We are excited to share that Vectrix has been acquired by Cloudflare!
Vectrix helps IT and security teams detect security issues across their SaaS applications. We look at both data and users in SaaS apps to alert teams to issues ranging from unauthorized user access and file exposure to misconfigurations and shadow IT.
We built Vectrix to solve a problem that terrified us as security engineers ourselves: how do we know if the SaaS apps we use have the right controls in place? Is our company data protected? SaaS tools make it easy to work with data and collaborate across organizations of any size, but that also makes them vulnerable.
The past two years have accelerated SaaS adoption much faster than any of us could have imagined and without much input on how to secure this new business stack.
Google Workspace for collaboration. Microsoft Teams for communication. Workday for HR. Salesforce for customer relationship management. The list goes on.
With this new reliance on SaaS, IT and security teams are faced with a new set of problems like files and folders being made public on the Internet, external users joining private chat channels, or an Continue reading
Earlier today, Cloudflare announced that we have acquired Vectrix, a cloud-access security broker (CASB) company focused on solving the problem of control and visibility in the SaaS applications and public cloud providers that your team uses.
We are excited to welcome the Vectrix team and their technology to the Cloudflare Zero Trust product group. We don’t believe a CASB should be a point solution. Instead, the features of a CASB should be one component of a comprehensive Zero Trust deployment. Each piece of technology, CASB included, should work better together than they would as a standalone product.
We know that this migration is a journey for most customers. That’s true for our own team at Cloudflare, too. We’ve built our own Zero Trust platform to solve problems for customers at any stage of that journey.
Several years ago, we protected the internal resources that Cloudflare employees needed by creating a private network with hardware appliances. We deployed applications in a data center and made them available to this network. Users inside the San Francisco office connected to a secure Wi-Fi network that placed them on the network.
For everyone else, we punched a Continue reading
Managing an aging nuclear weapons stockpile requires a tremendous – and ever-increasing – amount of supercomputing performance, and the HPC system business the world over is focused on this as much as trying to crack the most difficult scientific, medical, and engineering problems. …
Sneak Peek At “Sapphire Rapids” Xeons In “Crossroads” Supercomputer was written by Timothy Prickett Morgan at The Next Platform.
Discussing what might drives team structure in Enterprise IT.
The post HS016 Team Structure for Technology Teams appeared first on Packet Pushers.
First-generation security solutions for cloud-native applications have been failing because they apply a legacy mindset where the focus is on vulnerability scanning instead of a holistic approach to threat detection, threat prevention, and remediation. Given that the attack surface of modern applications is much larger than in traditional apps, security teams are struggling to keep up and we’ve seen a spike in breaches.
To better protect cloud-native applications, we need solutions that focus on threat prevention by reducing the attack surface. With this foundation, we can then layer on threat detection and threat mitigation strategies.
I have exciting news to share on this front! Today, Tigera launched new capabilities in its Calico product line to help you address your most urgent cloud security needs. Before getting into a discussion about the features themselves, I’d like to talk about the driving force behind the changes, our thought process, and why we’re well-positioned to bring these to market.
To properly secure modern cloud-native applications, we need to use a modern architecture that aligns with them. At Tigera, we’ve created a model we call active cloud-native application runtime security. This model has three components:
The Enterprise Core Exam, that also leads to the certificate of:
“Cisco Certified Specialist – Enterprise Core”
is one of many new exams and certs that were announced by Cisco back in summer 2019.
this exam is actually jumping in the middle of the CCNP Certificate and labeling it as CCNP Enterprise
throwing the old label of CCNP Routing & Switching with all its old 3 exams (Routing, Switching, and Troubleshooting).
ALSO, interestingly it is replacing the old CCIE Routing & Switching Written Exam, with a new method of becoming CCIE
and that is the CCIE Enterprise Infrastructure, that only requires this ENCOR as a prerequisite.
so it is nice to pass the ENCOR exam and be involved on both CCNP Enterprise and CCIE Enterprise Infrastructure.
The first impression that you might take when you hear about an exam that replaces the old famous CCNP Routing & Switching, also replacing that difficult, expert-rate, 100+ written exam of the CCIE Routing & Switching.
then you get either frightened of that exam’s level, or brace you yourself for something so advanced and challenging coming, well, the Continue reading
IPv6 adoption is growing worldwide. On today's IPv6 Buzz podcast, we discuss which countries are leading the way, what IPv6 adoption looks like among enterprises and service providers, and what it means for network engineers and architects.
The post IPv6 Buzz 094: Measuring IPv6 Growth appeared first on Packet Pushers.
Social media is the most powerful tool of the 21st century and people are connecting with each other on social media for different things. Whether it is for business, personal communication, dating or networking and communicating for any other reason, people use social media. So it is only fair that there are apps that allow neighbors to get in touch with each other. This may just become the new way to manage the neighborhood watch
Let’s take a look at some of the apps that can help you connect with your neighbors.
Nextdoor is a social media platform for neighborhoods across the country. It allows you to quickly get in touch with your neighbors. You can post messages on neighborhood group boards, have private conversations, upload photos of suspicious activities or ask questions about city services and get answers from other residents. This app was created so that people could connect with each other locally without having to login in to other apps like Facebook or another social network that has all kinds of different content coming at you every second. This way it keeps things simple. All posts are tagged which means they show up only in your Continue reading
On June 9th – 2019, Cisco made an announcement of deleting and replacing ALL their CCNP Level “Exams”.
saying exams instead of certificates, as the labels of most the Certificates remained the same
(except for CCNP RS, who got replaced with CCNP – Enterprise).
The new Exams as they are linked to the CCNP badges, came with a new criteria of becoming “Certified”.
now you will need to pass ONLY 2 exams and you will get granted the CCNP Badge, rather than needing a minimum of 3-4 exams in the previous system.
The new system requires 2 isolated parts to fulfill, before you become certified:
1- A Technology Core Exam, which plays a role in engaging you in 2 paths of certs. (The CCNP & The CCIE).
– and that will be:
– Enterprise, Security, Service Provider, Collaboration, Data Center, and the newly established DEVNET & CyberOps
2- A Technology Concentration Exam, every domain of the 7 mentioned in Point “1”, has a 1-7 different technologies to concentrate on.
This will be kind of having a Master degree in engineering, you consider some general topics, and focus on some other.
Continue reading
One of the toughest hurdles to overcome when building your own virtual networking lab is the slog of downloading VM images for your favorite network devices and building Vagrant boxes1 in case you want to use them with Vagrant or netlab.
You can find box-building recipes on the Internet – codingpackets.com has a dozen of them – but they tend to be a bit convoluted and a smidge hard-to-follow the first time you’re trying to build the boxes (trust me, I’ve been there).
One of the toughest hurdles to overcome when building your own virtual networking lab is the slog of downloading VM images for your favorite network devices and building Vagrant boxes1 in case you want to use them with Vagrant or netsim-tools.
You can find box-building recipes on the Internet – codingpackets.com has a dozen of them – but they tend to be a bit convoluted and a smidge hard-to-follow the first time you’re trying to build the boxes (trust me, I’ve been there).