Today's Kubernetes Unpacked discusses essential requirements to secure a Kubernetes environment.
The post Kubernetes Unpacked 023: Is Kubernetes Security The Same As Other Security? appeared first on Packet Pushers.
If you are a Global 20,000 company and you want to build a large language model that is specifically tuned to your business, the first thing you need is a corpus of your own textual data on which to train that LLM. …
Where Financial Models Meet Large Language Models was written by Timothy Prickett Morgan at The Next Platform.
Be it chess, poker, or everyday driving, you must predict your opponent’s (or other drivers’) movement to win (or keep yourself safe!). Container security is the same, and many organizations look to the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) framework to understand an attacker’s mindset and how to prevent attacks. The MITRE ATT&CK framework released a matrix for containers, giving organizations that use Kubernetes and containers a chance to analyze an attacker’s M.O. and assess the organization’s attack vectors.
To help organizations stay ahead of attackers, Tigera recently released a white paper based on the MITRE ATT&CK containers matrix. Drawing from Tigera’s experience as a cybersecurity provider, the white paper offers an in-depth analysis of the containers matrix. It also details how Tigera’s active security platform, Calico Cloud, a fully-managed SaaS, and its self-managed counterpart, Calico Enterprise, can detect and mitigate every tactic outlined in the matrix.
Tigera’s white paper dives deep into the MITRE framework for containers to help organizations understand the risks they face and how they can mitigate these vulnerabilities using Calico. Here’s what you will learn from the white paper and the questions it’ll answer:
Gartner has recognized Cloudflare in the 2023 “Gartner® Magic Quadrant™ for Security Service Edge (SSE)” report for its ability to execute and completeness of vision. We are excited to share that the Cloudflare Zero Trust solution, part of our Cloudflare One platform, is one of only ten vendors recognized in the report.
Of the 10 companies named to this year’s Gartner® Magic Quadrant™ report, Cloudflare is the only new vendor addition. You can read more about our position in the report and what customers say about using Cloudflare One here.
Cloudflare is also the newest vendor when measured by the date since our first products in the SSE space launched. We launched Cloudflare Access, our best-in-class Zero Trust access control product, a little less than five years ago. Since then, we have released hundreds of features and shipped nearly a dozen more products to create a comprehensive SSE solution that over 10,000 organizations trust to keep their organizations data, devices and teams both safe and fast. We moved that quickly because we built Cloudflare One on top of the same network that already secures and accelerates large segments of the Internet today.
We deliver our SSE services on the Continue reading
Cisco Live US 2023 will take place from June 04 to 08 in Las Vegas. I have just registered, and this will be my 10th time attending. However, the question arises: is the Cisco Live conference worth the price? Travel and Accommodation I will not consider the cost of travel and accommodation in this post. This introduces too many variables depending on where the conference is, where you are coming from, and what your preferences are for accommodations. We’re only going to talk about the cost and benefits of attending…
The post Cisco Live 2023 – Is the conference worth the price? appeared first on AboutNetworks.net.
The best way to know that your configuration is working properly is to measure with a tool outside of ISE. Unfortunately, authentications per second is not available via SNMP or the REST API. What does happen is for each authentication a SYSLOG message is generated. The following messages are for every passed and failed authentication: […]
The post Part 4 – Monitoring PSN Load Balancing appeared first on Packet Pushers.
Cisco is a large organization. Sometimes different software development teams don’t talk to one another as much as we would like. As it happens, the IOS-XE team developed a way of load balancing RADIUS request across multiple RADIUS servers. I can’t claim to have read every Cisco whitepaper and I haven’t seen every Cisco Live […]
The post Part 3 – IOS-XE Load Balancing appeared first on Packet Pushers.
In Part 1 we explored the simplest configuration possible. Now let’s introduce a load balancer appliance. I’m just going to put it out there. Load balancers are a necessary evil. They are for protocols that are too dumb to figure out how to load balance themselves at the application layer. But we’re going to find […]
The post Part 2 – Enter the Load Balancer appeared first on Packet Pushers.
There are many ways to build a Cisco Identity Services Engine (ISE) installation. This is a four-part series on load balancing multiple RADIUS servers and we’ll use Cisco’s Identity Services Engine in our examples. If you want to jump ahead: Part 1: This Page! Part 2: Load Balancer Appliances Part 3: Simple, Fast, Cheap… all […]
The post Part 1: Cisco ISE Load Balancing appeared first on Packet Pushers.
Photo by Hush Naidoo Jade Photography on Unsplash
Are you tired of manually creating Ansible modules for every new tool, cloud service, or appliance you need to manage? Look no further than the Ansible Content Builder. This powerful Python tool can generate Ansible modules for any appliance or service with a network CLI, NETCONF, or OpenAPI. In this blog post, we'll show you how to use the Content Builder to scaffold your Ansible modules to create good, consistent content for your cloud platform of choice. We'll also explore how the Content Builder can help you onboard new tools and services into the Ansible ecosystem with ease. So if you're looking to supercharge your Ansible workflow and automate any cloud platform, this post is for you!
The Ansible Content Collections for hybrid cloud automation house multiple modules. These modules handle the creation, deletion, modification (and more) of cloud resources. While developing individual modules for different resources of the cloud platform can lead to modularity and ease of use, reinventing the wheel can be error-prone and time-consuming. Standardizing the common steps that are similar but differ based on limited parameters can solve many problems encountered while developing these modules. This is achieved Continue reading
I must be a good prompt engineer – every time I ask ChatGPT something really simple it spews out nonsense. This time I asked it to build a small network with four routers:
I have a network with four Cisco routers (A,B,C,D). They are connected as follow: A-B, B-C, A-D, D-C. Each router has a loopback interface. Create router configurations that will result in A being able to reach loopback interfaces of all other routers.
Here’s what I got back1:
Here’s an example configuration for the four routers that should allow Router A to reach the loopback interfaces of all other routers:
I must be a good prompt engineer – every time I ask ChatGPT something really simple it spews out nonsense. This time I asked it to build a small network with four routers:
I have a network with four Cisco routers (A,B,C,D). They are connected as follow: A-B, B-C, A-D, D-C. Each router has a loopback interface. Create router configurations that will result in A being able to reach loopback interfaces of all other routers.
Here’s what I got back1:
Here’s an example configuration for the four routers that should allow Router A to reach the loopback interfaces of all other routers: