If you had to sum up the second half of 2022 and the first half of 2023 from the perspective of the semiconductor industry, it would be that we made too many CPUs for PCs, smartphones, and servers and we didn’t make enough GPUs for the datacenter. …
On today's Day Two Cloud we talk about how to build a successful security practice within your organization. Our guest is Swathi Joshi, VP, SaaS Cloud Security at Oracle. She breaks down security teams into three core groups: proactive security, defensive security, and assurance (risk reduction, enabling secure access, meeting compliance requirements). She also shares her insights around SoCs, security automation, threat and vulnerability management, and successful blue team practices.
On today's Day Two Cloud we talk about how to build a successful security practice within your organization. Our guest is Swathi Joshi, VP, SaaS Cloud Security at Oracle. She breaks down security teams into three core groups: proactive security, defensive security, and assurance (risk reduction, enabling secure access, meeting compliance requirements). She also shares her insights around SoCs, security automation, threat and vulnerability management, and successful blue team practices.
Public cloud migration long ago wrested control over digital infrastructure from network and security teams, but now is the time for those groups to retake the initiative. Cloud operations and DevOps groups will never cede ground, but they will welcome self-service networking and security solutions that provide guardrails that protect them from disaster. Cooperation between traditional infrastructure teams and cloud teams is even more important as enterprises embrace multi-cloud architecture, where complexity and risk are increasing. In fact, my research has found that security risk, collaboration problems, and complexity are the top pain points associated with multi-cloud networking today.To read this article in full, please click here
Public cloud migration long ago wrested control over digital infrastructure from network and security teams, but now is the time for those groups to retake the initiative. Cloud operations and DevOps groups will never cede ground, but they will welcome self-service networking and security solutions that provide guardrails that protect them from disaster. Cooperation between traditional infrastructure teams and cloud teams is even more important as enterprises embrace multi-cloud architecture, where complexity and risk are increasing. In fact, my research has found that security risk, collaboration problems, and complexity are the top pain points associated with multi-cloud networking today.To read this article in full, please click here
A few months ago, Arm Holdings introduced the Neoverse Complete Subsystem (CSS), designed to accelerate development of Neoverse-based systems. Now it has launched Arm Total Design, a series of tools and services to help accelerate development of Neoverse CSS designs.Partners within the Arm Total Design ecosystem gain preferential access to Neoverse CSS, which can enable them to reduce time to market and lower the costs associated with building custom silicon. This ecosystem covers all stages of silicon development. It aims to make specialized solutions based on Arm Neoverse widely available across various infrastructure domains, such as AI, cloud, networking, and edge computing.To read this article in full, please click here
A few months ago, Arm Holdings introduced the Neoverse Complete Subsystem (CSS), designed to accelerate development of Neoverse-based systems. Now it has launched Arm Total Design, a series of tools and services to help accelerate development of Neoverse CSS designs.Partners within the Arm Total Design ecosystem gain preferential access to Neoverse CSS, which can enable them to reduce time to market and lower the costs associated with building custom silicon. This ecosystem covers all stages of silicon development. It aims to make specialized solutions based on Arm Neoverse widely available across various infrastructure domains, such as AI, cloud, networking, and edge computing.To read this article in full, please click here
Cloudflare operates in more than 300 cities in over 100 countries, where we interconnect with over 12,500 network providers in order to provide a broad range of services to millions of customers. The breadth of both our network and our customer base provides us with a unique perspective on Internet resilience, enabling us to observe the impact of Internet disruptions.
We have been publishing these summaries since the first quarter of 2022, and over that time, the charts on Cloudflare Radar have evolved. Many of the traffic graphs in early editions of this summary were screenshots from the relevant traffic pages on Radar. Late last year, we launched the ability to download graphs, and earlier this year, to embed dynamic graphs, and these summaries have taken advantage of those capabilities where possible. Sharp-eyed readers may notice an additional evolution in some of the graphs below: yellow highlighting indicating an observed “traffic anomaly”. Identification of such anomalies, along with the ability to be notified about them, as well as a timeline enhancement (embedded below) to the Cloudflare Radar Outage Center, were launched as Continue reading
Everyone is chasing the highest cache ratio possible. Serving more content from Cloudflare’s cache means it loads faster for visitors, saves website operators money on egress fees from origins, and provides multiple layers of resiliency and protection to make sure that content is available to be served and websites scale effortlessly. A year ago we introduced Cache Reserve to help customer’s serve as much content as possible from Cloudflare’s cache.
Today, we are thrilled to announce the graduation of Cache Reserve from beta to General Availability (GA), accompanied by the introduction of several exciting new features. These new features include adding Cache Reserve into the analytics shown on the Cache overview section of the Cloudflare dashboard, giving customers the ability to see how they are using Cache Reserve over time. We have also added the ability for customers to delete all data in Cache Reserve without losing content in the edge cache. This is useful for customers who are no longer using Cache Reserve storage.
