The entire cloud native ecosystem has begun to address enterprise needs.
In advance of Data Privacy & Protection Day, the Online Trust Alliance, an Internet Society initiative, just released the Cyber Incident & Breach Trends Report (press release here), a look back at the cyber incident trends in 2017 and what can be done to address them. This report marks the tenth year OTA has provided guidance in this area, and while the specifics have certainly changed over time, the core principles have not.
Originally we just looked at the number of reported breaches, but last year we broadened the definition to “cyber incidents,” which includes ransomware infections, business email compromise (BEC), distributed denial-of-service (DDoS) attacks and infiltrations caused by connected devices. This broader definition paints a more realistic picture of the threats and associated impact facing organizations today.
This year we found that the number of cyber incidents nearly doubled to 159,700 globally, and given that most incidents are not reported, this number could easily exceed 350,000. This is more than 30 times the number of breaches alone, so provides a very different perspective on the threat landscape. As in previous years we also assessed the “avoidability” of breaches by analyzing their cause and found that 93% were avoidable, Continue reading
ThousandEyes presented at Network Field Day 17 on Internet visibility, monitoring customer experience, and improving mean time to innocence for the network.
The post BiB 25: ThousandEyes At NFD17 – Expanding Into User Experience appeared first on Packet Pushers.
The update also gives customers a choice between two hypervisors.
To get straight to the point: nobody wants to have large grain snapshots of data for any dataset that is actually comprised of a continuous stream of data points. With the data storage and stream processing now so cost-effective (relatively speaking, of course) that anybody can do it – not just national security agencies or hedge funds and brokerages with big budgets – there is pent up demand for a SQL-friendly time series database.
So that is what the founders of Timescale set out to create. And while they are by no means alone in this market, the open source …
It’s About Time For Time Series Databases was written by Timothy Prickett Morgan at The Next Platform.
Follow this guidance to ensure the best user experience with AWS.
EVPN is one of the major reasons we’re seeing BGP used in small- and mid-sized data center fabrics. In theory, EVPN is just a BGP address family and shouldn’t have an impact on your BGP design. In practice, suboptimal implementations might invalidate that assumption.
I've described a few EVPN-related BGP gotchas in BGP in EVPN-Based Data Center Fabrics, a section of Using BGP in Data Center Leaf-and-Spine Fabrics article.
Alex raised a number of valid points in his comments to this blog post. While they don't fundamentally change my view on the subject, they do warrant a more nuanced description. Expect an updated version of this part of the article when I return from Cisco Live Europe
Juniper brings OpenContrail into the Linux Foundation & expands the commercial Contrail for security and multi-cloud. Recorded live at Network Field Day 17.
The post BiB 24: Juniper OpenContrail At NFD17 – One Fabric To Bind Them appeared first on Packet Pushers.
It sounds as if Cisco won't be using Skyport's hardware.
Thanks to all who joined us for the Big Switch Networks APM/NPM Report Webinar: Work Smarter, Not Harder – How to Use a Next-Gen NPB for greater ROI from your APM/NPM Tools. During the webinar, Big Switch Networks discussed how Big Mon integrates with leading APM/NPM tools, and how to integrate an SDN-based NPB solution into... Read more →