Ransomware: Quis custodiet ipsos custodes

Many claim that "ransomware" is due to cybersecurity failures. It's not really true. We are adequately protecting users and computers. The failure is in the inability of cybersecurity guardians to protect themselves. Ransomware doesn't make the news when it only accesses the files normal users have access to. The big ransomware news events happened because ransomware elevated itself to that of an "administrator" over the network, giving it access to all files, including online backups.

Generic improvements in cybersecurity will help only a little, because they don't specifically address this problem. Likewise, blaming ransomware on how it breached perimeter defenses (phishing, patches, password reuse) will only produce marginal improvements. Ransomware solutions need to instead focus on looking at the typical human-operated ransomware killchain, identify how they typically achieve "administrator" credentials, and fix those problems. In particular, large organizations need to redesign how they handle Windows "domains" and "segment" networks.

I read a lot of lazy op-eds on ransomware. Most of them claim that the problem is due to some sort of moral weakness (laziness, stupidity, greed, slovenliness, lust). They suggest things like "taking cybersecurity more seriously" or "do better at basic cyber hygiene". These are "unfalsifiable" -- things that nobody Continue reading

Hedge 91: Leslie Daigle and IP Addresses Acting Badly

What if you could connect a lot of devices to the Internet—without any kind of firewall or other protection—and observe attackers trying to find their way “in?” What might you learn from such an exercise? One thing you might learn is a lot of attacks seem to originate from within a relatively small group of IP addresses—IP addresses acing badly. Listen in as Leslie Daigle of Thinking Cat and the Techsequences podcast, Tom Ammon, and Russ White discuss just such an experiment and its results.

download

Automation Savings Planner

Pre-plan your automation savings with Red Hat Insights for Red Hat Ansible Automation Platform

Enterprise organizations understand that to be leaders in their industries, they must change the way they deliver applications, improve their relationships with customers and gain competitive advantages.

Positioning those advantages to have a positive return on investment often starts with proper planning and automation.

But what does proper planning of your automation even look like?

For some enterprises, proper planning includes reducing automation costs. For others, it’s reducing time spent to open new opportunities.

With this in mind, Red Hat is excited to introduce Automation Savings Planner, a new enhancement that puts automation planning in the forefront within the hosted services on console.redhat.com.

The Automation Savings Planner is designed to provide a one stop shop to plan, track and analyze potential efficiency improvements and cost savings of your automation initiatives.

 

How does it work?

Users can create an automation savings plan within Red Hat Insights for Red Hat Ansible Automation Platform by defining how long and often the work is done manually, as well as a list of tasks needed to successfully automate this job.

Once defined, you can integrate your newly Continue reading

Day Two Cloud 106: Towards A More Open Cloud

On today's Day Two Cloud we discuss the notion of open cloud. The premise is about reducing or minimizing costs of migrating from a public cloud. In theory, open cloud lets organizations keep their options open to make changes and reduces lock-in. But is open cloud even feasible? Our guest is Chris Psaltis, co-founder and CEO of Mist.io, a startup building an open-source, multi-cloud management platform.

Day Two Cloud 106: Towards A More Open Cloud

On today's Day Two Cloud we discuss the notion of open cloud. The premise is about reducing or minimizing costs of migrating from a public cloud. In theory, open cloud lets organizations keep their options open to make changes and reduces lock-in. But is open cloud even feasible? Our guest is Chris Psaltis, co-founder and CEO of Mist.io, a startup building an open-source, multi-cloud management platform.

The post Day Two Cloud 106: Towards A More Open Cloud appeared first on Packet Pushers.

Free Speech is More than Words

A couple of weeks ago, I joined Leslie Daigle and Alexa Reid on Techsequences to talk about free speech and the physical platform—does the right to free speech include the right to build and operate physical facilities like printing presses and web hosting? I argue it does. Listen in if you want to hear my argument, and how this relates to situations such as the “takedown” of Parler.

Listen here

NATs, PATs, and Network Hygiene

While reading a research paper on address spoofing from 2019, I ran into this on NAT (really PAT) failures—

In the first failure mode, the NAT simply forwards the packets with the spoofed source address (the victim) intact … In the second failure mode, the NAT rewrites the source address to the NAT’s publicly routable address, and forwards the packet to the amplifier. When the server replies, the NAT system does the inverse translation of the source address, expecting to deliver the packet to an internal system. However, because the mapping is between two routable addresses external to the NAT, the packet is routed by the NAT towards the victim.

The authors state 49% of the NATs they discovered in their investigation of spoofed addresses fail in one of these two ways. From what I remember way back when the first NAT/PAT device (the PIX) was deployed in the real world (I worked in TAC at the time), there was a lot of discussion about what a firewall should do with packets sourced from addresses not indicated anywhere.

