Working Together with APNIC on Routing Security and MANRS in Asia Pacific

The Internet Society and APNIC signed a Memorandum of Understanding (MoU) to cooperate in supporting the MANRS initiative in the Asia Pacific Region. Paul Wilson (APNIC) and Rajnesh Singh (ISOC) signed the MoU in Brisbane, Australia on 13 June 2018.

It’s an exciting moment for everyone who believes that Internet routing security issues can be resolved through collaboration, providing limitless opportunities for good. The MoU formalises the existing long-term relationship between the two organizations to have a global, open, stable and secure Internet.

The MoU focuses on capacity building to undertake initiatives and activities to promote awareness of MANRS in the Asia-Pacific region, to cooperate and render mutual assistance, and to encourage the attendance of APNIC members to meetings, seminars, workshops and/or conferences on routing security.

Both organizations have agreed to exchange research information and training materials (whether printed, audio or visual) related to routing security in general. APNIC has a proven record of delivering hands-on and online quality training and providing analytical research data.

We look forward to welcoming more MANRS members from the Asia Pacific region, and working together with APNIC to improve routing security around the world.

The post Working Together with APNIC on Routing Security and Continue reading

HPE puts enterprise software applications at the edge network

CIOs, network administrators and data-center managers who see a need to run full-fledged, unmodified enterprise software at the edge of their networks, on factory floors and oil rigs, now have an opportunity to do so.HPE is certifying complete enterprise software stacks for its EdgeLine converged infrastructure devices, allowing enterprises to run the exact same applications in the data center, in the cloud or at the network edge.[ Check out AI boosts data-center availability, efficiency. Also learn what hyperconvergence is and whether you’re ready for hyperconverged storage. | For regularly scheduled insights sign up for Network World newsletters. ] The certifications will cover software from vendors including Microsoft, SAP, PTC, SparkCognition and Citrix to run on its EdgeLine EL 1000 and EdgeLine EL4000 systems, the company said Wednesday at its Discover conference in Las Vegas.To read this article in full, please click here

HPE puts enterprise software applications at the edge network

CIOs, network administrators and data-center managers who see a need to run full-fledged, unmodified enterprise software at the edge of their networks, on factory floors and oil rigs, now have an opportunity to do so.HPE is certifying complete enterprise software stacks for its EdgeLine converged infrastructure devices, allowing enterprises to run the exact same applications in the data center, in the cloud or at the network edge.[ Check out AI boosts data-center availability, efficiency. Also learn what hyperconvergence is and whether you’re ready for hyperconverged storage. | For regularly scheduled insights sign up for Network World newsletters. ] The certifications will cover software from vendors including Microsoft, SAP, PTC, SparkCognition and Citrix to run on its EdgeLine EL 1000 and EdgeLine EL4000 systems, the company said Wednesday at its Discover conference in Las Vegas.To read this article in full, please click here

GitHub Microsoft – It’s OK

Microsoft buys GitHub, and most of the press has been pretty positive, even from those you might not expect.

But , of course there’s the usual herp-derp comments, and a big spike in moving repos to Gitlab

Most of those repositories will be inconsequential single-user repos, but it is still so much wasted effort. If your knee-jerk reaction is to immediately stop doing real work, and move your code somewhere else, you haven’t been paying attention. The world has moved on.

Back in 2014 I wrote Keep an Open Mind:

I get frustrated because these people aren’t paying attention to what Microsoft has been doing. They have come a very long way since the 2002 Bill Gates email setting security as the top priority. It’s a big ship to turn, and it took time. Their overall security model and practices are far better than they were, and stability is no longer an issue. Their business strategy is very different now too.

But poor Continue reading

Making Compose Easier to Use with Application Packages

Docker Compose is wildly popular with developers for describing an application. In fact, there are more than 300,000 Docker Compose files on GitHub. With a set of services described in a docker-compose.yml file, it’s easy to launch a complex multi-service application (or a simple, single-service app) on Docker by running a single command. This ease of use makes Docker Compose perfect for development teams striving for a quick way of getting started with projects.

Over time Compose has evolved, adding lots of features which help when deploying those same applications to production environments, for example specifying a number of replicas, memory resource constraints or a custom syslog server. But those attributes can become specific to your own environment. There are a number of different strategies for trying to address this situation, but the most common is relying on copy and paste. It’s fairly common to maintain multiple Compose files for the same application running in different environments for example. This leads to two problems:

  1. We share Docker images all the time, but don’t have a good way of sharing the multi-service applications that use them
  2. It’s hard to collaborate between developers and operators around a Compose file. This waters Continue reading

Datanauts 139: Getting AWS Security Right

AWS security issues show up in tech news fairly often. Today, we talk with someone who wrote about AWS services other than S3 that were found exposed to the public. Could that be some of your services?

Could be. The numbers are pretty impressive. Stay tuned, and find out how to determine whether or not your EBS snapshots, RDS snapshots, AMIs, or ElasticSearch clusters are accidentally public.

Our guest is Scott Piper, an AWS security consultant for Summit Route. You can follow him on Twitter at @0xdabbad00.

We start by exploring the types of AWS resources that can be unintentionally exposed to the public Internet, how to find them, and how to lock them down.

Then we talk about general practices such as vulnerability scanning, how to minimize human error when configuring AWS services, and drill into options such as CloudMapper and Security Monkey, open-source tools to help administrators find and control AWS resources.

Show Links:

Scott Piper on Twitter

Scott Piper’s blog – Duo.com

Scott Piper on GitHub – GitHub

Beyond S3: Exposed Resources on AWS – Duo.com

flAWS Challenge

CloudMapper – GitHub

CloudTracker – GitHub

Netflix Security Monkey – GitHub

Datanauts 086: AWS Identity & Access Continue reading