IT pros need to weigh in on that ‘sassy’ security model

Cloud services that provide both network and security intelligence are gaining popularity because they are easy to consume and they improve agility. Similarly, a model known as SD-Branch is providing network and security functionality at the WAN edge on a single platform.Both of these trends have contributed to the development by Gartner of a network architecture known as the secure-access service edge or SASE, which “converges network (for example, software-defined WAN) and network security services (such as [secure web gateways], [cloud access security brokers] and firewall as a service).” SASE (pronounced “sassy”) would primarily be delivered as a cloud-based service, Gartner says.To read this article in full, please click here

Cisco software fortifies industrial IoT security

Cisco is looking to better protect myriad edge-attached IoT devices with new security software that promises to protect industrial assets in one of the most disparate of network environments.The company rolled out what it called an overarching security architecture for Industrial IoT (IIoT) environments that includes existing products but also new software called Cisco Cyber Vision, for the automated discovery of industrial assets attached to Cisco’s extensive IIoT networking portfolio. More about edge networkingTo read this article in full, please click here

Showing memory usage in Linux by process and user

There are a lot of tools for looking at memory usage on Linux systems. Some are commonly used commands like free and ps while others are tools like top that allow you to display system performance stats in various ways. In this post, we’ll look at some commands that can be most helpful in identifying the users and processes that are using the most memory.Here are some that address memory usage by process.Using top One of the best commands for looking at memory usage is top. One extremely easy way to see what processes are using the most memory is to start top and then press shift+m to switch the order of the processes shown to rank them by the percentage of memory each is using. Once you’ve entered shift+m, your top output should reorder the task entries to look something like this:To read this article in full, please click here

Daily Roundup: Cisco Joins On-Prem Kubernetes Party

Cisco joined the on-premises Kubernetes party; the U.K. banned Huawei from 5G core networks; and...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

There’s no evidence the Saudis hacked Jeff Bezos’s iPhone

There's no evidence the Saudis hacked Jeff Bezos's iPhone.

This is the conclusion of the all the independent experts who have reviewed the public report behind the U.N.'s accusations. That report failed to find evidence proving the theory, but instead simply found unknown things it couldn't explain, which it pretended was evidence.


This is a common flaw in such forensics reports. When there's evidence, it's usually found and reported. When there's no evidence, investigators keep looking. Todays devices are complex, so if you keep looking, you always find anomalies you can't explain. There's only two results from such investigations: proof of bad things or anomalies that suggest bad things. There's never any proof that no bad things exist (at least, not in my experience).

Bizarre and inexplicable behavior doesn't mean a hacker attack. Engineers trying to debug problems, and support technicians helping customers, find such behavior all the time. Pretty much every user of technology experiences this. Paranoid users often think there's a conspiracy against them when electronics behave strangely, but "behaving strangely" is perfectly normal.

When you start with the theory that hackers are involved, then you have an explanation for the all that's unexplainable. It's all Continue reading

VMware Loses $237M Patent Infringement Lawsuit

Densify, a startup that makes cloud and container resource management software, accused VMware of...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

How to decrypt WhatsApp end-to-end media files

At the center of the "Saudis hacked Bezos" story is a mysterious video file investigators couldn't decrypt, sent by Saudi Crown Prince MBS to Bezos via WhatsApp. In this blog post, I show how to decrypt it. Once decrypted, we'll either have a smoking gun proving the Saudi's guilt, or exoneration showing that nothing in the report implicated the Saudis. I show how everyone can replicate this on their own iPhones.

The steps are simple:
  • backup the phone to your computer (macOS or Windows), using one of many freely available tools, such as Apple's own iTunes app
  • extract the database containing WhatsApp messages from that backup, using one of many freely available tools, or just hunt for the specific file yourself
  • grab the .enc file and decryption key from that database, using one of many freely available SQL tools
  • decrypt the video, using a tool I just created on GitHub

End-to-end encrypted downloader

The FTI report says that within hours of receiving a suspicious video that Bezos's iPhone began behaving strangely. The report says:
...analysis revealed that the suspect video had been delivered via an encrypted downloader host on WhatsApp’s media server. Due to WhatsApp’s end-to-end encryption, the contents Continue reading

Nutanix and HPE Team Up Together to Deliver Cloud Simplicity On-Premises

Though the customer takes delivery of the HPE systems with Nutanix software on-site or at the...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

January Virtual Meetup Recap: Improve Image Builds Using the Features in BuildKit

This is a guest post by Docker Captain Nicholas Dille, a blogger, speaker and author with 15 years of experience in virtualization and automation. He works as a DevOps Engineer at Haufe Group, a digital media company located in Freiburg, Germany. He is also a Microsoft Most Valuable Professional.

In this virtual meetup, I share how to improve image builds using the features in BuildKit. BuildKit is an alternative builder with great features like caching, concurrency and the ability to separate your image build into multiple stages – which is useful for separating the build environment from the runtime environment. 

