Over the next year, we should get a good sense of how the Cerebras CS-1 system performs for dual HPC and AI workloads between installations at Argonne and Lawrence Livermore labs, EPCC, and the Pittsburgh Supercomputing Center (PSC). …
In 2019, Hewlett Packard Enterprise was the first top-tier tech vendor to make the plunge, announcing that it planned to make its entire portfolio – all of its hardware as well as software – available as a service by 2022, leveraging its GreenLake hybrid cloud platform to answer the call to make the on-premises datacenter experience as cloud-like as possible. …
SPONSORED Mention GPUs these days, and you will naturally think about how they can accelerate the most challenging AI and machine learning workloads as well as how they are used in gaming platforms. …
Cisco has taken a big step forward with its first network-as-a-service offering that ultimately will let customers buy enterprise-network hardware and software components on an as-needed basis.The company announced the service, called Cisco Plus, at its virtual Cisco Live 2021! conference, telling customers its NaaS will offer best-in-class networking, security, compute, storage, and applications with unified subscriptions that promise to be simple to use.Now see: Who’s selling SASE, and what do you get?“Network-as-a-service delivery is a great option for businesses wanting to shift to a cloud operating model that makes its easy and simple to buy and consume the necessary components to improve and grow their businesses,” said James Mobley, senior vice president and general manager of Cisco’s Network Services Business Unit.To read this article in full, please click here
The team at Cloudflare building our Web Application Firewall (WAF) has continued to innovate over the past year. Today, we received public recognition of our work.
The ease of use, scale, and innovative controls provided by the Cloudflare WAF has translated into positive customer reviews, earning us the Gartner Peer Insights Customers' Choice Distinction for WAF for 2021. You can download a complimentary copy of the report here.
Gartner Peer Insights Customers’ Choice distinctions recognize vendors and products that are highly rated by their customers. The data collected represents a top-level synthesis of vendor software products most valued by IT Enterprise professionals.
The positive feedback we have received is consistent and leads back to Cloudflare’s product principles. Customers find that Cloudflare’s WAF is:
“An excellent hosted WAF, and a company that acts more like a partner than a vendor” — Principal Site Reliability Architect in the Services Industry[Full Review];
“A straightforward yet highly effective WAF solution”— VP in the Finance Industry[Full Review];
“Easy and Powerful with Outstanding Support”— VP Technology in the Retail Industry[Full Review];
“Secure, Intuitive and a Delight for web security and accelerations”— Sr Director-Technical Product Continue reading
This guest post is by Ihab Tarazi, Sr. VP and Networking CTO at Dell Technologies. We thank Dell Technologies for being a sponsor. It’s an exciting time to be a part of today’s networking evolution where all the pieces are finally falling into place to help us truly realize a software-defined network. SONiC is an […]
On today's sponsored Heavy Networking podcast we examine the use of SmartNICs and DPUs to offload networking and security processes. We also discuss the use of the SONiC network OS to run on SmartNICs and DPUs, with P4 as a programming layer. Dell Technologies is our sponsor, and our guest from Dell is Ihab Tarazi, Sr. VP and Networking CTO.
On today's sponsored Heavy Networking podcast we examine the use of SmartNICs and DPUs to offload networking and security processes. We also discuss the use of the SONiC network OS to run on SmartNICs and DPUs, with P4 as a programming layer. Dell Technologies is our sponsor, and our guest from Dell is Ihab Tarazi, Sr. VP and Networking CTO.
Tutanota co-founder Matthias Pfau explains how a recent court order is a wake-up call to end the encryption debate once and for all In a world increasingly reliant on the Internet in our day-to-day lives, there’s no turning back on encryption. Encryption is a critical security tool for citizens, businesses, and governments to communicate confidentially […]
Starting today, your team can use Cloudflare Access to build rules that only allow users to connect to applications from a device that your enterprise manages. You can combine this requirement with any other rule in Cloudflare’s Zero Trust platform, including identity, multifactor method, and geography.
As more organizations adopt a Zero Trust security model with Cloudflare Access, we hear from customers who want to prevent connections from devices they do not own or manage. For some businesses, a fully remote workforce increases the risk of data loss when any user can login to sensitive applications from an unmanaged tablet. Other enterprises need to meet new compliance requirements that restrict work to corporate devices.
We’re excited to help teams of any size apply this security model, even if your organization does not have a device management platform or mobile device manager (MDM) today. Keep reading to learn how Cloudflare Access solves this problem and how you can get started.
The challenge of unmanaged devices
An enterprise that owns corporate devices has some level of control over them. Administrators can assign, revoke, inspect and manage devices in their inventory. Whether teams rely on management platforms or a simple spreadsheet, businesses can Continue reading
End user account security is always a top priority, but a hard problem to solve. To make matters worse, authenticating users is hard. With datasets of breached credentials becoming commonplace, and more advanced bots crawling the web attempting credential stuffing attacks, protecting and monitoring authentication endpoints becomes a challenge for security focused teams. On top of this, many authentication endpoints still rely just on providing a correct username and password making undetected credential stuffing lead to account takeover by malicious actors.