If I have an access list including 192.168.1.0/24, and I get a packet sourced from 192.168.2.24, Continue reading

Heavy Networking 588: Exploring The Hidden Realms Of Subsea Cables With Telstra (Sponsored)

Subsea communications cables are an essential part of the global Internet. On today's Heavy Networking, sponsored by Telstra, we dive into the realms of undersea cables to learn how they are laid, signalling methods, POPs and landing stations, how they can be damaged (and repaired), and more. Our Telstra guests are Andy Lumsden, Head of Network Engineering and Operations; and Jeff McHardy, General Manager, Network Development and Commercial Management.

Heavy Networking 588: Exploring The Hidden Realms Of Subsea Cables With Telstra (Sponsored)

Subsea communications cables are an essential part of the global Internet. On today's Heavy Networking, sponsored by Telstra, we dive into the realms of undersea cables to learn how they are laid, signalling methods, POPs and landing stations, how they can be damaged (and repaired), and more. Our Telstra guests are Andy Lumsden, Head of Network Engineering and Operations; and Jeff McHardy, General Manager, Network Development and Commercial Management.

The post Heavy Networking 588: Exploring The Hidden Realms Of Subsea Cables With Telstra (Sponsored) appeared first on Packet Pushers.

The Data Driven Enterprise

The rise of cloud migration for enterprises with mission critical applications is redefining the data center. The reality for any enterprise: a systematic approach balancing workloads in the cloud and premises while securing data. Data and applications must be managed as critical assets in the 21st century.

The Data Driven Enterprise

The rise of cloud migration for enterprises with mission critical applications is redefining the data center. The reality for any enterprise: a systematic approach balancing workloads in the cloud and premises while securing data. Data and applications must be managed as critical assets in the 21st century.

Installing fonts on your Linux system

Linux systems generally start out with a large number of fonts available, especially once you've installed LibreOffice. Even so, you might find yourself craving some highly distinctive or unusual fonts to add a special tone to some of your projects. If so, you're in luck. You're likely to find many thousands of free fonts available online – bold, italic, calligraphy, modern, script, hand lettering, cursive, brush lettering, symbolic and more.Here's a small sampling of popular sites that provide free fonts for easy downloading: dafont.com fontzone.net fonts.google.com fontspace.com You can also type "free fonts" into your favorite search engine. Expect to see a huge number of responses. Keep in mind that not all fonts are free, but plenty of free fonts are available, and they're easy to view, download and install.To read this article in full, please click here

Installing fonts on your Linux system

Linux systems generally start out with a large number of fonts available, especially once you've installed LibreOffice. Even so, you might find yourself craving some highly distinctive or unusual fonts to add a special tone to some of your projects. If so, you're in luck. You're likely to find many thousands of free fonts available online – bold, italic, calligraphy, modern, script, hand lettering, cursive, brush lettering, symbolic and more.Here's a small sampling of popular sites that provide free fonts for easy downloading: dafont.com fontzone.net fonts.google.com fontspace.com You can also type "free fonts" into your favorite search engine. Expect to see a huge number of responses. Keep in mind that not all fonts are free, but plenty of free fonts are available, and they're easy to view, download and install.To read this article in full, please click here

Tech Bytes: An IT Punch List For Reopening The Office (Sponsored)

If IT thinks it can take the office network out of mothballs and expect everything to be fine when employees show up, think again. On today's Tech Bytes podcast, sponsored by Netskope, guest Hansang Bae shares a punch list of tasks IT should complete before end users get back to the office.

The post Tech Bytes: An IT Punch List For Reopening The Office (Sponsored) appeared first on Packet Pushers.

Demo: Cloud Networking with Overlapping CIDR, L7 Firewalls, Segmentation, and Flow visibility

I created a live demo showing some cool capabilities of the Aviatrix Cloud Networking Platform. In this demo I play the role of a SaaS provider that onboards new customers via VPN, and needs to meet the following requirements:

  • Easily onboard new customers even if their IP addressing overlaps with the SaaS provider.

  • Provide secure segmentation and isolation between customers.

  • Easily insert next gen firewalls between the customers and the SaaS for deep packet inspection and threat analysis.

  • Have complete flow level visibility of customer network traffic, and operation tools to diagnose and troubleshoot problems.

  • Provide end-to-end encryption to secure sensitive data in flight.

  • And be able to meet all of these requirements using any cloud provider.

In the demo I show how easy it is to meet requirements like this using Aviatrix. And best of all, no matter which cloud provider(s) you’re using, the solution and architecture is exactly the same. This SaaS provider can use the services and global footprint of any or all cloud providers, and do it with consistent repeatable architecture.

You can leave comments on this post here: where I posted this on LinkedIN.

Is there a particular scenario you want to see in a Continue reading