The default builder in Docker is the legacy builder. This is recommended for use when you need support for Windows. However, in nearly every other case, using BuildKit is recommended because of the fast build time, ability to use custom BuildKit front-ends, building stages in parallel and other features.

Catch the full replay below and view the slides to learn:

  • Build cache in BuildKit – instead of relying on a locally present image, buildkit will pull the appropriate layers of the previous image from a registry.
  • How BuildKit helps prevent disclosure of credentials by allowing files to Continue reading

Cloud, Software Revenues Prop Up Juniper’s Q4 Earnings

Cloud revenues continued to be a sweet spot for the networking vendor. The vertical saw strong...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

FCC Greenlights Shared Spectrum in CBRS Band

The effort, which eventually gathered buy-in from multiple federal agencies and 159 members of the...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

BrandPost: 2020 Trends for the Evolving Data Center, Part 1

There’s no question that we will continue to experience massive data growth in 2020. The question for data center architects is how to manage this unprecedented influx of data and future-proof enterprise infrastructures for the next decade’s Zettabyte Age. From emerging architectures to adoption of composable disaggregated storage to greater TCO value, Western Digital executives weigh in on top data center trends for 2020 in this first of a 2-part series.To read this article in full, please click here

Huawei 5G Equipment Barred From UK Core Networks

The ban basically limits the use of Huawei equipment to the network RAN, and even then to just 35%...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Kernel of Truth: Season 3 Teaser

Subscribe to Kernel of Truth on iTunes, Google Play, SpotifyCast Box and Sticher!

Click here for our previous episode.

In this episode, we tease what’s coming up for Kernel of Truth’s season 3. Be sure to subscribe to this podcast if you haven’t already so you’re notified when the first episode for season 3 is posted or follow us on Facebook, Twitter and LinkedIn. For behind-the-scenes look of life at Cumulus Networks, follow us on Instagram too.

This Data Privacy Day It’s the Little Things That Count

Today we’re celebrating Data Privacy Day, which is all about empowering people and organizations to respect privacy, safeguard data, and enable trust.

Let’s face it, protecting your privacy can feel overwhelming. It can seem like we conduct our entire lives online and it’s hard not to notice headlines about our privacy being undermined, like law enforcement trying to gain access to encrypted data. But whether you know it or not, you’re making choices about what you share and how you share it each day. These seemingly-small actions can make a big impact.

You might already be doing some of these, but here are six actions you can take to protect your privacy:

  • Use end-to-end encrypted messaging apps. Switch to using messaging apps that offer end-to-end encryption, such as WhatsApp, Signal, Threema, and Telegram. Some are better than others, so make sure to read the reviews.
  • Turn on encryption on your devices or services. Some devices or services will offer encryption, but not set it as the default. Make sure to turn on encryption.
  • Use strong passwords. Do not just use a default password, a simple guessable password, or a password that uses personal information, such as your pet’s name. Continue reading

BrandPost: Scaling Secure SD-WAN Across Hundreds of Branch Offices

Digital Innovation at the Branch Requires SD-WAN Most organizations with multiple locations are in the process of implementing a distributed networking strategy that ensure that all branch offices and users are able to take advantage of ongoing digital innovation efforts. For true cross-organizational collaboration, productivity enhancement, and improved user experience, every user needs access to essential business applications. To achieve this, they need highly flexible and scalable access to cloud-based applications and resources, direct access to the internet, and on-demand connections to other users and devices.That’s simply not possible with traditional hub-and-spoke branch networking models built around WAN routers and a fixed MPLS connection. Business applications, especially those that deliver rich media or enable highly flexible collaboration between users and locations – such as unified communications, Office 365, and similar tools – require massive amounts of bandwidth. And in a traditional model, all of that traffic needs to be backhauled through the core network. Multiply that by scores of remote workers located in dozens of remote offices and you can quickly overwhelm internal servers, compute resources, and even security and inspection tools.To read this article in full, please click here

Cisco helps IT and DevOps troubleshoot hybrid-cloud apps

Cisco has taken the wraps off of new tools it says will boost on-premises or cloud application performance by helping IT and devops work together to automate and more quickly resolve software problems.The new tools include a package from Cisco AppDynamics that lets customers track the key components users interact with as they use enterprise applications. Cisco paid $3.7 billion for AppDynamics three years ago for its application-performance monitoring and problem-resolution automation technology.  The idea was to develop products and applications that would give customers better end-to-end visibility of the IT infrastructure, including cloud, devices, security, network, compute and applications.To read this article in full, please click here

Cisco helps IT and DevOps troubleshoot hybrid-cloud apps

Cisco has taken the wraps off of new tools it says will boost on-premises or cloud application performance by helping IT and devops work together to automate and more quickly resolve software problems.The new tools include a package from Cisco AppDynamics that lets customers track the key components users interact with as they use enterprise applications. Cisco paid $3.7 billion for AppDynamics three years ago for its application-performance monitoring and problem-resolution automation technology.  The idea was to develop products and applications that would give customers better end-to-end visibility of the IT infrastructure, including cloud, devices, security, network, compute and applications.To read this article in full, please click here