Many features of the Cloudflare platform can help with implementing account takeover protections. In this post we will go over several examples as well as announce a number of new features. These include:
Open Proxy managed list (NEW): ensure authentication attempts to your app are not coming from proxy services;
Super Bot Fight Mode (NEW): keep automated traffic away from your authentication endpoints;
Exposed Credential Checks (NEW): get a warning whenever a user is logging in with compromised credentials. This can be used to initiate a two factor authentication flow or password reset;
Over the last week, Cloudflare has published blog posts on products created to secure our customers from credential stuffing bots, detect users with compromised credentials, and block users from proxy services. But what do we do inside Cloudflare to prevent account takeovers on our own applications? The Security Team uses Cloudflare products to proactively prevent account compromises. In addition, we build detections and automations as a second layer to alert us if an employee account is compromised. This ensures we can catch suspicious behavior, investigate it, and quickly remediate.
Our goal is to prevent automated and targeted attackers regardless of the account takeover technique: brute force attack, credential stuffing, botnets, social engineering, or phishing.
Classic Account Takeover Lifecycle
First, let's walk through a common lifecycle for a compromised account.
In a typical scenario, a set of passwords and email addresses have been breached. These credentials are reused through credential stuffing in an attempt to gain access to any account (on any platform) where the user may have reused that combination. Once the attacker has initial access, which means the combination worked, they can gain information on that system and pivot to other systems through methods. This is classified Continue reading
Many times I heard that certification is just wasting time. And only real experience does matter. Of course, real experience is important. But often It’s so hard to get experience. E.g. your current job can’t give you opportunities to work with some technologies and you can’t get a new promotion or change a job, because you don’t have some experience. A typical loop. And in my opinion, certification is one of the suitable tools to break this loop and expand your opportunities.
Benefits of every certification:
- We always need motivation for learning something. Every certification consists of several levels. Step by step approach. Levels are goals for us. And it helps to keep motivation on a high level. And every achieved level helps to feel more confident. - Every certification program has proper learning tools. Self-study guides, books, online/offline courses, etc. It helps to save time so we can just start to study. - Certification is not the main goal. Preparing is the main goal. And preparing results. For example, notes. Notes were useful before exams as well as they will be useful in the future.
Here’s a message I got from one of my subscribers (probably based on one of my recent public cloud rants):
I often think the cloud stuff has been sent to try us in IT – the struggle could be tough enough when we were dealing with waterfall development and monolithic projects. When products took years to develop, and years to understand.
And now we’re being asked to be agile and learn new stuff all the time about moving targets that barely have documentation at all, never mind accurate doco! We had obviously got into our comfort zone and needed shaking out of it!
Always interested to hear your experiences with the cloud networking though – it’s what I subscribed to ipspace.net for TBH as I think it’s the most complete reference source for that purpose and a vital part of enterprise networking these days!
It’s always extremely nice to hear someone finds your work valuable ;) Thanks a million!
Here’s a message I got from one of my subscribers (probably based on one of my recent public cloud rants):
I often think the cloud stuff has been sent to try us in IT – the struggle could be tough enough when we were dealing with waterfall development and monolithic projects. When products took years to develop, and years to understand.
And now we’re being asked to be agile and learn new stuff all the time about moving targets that barely have documentation at all, never mind accurate doco! We had obviously got into our comfort zone and needed shaking out of it!
Always interested to hear your experiences with the cloud networking though – it’s what I subscribed to ipspace.net for TBH as I think it’s the most complete reference source for that purpose and a vital part of enterprise networking these days!
It’s always extremely nice to hear someone finds your work valuable ;) Thanks a million!
5G networks that incorporate legacy technology could be vulnerable to compromise via a lack of mapping between transport and application layers, according to a report by Ireland-based AdaptiveMobile Security.To read this article in full, please click here(Insider Story)
5G networks that incorporate legacy technology could be vulnerable to compromise via a lack of mapping between transport and application layers, according to a report by Ireland-based AdaptiveMobile Security.
5G resources
What is 5G? Fast wireless technology for enterprises and phones
How 5G frequency affects range and speed
Private 5G can solve some problems that Wi-Fi can’t
Private 5G keeps Whirlpool driverless vehicles rolling
5G can make for cost-effective private backhaul
CBRS can bring private 5G to enterprises
Network slicing is central to realizing many of 5G’s more ambitious capabilities because it enables individual access points or base stations to subdivide networks into multiple logical sections—slices—effectively providing entirely separate networks for multiple uses. The slices can be used for different purposes—say, mobile broadband for end-users and massive IoT connectivity—at the same time, without interfering with each other.To read this article in full, please click here
5G networks that incorporate legacy technology could be vulnerable to compromise via a lack of mapping between transport and application layers, according to a report by Ireland-based AdaptiveMobile Security.
5G resources
What is 5G? Fast wireless technology for enterprises and phones
How 5G frequency affects range and speed
Private 5G can solve some problems that Wi-Fi can’t
Private 5G keeps Whirlpool driverless vehicles rolling
5G can make for cost-effective private backhaul
CBRS can bring private 5G to enterprises
Network slicing is central to realizing many of 5G’s more ambitious capabilities because it enables individual access points or base stations to subdivide networks into multiple logical sections—slices—effectively providing entirely separate networks for multiple uses. The slices can be used for different purposes—say, mobile broadband for end-users and massive IoT connectivity—at the same time, without interfering with each other.To read this article in full, please click here
oday on the Tech Bytes podcast, sponsored by Palo Alto Networks, we dive into Prisma Access 2.0 and how it differs from the first-generation version. We talk about cloud-delivered security, Zero Trust Network Access, the return of proxies, and the importance of user experience management for distributed work.
oday on the Tech Bytes podcast, sponsored by Palo Alto Networks, we dive into Prisma Access 2.0 and how it differs from the first-generation version. We talk about cloud-delivered security, Zero Trust Network Access, the return of proxies, and the importance of user experience management for distributed work.