Sponsored Post: Gusto, Awake Networks, Spotify, Telenor Digital, Kinsta, Aerospike, InMemory.Net, VividCortex, MemSQL, Scalyr, AiScaler, AppDynamics, ManageEngine, Site24x7

Who's Hiring?

  • IT Security Engineering. At Gusto we are on a mission to create a world where work empowers a better life. As Gusto's IT Security Engineer you'll shape the future of IT security and compliance. We're looking for a strong IT technical lead to manage security audits and write and implement controls. You'll also focus on our employee, network, and endpoint posture. As Gusto's first IT Security Engineer, you will be able to build the security organization with direct impact to protecting PII and ePHI. Read more and apply here.

  • Awake Networks is an early stage network security and analytics startup that processes, analyzes, and stores billions of events at network speed. We help security teams respond to intrusions with super-human  efficiency and provide macroscopic and microscopic insight into the networks they defend. We're looking for folks that are excited about applying modern bleeding edge techniques to build systems that handle scale in a constrained environment. We have many open-ended problems to solve around stream-processing, distributed systems, machine learning, query processing, data modeling, and much more! Please check out our jobs page to learn more.

  • Site Reliability Engineer Manager. We at Spotify are looking for an engineering leader (Chapter Continue reading

Merchant silicon based routing, flow analytics, and telemetry

Drivers for growth describes how switches built on merchant silicon from Broadcom ASICs dominate the current generation of data center switches, reduce hardware costs, and support an open ecosystem of switch operating systems (Cumulus Linux, OpenSwitch, Dell OS10, Broadcom FASTPATH, Pica8 PicOS, Open Network Linux, etc.).

The router market is poised to be similarly disrupted with the introduction of devices based on Broadcom's Jericho ASIC, which has the capacity to handle over 1 million routes in hardware (the full Internet routing table is currently around 600,000 routes).
An edge router is a very pricey box indeed, often costing anywhere from $100,000 to $200,000 per 100 Gb/sec port, depending on features in the router and not including optical cables that are also terribly expensive. Moreover, these routers might only be able to cram 80 ports into a half rack or full rack of space. The 7500R universal spine and 7280R universal leaf switches cost on the order of $3,000 per 100 Gb/sec port, and they are considerably denser and less expensive. - Leaving Fixed Function Switches Behind For Universal Leafs
Broadcom Jericho ASICs are currently available in Arista 7500R/7280R routers and in Cisco NCS 5000 series routers. Expect further disruption Continue reading

What’s behind CenturyLink buying hybrid cloud vendor ElasticBox

In an effort to solidifying its footing in the still-shifting public IaaS cloud computing market, CenturyLink today announced plans to buy ElasticBox, a company that specializes in hybrid cloud management software.+MORE AT NETWORK WORLD: VMware buys Arkin to increase virtual networking adoption +During a week filled with mega M&A news, this deal cloud deal could fly under the radar, but it's worth noticing because it highlights important trends in the cloud industry.To read this article in full or to leave a comment, please click here

Deutsche Bank: Nearly a third of finance workloads could hit cloud in 3 years

The financial industry has been one of the most reticent to adopt IaaS public cloud computing services, but researchers at Deutsche Bank predict that big banks’ use of cloud will ramp up “materially” in 2017.+MORE AT NETWORK WORLD: How Goldman Sachs and Bank of America are using containers and cloud | What happened at Apple’s WWDC +Regulatory barriers, questions about security and legacy IT installations are the leading reasons financial services companies have not used public cloud compute and storage services thusfar, DB researchers say. Increasingly however, banks are facing pressure to cut costs and increase flexibility of IT environments. Meanwhile, public cloud vendors like Amazon Web Services and Microsoft Azure have become more compliance centric in order to cater to the financial services industry.To read this article in full or to leave a comment, please click here

Gartner: ‘Insider threat is alive and well on the dark Web’

National Harbor, Md. -- Corporate employees who help carry out cyberattacks are increasingly being sought and are seeking criminals to hire them, a Gartner analyst told a group at the consulting firm’s Security and Risk Management Summit.A group of 60 CIOs and CISOs she worked with say this recruitment is more active and becoming a larger concern because of their use of the Dark Web to sell their services, says Gartner analyst Avivah Litan.+More on Network World: National Intelligence office wants to perfect the art of security deception+To read this article in full or to leave a comment, please click here

Gartner: ‘Insider threat is alive and well on the dark Web’

National Harbor, Md. -- Corporate employees who help carry out cyberattacks are increasingly being sought and are seeking criminals to hire them, a Gartner analyst told a group at the consulting firm’s Security and Risk Management Summit.A group of 60 CIOs and CISOs she worked with say this recruitment is more active and becoming a larger concern because of their use of the Dark Web to sell their services, says Gartner analyst Avivah Litan.+More on Network World: National Intelligence office wants to perfect the art of security deception+To read this article in full or to leave a comment, please click here

Gartner: ‘Insider threat is alive and well on the dark Web’

National Harbor, Md. -- Corporate employees who help carry out cyberattacks are increasingly being sought and are seeking criminals to hire them, a Gartner analyst told a group at the consulting firm’s Security and Risk Management Summit.A group of 60 CIOs and CISOs she worked with say this recruitment is more active and becoming a larger concern because of their use of the Dark Web to sell their services, says Gartner analyst Avivah Litan.+More on Network World: National Intelligence office wants to perfect the art of security deception+To read this article in full or to leave a comment, please click here

Using Docker Datacenter for Enterprise-Ready Orchestration – The SA Home Loans Story

Orchestration for dockerized applications in production has been a huge reason for why today’s enterprises have begun to leverage Docker Datacenter.

