Introducing TLS with Client Authentication

In a traditional TLS handshake, the client authenticates the server, and the server doesn’t know too much about the client. However, starting now, Cloudflare is offering enterprise customers TLS with client authentication, meaning that the server additionally authenticates that the client connecting to it is authorized to connect.

TLS Client Authentication is useful in cases where a server is keeping track of hundreds of thousands or millions of clients, as in IoT, or in a mobile app with millions of installs exchanging secure information. For example, an IoT company can issue a unique client certificate per device, and then limit connections to their IoT infrastructure to only their devices by blocking connections where the client doesn’t present a certificate signed by the company’s certificate authority.

Or in the case of a mobile banking app, where the bank wants to ensure customers’ secure financial data doesn’t get stolen by bots spoofing their mobile app, they can issue a unique certificate to every app install and in the TLS handshake validate requests are coming from their mobile app. Client authentication is also useful for VPNs, enterprise networks or staging sites, where corporations and developers need to lock down connections to only laptops Continue reading

Greenbug’s DNS-isms

Over the past few months there has been a lot of research and press coverage on the Shamoon campaigns. These have been the attacks on Saudi Arabian companies where a destructive malware known as Disttrack was deployed. The malware, using stolen credentials, spreads throughout the […]

DockerCon 2017 Online meetup Recap

Weren’t able to attend DockerCon 2017 or looking for a refresher? Check out the recording and slides from the DockerCon 2017 Online Meetup highlights recap of all the announcements and highlights from DockerCon by Patrick Chanezon and Betty Junod.

Watch the General Session Talks

The videos and slides from general session day 1 and day 2 as well as the top rated sessions are already available. The rest of the DockerCon slides and videos will soon be published on our slideshare account and all the breakout session video recordings available on our DockerCon 2017 youtube playlist.

Learn more about the Moby Project

The Moby Project is a new open-source project to advance the software containerization movement and help the ecosystem take containers mainstream. Learn more here.

Moby Project by Docker

Learn More about LinuxKit

LinuxKit is toolkit for building secure, portable and lean operating systems for containers. Read more about LinuxKit.

LinuxKit

Learn More about the Modernize Traditional Applications Program:

The Modernize Traditional Applications (MTA) Program aims to help enterprises make their existing legacy apps more secure, more efficient and portable to hybrid cloud infrastructure. Read more about the Modernize Traditional Apps Program.

Modernize Traditional Apps with Docker


Weren’t able to attend #dockercon? Watch this recap video for key highlights !
Click Continue reading

Nyansa introduces private cloud option for its network analytics platform

Having a full understanding of end user experience has been theorized in IT circles for decades but has remained as elusive as the Holy Grail or the Fountain of Youth. Some people claim to have seen it, but no one really knows for sure.Last year, an innovative startup, Nyansa, came to market with a new approach to end-user management. Its Voyance product continuously collects data, analyzes it and correlates every end user transaction across the wired and wireless networks and provides insights and actionable recommendations that can be taken to improve application performance.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Wasabi serves up some spicy AWS-killer claims

What happens when you take a couple of very seasoned co-founders, investment from some high-profile investors, and an uber-dominant existing vendor? Well, in Wasabi’s case, you get some pretty outlandish claims. But before we got on to that, let’s look at the who and what for Wasabi.Wasabi is a cloud storage company founded by Jeff Flowers and  David Friend. Those names might ring a bell, since they’ve started, built and sold five previous technology companies. Most recently they co-founded backup company Carbonite and previously founded Pilot Software.RELATED: Engineering firm uses cloud storage to speed file loads, and then unplugs its MPLS net These two can’t seem to stop themselves, and for their latest idea, they’ve already raised a ton of cash—$8.5 million to date with key investors, including Bill Sahlman, Harvard Business School marketing prof and angel investor; Desh Deshpande, who donated $100 million to MIT for the Deshpande Center; Ron Skates, former CEO of Data General; Jeff Parker, founder of CCBN; and Howard Cox from Greylock Partners.To read this article in full or to leave a comment, please click here

