaging-related abuse to multi-gigabit distributed denial of service attacks. Numerous incident response efforts exist to mitigate the effects of these attacks. Some are focused on specific attack types, while others are closed analysis and sharing groups spanning many attack types.
We are helping to bring together operators, researchers, CSIRT team members, service providers, vendors, information sharing and analysis centre members to discuss approaches to coordinating attack response at Internet scale. The Internet Society is sponsoring a two-day “Coordinating Attack Response at Internet Scale (CARIS) Workshop” intended to help build bridges between the many communities working on attack response on the Internet and to foster dialogue about how we can better collaborate.
The workshop will take place on February 28 Continue reading
New capabilities allow security teams to create custom data collectors in the appliance using threat data from any Juniper or third-party firewall. This eliminates the need for custom code or pre-defined integrations.
The executive team shakeup caps a tumultuous year for the company that recently concluded an internal investigation into financial disclosures and announced plans to cut about 8 percent of its global workforce.
One of the points David Gee, a guest speaker in Spring 2019 Building Networking Automation Solutions online course, and Christoph Jaggi touched on in their interview was the security of network automation solutions (see also: automated workflows and hygiene of network automation).
What are the security risks for automation?
Security is an approach, not an afterthought.
Read more ...Securify: practical security analysis of smart contracts Tsankov et al., CCS’18
Sometimes the perfect is the enemy of the good. When we’re talking about securing smart contracts, we need all the help we can get! Bugs can cost millions of dollars. Securify uses a set of expert heuristics (patterns) to help identify issues in smart contracts. It’s available at https://securify.ch, has analysed over 18K uploaded contracts, and is used by security auditors as part of their arsenal.
The increased adoption of smart contracts demands strong security guarantees. Unfortunately, it is challenging to create smart contracts that are free of security bugs. As a consequence, critical vulnerabilities in smart contracts are discovered and exploited every few months. In turn, these exploits have led to losses reaching millions worth of USD in the past few years…. Despite their potential, repeated security concerns have shaken the trust in handling billions of USD by smart contracts.
Too right! We’ve examined some of the challenges involved in creating correct smart contracts in previous editions of The Morning Paper, as well as tools such as Zeus that help with verification.
It’s not a solvable problem in the general case (i.e., ‘perfect’ Continue reading