Universal Control Plane, the management layer of the Docker Container-as-a-Service platform delivers production-level orchestration. The tool enables enterprise IT ops teams to manage, deploy and scale their applications across their multi-node clusters. These clusters can be comprised of nodes that exist both in cloud providers like Azure and AWS as well as in the datacenter. Universal Control Plane comes with Docker Swarm embedded into it, giving it the power to create clusters and scale applications across their environment, regardless of infrastructure type, all with support from the Docker team.

Continue reading

Nokia hopes its new IoT platform, Impact, will be a hit

Nokia hopes it will have a hit on its hands with Impact, an all-encompassing new Internet-of-Things management platform that brings together several existing products.The Intelligent Management Platform for All Connected Things builds on the company's established CPE (customer premises equipment) management tool for network operators, Motive Connected Device Platform, so broadband and home routers will be among the first devices to feel its impact. It already supports 80,000 different device types, Nokia said Tuesday.No doubt its new Smart Home Gateway, also unveiled Tuesday, will soon be among them. It combines a fiber "modem" with a router, dual-band gigabit Wi-Fi -- and Zigbee and Z-Wave radios for home automation. It's intended to be distributed by network operators. To read this article in full or to leave a comment, please click here

Don’t run JS email attachments: ​they​ can carry potent ransomware

Attackers are infecting computers with a new ransomware program called RAA that's written entirely in JavaScript and locks users' files by using strong encryption.Most malware programs for Windows are written in compiled programming languages like C or C++ and take the form of portable executable files such as .exe or .dll. Others use command-line scripting such as Windows batch or PowerShell.It's rare to see client-side malware written in Web-based languages such as JavaScript, which are primarily intended to be interpreted by browsers. Yet the Windows Script Host, a service built into Windows, can natively execute .js and other scripting files out of the box.To read this article in full or to leave a comment, please click here

Don’t run JS email attachments: ​they​ can carry potent ransomware

Attackers are infecting computers with a new ransomware program called RAA that's written entirely in JavaScript and locks users' files by using strong encryption.Most malware programs for Windows are written in compiled programming languages like C or C++ and take the form of portable executable files such as .exe or .dll. Others use command-line scripting such as Windows batch or PowerShell.It's rare to see client-side malware written in Web-based languages such as JavaScript, which are primarily intended to be interpreted by browsers. Yet the Windows Script Host, a service built into Windows, can natively execute .js and other scripting files out of the box.To read this article in full or to leave a comment, please click here

Gartner: How to make a digital risk plan and sell it to the board

It’s not enough for security pros to figure out how to protect digital enterprises from risks that can ruin the business, they must effectively sell it to corporate boards whose blessing is needed to authorize the plan, Gartner analysts told attendees at their Security and Risk Management Summit.With that in mind, three Gartner security specialists walked the roughly 3,400-person audience through how to create a plan to manage risk and minimize damage when – not if – an attack succeeds, and the strategy for buy-in from the board of directors.“One hundred percent protection should not be the goal,” Gartner analyst Peter Firstbrook told the gathering. “The goal should be resilience.”To read this article in full or to leave a comment, please click here

Gartner: How to make a digital risk plan and sell it to the board

It’s not enough for security pros to figure out how to protect digital enterprises from risks that can ruin the business, they must effectively sell it to corporate boards whose blessing is needed to authorize the plan, Gartner analysts told attendees at their Security and Risk Management Summit.With that in mind, three Gartner security specialists walked the roughly 3,400-person audience through how to create a plan to manage risk and minimize damage when – not if – an attack succeeds, and the strategy for buy-in from the board of directors.“One hundred percent protection should not be the goal,” Gartner analyst Peter Firstbrook told the gathering. “The goal should be resilience.”To read this article in full or to leave a comment, please click here

Secure and fast GitHub Pages with CloudFlare

Secure and fast GitHub Pages with CloudFlare

GitHub offers a web hosting service whereby you can serve a static website from a GitHub repository. This platform, GitHub Pages, can be used with CloudFlare whilst using a custom domain name.

In this tutorial, I will show you how to use CloudFlare and GitHub together. By taking advantage of CloudFlare’s global network, you can utilise our CDN service to improve your site's performance and security.

Whilst GitHub Pages doesn't ordinarily support SSL on custom domains, CloudFlare's Universal SSL allows your users to access your site over SSL, thus opening up the performance advantages of HTTP/2.

Secure and fast GitHub Pages with CloudFlare

GitHub Pages is designed to host sites that only serve static HTML. The ability to only host static content isn’t as big of a restriction as you might think.

Static site generators avoid repetitive update tasks of updating “latest posts” feeds, pagination or sitemaps; whilst generating static HTML that can be uploaded to any web hosting service without a scripting engine. Unlike ancient desktop tools like FrontPage and Dreamweaver which lacked a content model, modern static site generators have the design decisively separate from content.

Typically, CMS-based sites must query a database for content, then render the HTML to be served to the end Continue reading

10 questions about Apple’s WWDC announcements

Apple’s highly anticipated World Wide Developers Conference (WWDC) always delivers a strong shot of adrenaline to the company’s software and products. And those upgrades were present in abundance at the 2016 conference.In the past, though, Apple has sometimes used WWDC to introduce dramatic new products and services and address the biggest problems on users’ minds. I didn’t see much of that this time around.Don’t get me wrong. Apple did what it had to do at WWDC. The company addressed many of its competitive shortcomings and product lapses, upgrading key components across virtually its entire product line.+ More on Network World: FIRST LOOK: What happened at Apple’s WWDC +To read this article in full or to leave a comment, please click here