Apparently, Wikipedia is a threat to public order and national security

It’s easy to criticize Wikipedia for a lot of things. Besides being the source of many a plagiarized term paper, its crowd-sourced nature also means it’s occasionally subject to internecine warfare and political infighting over articles.Wikipedia the largest general reference on the net But now Turkey has blocked the self-described “largest and most popular general reference work on the Internet,” under a vague law that allows the country to “block access to individual web pages or entire sites for the protection of public order, national security or the well being of the public,” according to The Guardian.To read this article in full or to leave a comment, please click here

Apparently, Wikipedia is a threat to public order and national security

It’s easy to criticize Wikipedia for a lot of things. Besides being the source of many a plagiarized term paper, its crowd-sourced nature also means it’s occasionally subject to internecine warfare and political infighting over articles.Wikipedia the largest general reference on the net But now Turkey has blocked the self-described “largest and most popular general reference work on the Internet,” under a vague law that allows the country to “block access to individual web pages or entire sites for the protection of public order, national security or the well being of the public,” according to The Guardian.To read this article in full or to leave a comment, please click here

Google focuses on a future of even better mobile cameras

Smartphone cameras are about to get even better.Peyman Milanfar, a Google software engineer who had worked in the computational photography group, posted a lengthy analysis about using a smartphone camera to shoot nighttime photos with the same quality of an expensive DSLR.Milanfar’s post chronicles his quest for high-quality nighttime images taken with a smartphone. DSLR cameras do well in this application, but smartphone cameras struggle. A DSLR can take good quality photos at night because it has a very large sensor that collects more light. The Nikon D500 DSLR boasts a 20.9 million pixel sensor with a pixel size of 4.2µm. The D500 sensor is enormous compared to the top ranked Google Pixel phone’s sensor with 12.3 million pixels that are 1.55µm. It also has a large, adjustable and precise lens that captures and focuses more light from the field of view on the sensor, reducing visual distortion, compared to the Pixel’s constrained, fixed camera lens assembly.To read this article in full or to leave a comment, please click here

Facebook able to target emotionally vulnerable teens for ads

Facebook is so proud of its algorithms that it conducted research about exploiting posts by kids as young as 14 to show how its algorithms could help advertisers pinpoint emotionally vulnerable moments for the purpose of targeted ads.The Australian (paywall) got its hands on a 23-page Facebook document, dated in 2017, marked as “Confidential: Internal Only,” and authored by two Australian Facebook executives, Andy Sinn and David Fernandez. While no screenshots were included, the report allegedly explained how Facebook could analyze posts, photos and interactions to help determine the emotional states of 6.4 million “high schoolers,” “tertiary” (college) students and “young Australians and New Zealanders ... in the workforce.”To read this article in full or to leave a comment, please click here

Facebook able to target emotionally vulnerable teens for ads

Facebook is so proud of its algorithms that it conducted research about exploiting posts by kids as young as 14 to show how its algorithms could help advertisers pinpoint emotionally vulnerable moments for the purpose of targeted ads.The Australian (paywall) got its hands on a 23-page Facebook document, dated in 2017, marked as “Confidential: Internal Only,” and authored by two Australian Facebook executives, Andy Sinn and David Fernandez. While no screenshots were included, the report allegedly explained how Facebook could analyze posts, photos and interactions to help determine the emotional states of 6.4 million “high schoolers,” “tertiary” (college) students and “young Australians and New Zealanders ... in the workforce.”To read this article in full or to leave a comment, please click here

Leaked document shows how Facebook can target emotionally vulnerable teens for ads

Facebook is so proud of its algorithms, it conducted research about exploiting posts by kids as young as 14 to show how its algorithms could help advertisers pinpoint emotionally vulnerable moments for the purpose of targeted ads.The Australian (paywall) got its hands on a 23-page Facebook document, dated in 2017, marked as “Confidential: Internal Only,” and authored by two Australian Facebook executives, Andy Sinn and David Fernandez. While no screenshots were included, the report allegedly explained how Facebook could analyze posts, photos and interactions to help determine the emotional states of 6.4 million “high schoolers,” “tertiary” (college) students and “young Australians and New Zealander ... in the workforce.”To read this article in full or to leave a comment, please click here

Leaked document shows how Facebook can target emotionally vulnerable teens for ads

