Dog and Bone LockSmart: The padlock rethought

It’s amazing what manufacturers have turned into “connected” devices and many of them, for example Bluetooth-enabled toothbrushes, seem more like “me-too” attempts to attract attention rather than real product improvements. Not so today’s product which is a great enhancement of a device I’ve never thought needed to be connected: The good, ol’ fashioned padlock.Dog and Bone, an Australian company that started out making cellphone cases (and obviously enjoys Cockney rhyming slang; “dog and bone” equates to “phone”) have recently started selling LockSmart, a Bluetooth LE-enabled padlock and I’d suggest that it’s a really useful rethink of how to interact with a pretty old technology.To read this article in full or to leave a comment, please click here

VMware NSX Reference Design Guide Update

The VMware NSX reference design guide has been a trusted source for NSX implementers to ensure a smooth and successful deployment. The NSX design guide has been incorporated as a baseline in industry recognized and validated architectures such as VCE VxBlock, Federation Enterprise Hybrid Cloud and the VMware Validated Designs.

We are introducing a new updated version of the NSX design guide  just in time for the holiday break to add to your yearend reading list. This design guide incorporates tons of feedback we have received from our readers and is based on the learnings of over 200+ production customer deployments of NSX.

The updated design guide provides a detailed overview of how NSX works, the components and core design principles.

NSX Design Guide Update Image

The main updates include:

Routing Design

We are diving deeper into distributed routing and edge routing best practices. NSX connectivity options from the virtual to physical infrastructure are often left to interpretation which generates confusion with established best practice. While NSX offers multiple options for connectivity we are taking the position of offering more prescriptive guidance in this document. The reader will get a better understanding of the design principles and availability guidance.

Security Policy Design

We Continue reading

DNC – What does “dropped the firewall” even mean?

In a CNN article that discusses Sander’s access to the Clinton campaign information, I found the following statement–

The breach occurred when the vendor, NGP VAN, which supplies access to the database of voter information for both campaigns dropped the firewall, and at least one Sanders campaign staffer accessed Clinton campaign voter data. The accused staffer, Josh Uretsky, Sanders’ national data director, was fired from the campaign.

I have to ask, what does that even mean. So NGP VAN is using a firewall to isolate data between candidates? Are there no controls in the application? And what does it mean to drop a firewall? 

I have to assume that this would indicate a “permit any” or maybe some other bypass. I’d love to know the technical details around this situation.

Firewalls aren’t magical boxes and this is a “dumbed down” if not inaccurate response.

I’d love to hear from you, so share your experiences by commenting below.
Continue reading

Bad actors race to exploit Juniper firewall vulnerability

Now that Juniper has created a patch for its vulnerable firewall/VPN appliances, bad actors are setting to work reverse engineering the flaw so they can exploit devices that users don’t patch, and also make a profit by selling their exploits to others.“That’s what they do,” says John Pironti, president of IP Architects, who says he spent Friday responding to concerns about the compromised Juniper firewalls with his clients.The pattern cyber criminals follow after vendors patch vulnerabilities is to compare the patched code to the unpatched code, figure out what the flawed code was and figure out how to use it to break into the device and the network it protects, Pironti says.To read this article in full or to leave a comment, please click here

Datacenter Vanity

I’ve been noticing a trend recently in enterprise networking where managers and engineers alike are more concerned (obsessed) with the physical appearance of their rack, wires, and network equipment than they are with the actual pragmatic design and stability of said network. Approx Reading Time: 3-5 Minutes A Little is Good Now a certain amount […]

The post Datacenter Vanity appeared first on Packet Pushers.

Datacenter Vanity

I’ve been noticing a trend recently in enterprise networking where managers and engineers alike are more concerned (obsessed) with the physical appearance of their rack, wires, and network equipment than they are with the actual pragmatic design and stability of said network. Approx Reading Time: 3-5 Minutes A Little is Good Now a certain amount […]

The post Datacenter Vanity appeared first on Packet Pushers.

Bernie Sanders campaign claims DNC voter data was leaked multiple times

The Democratic National Committee (DNC) has suspended the Bernie Sanders presidential campaign from access to its database of Democratic voter information after a staffer on the Sanders campaign improperly accessed proprietary data belonging to the rival campaign of Hillary Clinton, the Washington Post reported today.The Sanders campaign announced that it has fired the staffer over the incident. However, the campaign has also insisted that the data in the DNC database had been exposed on other occasions during the campaign.To read this article in full or to leave a comment, please click here

Bernie Sanders campaign claims software vendor NGP VAN exposed voter data multiple times

The Democratic National Committee (DNC) has suspended the Bernie Sanders presidential campaign from access to its database of Democratic voter information after a staffer on the Sanders campaign improperly accessed proprietary data belonging to the rival campaign of Hillary Clinton, the Washington Post reported today. The Sanders campaign announced that it has fired the staffer over the incident. However, the campaign has also gone on the offensive, insisting not only that the software vendor, NGP VAN, was responsible for this incident, but has failed to prevent unauthorized access to campaign data in the past.To read this article in full or to leave a comment, please click here