Published: Designing Scalable Web Applications
The first batch of the latest materials for my Designing Scalable Web Applications course have been published on my free content web site.
The first batch of the latest materials for my Designing Scalable Web Applications course have been published on my free content web site.
One of the truly fascinating things about networking is how much of it ‘just works’. There are so many low level pieces of a network stack that you don’t really have to know (although you should) to be an expert at something like OSPF, BGP, or any other higher level networking protocol. One of the ones that often gets overlooked is MTU (Maximum Transmission Unit), MSS (Maximum Segment Size) and all of the funs tuff that comes along with it. So let’s start with the basics…
Here’s your average looking IP packet encapsulated in an Ethernet Header. For the sake of conversation, I’ll assume going forward that we are referring to TCP only but I did put the UDP header length in there just for reference. So a standard IP packet is 1500 bytes long. There’s 20 bytes for the IP header, 20 bytes for the TCP header, leaving 1460 bytes for the data payload. This does not include the 18 bytes of Ethernet headersFCS that surround the IP packet.
When we look at this frame layout, we can further categorize components of the frame by MTU and MSS…
The MTU is defined Continue reading
Presenter: Craig Williams (@security_craig) - Sr Technical Leader / Security Outreach Manager, Cisco TALOS
“I'm from Talos. We love to stop bad guys.”
Talos has a serious amount of data. For serious.
Presenter: Markus Harbek, CCIE, CCDE
Who knows what SDN stands for?
Presenter: Chuck Stickney, Cisco SE
Handful of OT folks in the room; majority IT.
Convergence Benefits
I’ve been spending some time with Ansible recently, and I have to say that it’s really growing on me. While Ansible doesn’t have a steep learning curve, there is still a learning curve—albeit a smaller/less steep curve—so I wanted to share here a “trick” that I found for using Vagrant to help with learning Ansible. (I say “trick” here because it isn’t that this is complicated or undocumented, but rather that it may not be immediately obvious how to combine these two.)
Note that this is not to be confused with using Ansible from within Vagrant as a provisioner; that’s something different (see the Vagrant docs for more information on that use case). What I’m talking about is having a setup where you can easily explore how Ansible works and iterate through your playbooks using a Vagrant-managed VM.
Here are the key components:
Vagrantfile
and any associated support files).Vagrantfile
, you’ll need an Continue readingPresenter: Jeff Schutt – Cybersecurity Solutions Architect (Jeff works in Adv Services in the IoT team)
Full Title: An IoT Security Model & Architecture for Securing Cyber-Physical and IT-OT Converged Assets
Mix of IT/OT folks in the room.
How do we do physical security?
How do we do cybersecurity?
IT landscape
OT landscape
With IT and OT convergence, ther’s no way people are going to lose their jobs. We all have too much to do for anyone to be redundant. Additionally, there is a well-known shortage of skilled workers in this area.
Security awareness and training: a combination of people, process, and technology.
“Airgap security” does not address “people, process and technology”. Airgap is NOT security (on its own). Airgap is not Continue reading