Facebook is so proud of its algorithms, it conducted research about exploiting posts by kids as young as 14 to show how its algorithms could help advertisers pinpoint emotionally vulnerable moments for the purpose of targeted ads.The Australian (paywall) got its hands on a 23-page Facebook document, dated in 2017, marked as “Confidential: Internal Only,” and authored by two Australian Facebook executives, Andy Sinn and David Fernandez. While no screenshots were included, the report allegedly explained how Facebook could analyze posts, photos and interactions to help determine the emotional states of 6.4 million “high schoolers,” “tertiary” (college) students and “young Australians and New Zealander ... in the workforce.”To read this article in full or to leave a comment, please click here

NSA suggests using virtualization to secure smartphones

The U.S. National Security Agency is now suggesting government departments and businesses buy smartphones secured using virtualization, a technology it currently requires only on tablets and laptopsThe change comes about with the arrival of the first virtualization-based smartphone security system on the U.S. Commercial Solutions for Classified list.CSFC is a program developed by the NSA to help U.S. government agencies and the businesses that serve them to quickly build layered secure systems from approved components.An HTC A9 smartphone security-hardened by Cog Systems using its D4 virtualization platform is now on that list, alongside devices without virtualization from Samsung Electronics, LG Electronics, and BlackBerry.To read this article in full or to leave a comment, please click here

NSA suggests using virtualization to secure smartphones

The U.S. National Security Agency is now suggesting government departments and businesses buy smartphones secured using virtualization, a technology it currently requires only on tablets and laptopsThe change comes about with the arrival of the first virtualization-based smartphone security system on the U.S. Commercial Solutions for Classified list.CSFC is a program developed by the NSA to help U.S. government agencies and the businesses that serve them to quickly build layered secure systems from approved components.An HTC A9 smartphone security-hardened by Cog Systems using its D4 virtualization platform is now on that list, alongside devices without virtualization from Samsung Electronics, LG Electronics, and BlackBerry.To read this article in full or to leave a comment, please click here

Save $45 on Amazon Echo Right Now When You Buy Certified Refurbished – Deal Alert

You can pick up Amazon Echo for far below list price, if you're comfortable buying refurbished. Which you can be -- certified refurbished products are tested and certified to look and work like new, and come with warranties. Amazon Echo is a hands-free speaker you control with your voice. Echo connects to the Alexa Voice Service to play music, provide information, news, sports scores, weather, and more—instantly. All you have to do is ask. Echo has seven microphones and beam forming technology so it can hear you from across the room—even while music is playing. Echo is also an expertly tuned speaker that can fill any room with 360° immersive sound. When you want to use Echo, just say the wake word “Alexa” and Echo responds instantly. If you have more than one Echo or Echo Dot, Alexa responds intelligently from the Echo you're closest to with ESP (Echo Spatial Perception). Echo's typical list price is $179.99, and certified refurbished models list for $164.99. But right now with this deal Amazon has further discounted them to $134.99. See the certified refurbished Amazon Echo on Amazon.To read this article in full or to leave a comment, please click here

I’m excited for a new Ubuntu release—for the first time in a long time

It's been many years since I regularly used Ubuntu. Back in "ye olden times" I would consider myself one of the most outspoken advocates for Canonical's Linux distribution—often proclaiming the (near) perfection of Ubuntu—but those times have long since faded into the mist. Nowadays, I use Ubuntu only when there is a good reason to review a new release—which has happened less and less. And even in those cases, I tend to use it sparingly. There were many reasons for that change. Mostly it boiled down to a general disagreement with the direction Ubuntu was taking.+ Also on Network World: Lessons learned from the failure of Ubuntu Touch + I wasn't a fan of their in-house developed desktop environment (Unity). I didn't like how slow it was. I didn't like how buggy it was. I didn't like how un-customizable it was. I guess it would be fair to say, "I didn't like it." To read this article in full or to leave a comment, please click here

Swiss Army Knife File System Cuts Through Petabytes

Petabytes are in the future of every company, and luckily, the future is always being invented by the IT ecosystem to handle it.

Those wrestling with tens to hundreds of petabytes of data today are constantly challenged to find the best ways to store, search and manage it all. Qumulo was founded in 2012 and came out of the chute two years ago with the idea that a software-based file system that includes built-in analytics that enables the system to increase capacity as the amount of data grows. QSFS, now called Qumulo Core, also does it all: fast with big

Swiss Army Knife File System Cuts Through Petabytes was written by Jeffrey Burt at The Next Platform.