We’re also introducing new tools that give organizations more granular control over which files are saved to Cache Reserve, based on valuable feedback we received during the beta. The default configuration of Cache Reserve Continue reading
Cisco recently published an advisory pertaining to an active exploitation of a previously unknown vulnerability in the web UI feature of Cisco IOS XE Software when exposed to the internet or to untrusted networks. This vulnerability allows a remote, unauthenticated attacker to create an account on an affected system with privilege level 15 access. The attacker can then use that account to gain control of the affected system.
Recommendations using Red Hat Ansible Automation Platform
In this blog, I will discuss a simple playbook that can help network admins quickly identify and remediate affected devices. To add additional capabilities for a large production environment, Red Hat Ansible Automation Platform could enhance the playbook run with additional capabilities (ticketing integrations, roles based access, workflow, self service, etc.).
Vulnerable Products
All Cisco IOS-XE based products are potentially at risk. The example playbook is located here. In the example playbook we will explore its functionality using one of the Cisco Sandbox always-on routers
Determine the HTTP Server Configuration
The following portion of the playbook will determine the HTTP Server Configuration and print the results.
Cisco strongly recommends that customers disable the HTTP Continue reading
Here’s a quick update on the BGP Labs project status: now that netlab release 1.6.4 is out, I could remove the dependency on using Cumulus Linux as the external BGP router.
You can use any device that is supported by bgp.session and bgp.policy plugins as the external BGP router. You could use Arista EOS, Aruba AOS-CX, Cisco IOSv, Cisco IOS-XE, Cumulus Linux or FRR as external BGP routers with netlab release 1.6.4, and I’m positive Jeroen van Bemmel will add Nokia SR Linux to that list.
If you’re not ready for a netlab upgrade, you can keep using Cumulus Linux as external BGP routers (I’ll explain the behind-the-scenes magic in another blog post, I’m at the Deep Conference this week).
A quick update BGP Labs project status update: now that netlab release 1.6.4 is out I could remove the dependency on using Cumulus Linux as the external BGP router.
You can use any device that is supported by bgp.session and bgp.policy plugins as the external BGP router. You could use Arista EOS, Aruba AOS-CX, Cisco IOSv, Cisco IOS-XE, Cumulus Linux or FRR as external BGP routers with netlab release 1.6.4, and I’m positive Jeroen van Bemmel will add Nokia SR Linux to that list.
If you’re not ready for a netlab upgrade, you can keep using Cumulus Linux as external BGP routers (I’ll explain the behind-the-scenes magic in another blog post, I’m at the Deep Conference this week).
By: Alex Amaya, Senior Technical Marketing Manager at HPE Aruba Networking. AAruba EdgeConnect SD-WAN is a powerful solution that enables organizations to build resilient and efficient wide-area networks. Application visibility, real-time performance monitoring and security monitoring are critical aspects of managing an SD-WAN infrastructure effectively. This blog explores application visibility, performance monitoring, and security management best practices for achieving these objectives using Aruba EdgeConnect SD-WAN.To read this article in full, please click here
Updating the IOS XE software and disabling the HTTP Server feature should prevent additional system exploits. But what of the systems that are already infected?
Trust is such a difficult concept in any context, and certainly computer networks are no exception. How can you be assured that your network infrastructure us running on authentic platforms, both hardware and software, and its operation has not been compromised in any way?
Distributed routing protocols rely on each active router processing routing updates in an identical manner. Given that there are so many implementation of the BGP routing protocol then the role of a clear standard specification is critical. This extends to the handling of error conditions. What happens when some implementations handle errors in a different manner to all the others?
AWS Cloud WAN Tunnel-less Connect and Arista CloudEOS integrate to accelerate cloud onramp
As cloud and multicloud adoption continue to evolve, public cloud providers like AWS continue to introduce more and more tools for enterprise IT to choose from. For example, customers can deploy a virtual router in a Transit VPC and BGP peer with AWS Cloud WAN to interconnect on-premises networks and AWS VPCs. However, GRE or IPsec tunnels are often required for the BGP peering, adding up the network complexity and increasing operational costs.
Versa Networks has bumped up its secure access service edge (SASE) software with a variety of features, including AI to help customers better manage LAN resources at the edge of their networks.The company announced Versa SD-LAN, a software package that the company says will let customers integrate security, switching, routing, network and AI management services on approved white box Ethernet switches and access points.“Versa Secure SD-LAN is built as an extension of Versa’s Unified SASE platform, so it shares the same management console, policy repository, and data lake as our Versa Secure SD-WAN, cloud, and data center products,” according to Kevin Sheu, vice president of product marketing with Versa. To read this article in full, please click here
Versa Networks has bumped up its secure access service edge (SASE) software with a variety of features, including AI to help customers better manage LAN resources at the edge of their networks.The company announced Versa SD-LAN, a software package that the company says will let customers integrate security, switching, routing, network and AI management services on approved white box Ethernet switches and access points.“Versa Secure SD-LAN is built as an extension of Versa’s Unified SASE platform, so it shares the same management console, policy repository, and data lake as our Versa Secure SD-WAN, cloud, and data center products,” according to Kevin Sheu, vice president of product marketing with Versa. To read this article in full, please click here
Network automation can be strategically used to not only automate network operations tasks and save time, but also continuously improve the security posture of the network.