Cloudflare is building out its network and security services offerings to compete with SASE and CASB providers. The new Magic WAN and Magic Firewall offerings let customers direct traffic from branch offices, remote workers, and data centers to Cloudlfare's infrastructure for WAN transport and security inspection.
As IT professionals know, enterprise server farms are huge energy consumers, and the larger they are, the more voracious their appetite.Quantum computing could help because it is not only supposed to solve complex problems exponentially faster than classical computing, it’s also supposed to do so while consuming less energy. However major barriers—such as creating the extremely low temperatures required to enable superconductivity that is used in quantum-computing components—stand in the way.[Get regularly scheduled insights by signing up for Network World newsletters.]
Now researchers at MIT are working on a tiny device that could help enable quantum computing and drastically reduce server-farm costs. The roots of this device—made from a superconducting nanowire—stretch back to a similar concept developed in the mid-1950s by an MIT electrical engineer who died tragically young before his vision could become reality.To read this article in full, please click here
As IT professionals know, enterprise server farms are huge energy consumers, and the larger they are, the more voracious their appetite.Quantum computing could help because it is not only supposed to solve complex problems exponentially faster than classical computing, it’s also supposed to do so while consuming less energy. However major barriers—such as creating the extremely low temperatures required to enable superconductivity that is used in quantum-computing components—stand in the way.[Get regularly scheduled insights by signing up for Network World newsletters.]
Now researchers at MIT are working on a tiny device that could help enable quantum computing and drastically reduce server-farm costs. The roots of this device—made from a superconducting nanowire—stretch back to a similar concept developed in the mid-1950s by an MIT electrical engineer who died tragically young before his vision could become reality.To read this article in full, please click here
Decision making, especially in large organizations, fails in many interesting ways. Understanding these failure modes can help us cope with seemingly difficult situations, and learn how to make decisions better. On this episode of the Hedge, Frederico Lucifredi, Ethan Banks, and Russ White discuss Frederico’s thoughts on developing a taxonomy of indecision. You can find his presentation on this topic here.
Newly anointed Intel chief executive officer Pat Gelsinger held the coming out party for his strategy to get the world’s largest chip manufacturer and designer back on track, called “Intel Unleashed: Engineering The Future,” on Tuesday after the market closed. …
The security industry needs to wake up. Today’s attackers aretoo numerousand too determined to get caught by simple perimeter defenses. It’s no longer a matter of if an attack will be successful, it’s a matter of when. Security pros need to recognize this reality, stop using archaic detect and respond approaches to secure the enterprise, and start focusing on blocking the spread of attacks once they make that initial breach.
Changing the industry won’t be easy. It will require a bold step—one that we believe we’ve taken at VMware with our distributed, software-defined approach to enterprise security.This approach gives us the ability to operationalize east-west security at scale, simplify the implementation of segmentation in just a few steps, and insert advanced threat prevention inside the data center.
We’llshowcasethese latest security advances on Thursday, March 25, starting at at2:00 pm PST.Broadcasting live around the world during Security Field Day 5, NSX security experts will run through simple, practical steps that security teams can take to meet Continue reading
HashiCorp Vault is a management tool that stores and controls access to sensitive data (passwords, certificates, API keys, and so on). Today's Day Two Cloud is a deep dive on Vault and its use cases. This is an unsponsored show that came together unexpectedly due to a scheduling issue.
HashiCorp Vault is a management tool that stores and controls access to sensitive data (passwords, certificates, API keys, and so on). Today's Day Two Cloud is a deep dive on Vault and its use cases. This is an unsponsored show that came together unexpectedly due to a scheduling issue.
While securing the high-end particle physics market segment is not likely to push any of the AI/ML ASICS into competition with GPUs anytime soon, the chipmakers that can prove their value on some of the most demanding, real-time AI workloads can capture some serious mindshare. …
The Tableau CEO and Salesforce executive is returning to Amazon Web Services after six years away to take over the cloud division when Andy Jassy moves on to the top Amazon job later this year.
Today, we’re excited to announce that your team can use Cloudflare’s network to build Zero Trust controls over the data in your enterprise - wherever it lives and however it moves.
Stopping data loss is difficult for any team and that challenge has become harder as users have left offices and data has left on-premise storage centers. Enterprises can no longer build a simple castle-and-moat around their data. Users now connect from any location on the planet to applications that live in environments outside of that enterprise’s control.
We have talked to hundreds of customers who have resorted to applying stopgap measures to try and maintain that castle-and-moat model in some form, but each of those band-aids slow down their users or drive up costs - or both. Almost all of the short-term options available combine point solutions that ultimately force traffic to backhaul through a central location.
Part of Cloudflare One, Cloudflare’s approach to data loss prevention relies on the same infrastructure and global network that accelerates user traffic to the Internet to also perform inline inspection against all traffic regardless of how it arrives on our network.
We also know that enterprises need more than just scanning Continue reading
Version 2.0 of Solo.io’s Gloo Edge will integrate the Gloo Edge, an ingress controller, and the open source Istio service mesh will form a single control plane, Solo.io said this week during its Torsten Volk, an analyst for Enterprise Management Associates (EMA), said.
“Most organizations have regarded Istio as something to ‘attack once it’s become more approachable and easier to manage,’” Volk said. “These Solo.io announcements might ring in this new age of “service mesh for everyone.”
In a Continue reading
API traffic is growing fast. Last year alone it grew 300% faster at our edge than web traffic. Because APIs power mobile and web applications, transmitting instructions as diverse as “order a pizza from my favourite restaurant using this credit card” or “place a cryptocurrency trade and these are my personal details”, they are ripe for data theft and abuse. Data exposure is listed as one of the top threats for API traffic by OWASP; this includes data leaks and exfiltration from origin responses (API Security TOP 10 threats 2019). The increase in API traffic and more frequent data attacks call for new security solutions.
Cloudflare’s security toolkit had always been designed to protect web and API traffic. However, after talking to hundreds of customers we realised that there is a need for easily deployed and configured security tools for API traffic in a single interface. To meet this demand, in October 2020 we launched API ShieldTM, a new product aimed at bringing together all security solutions designed for API traffic. We started by providing mTLS authentication to all Cloudflare users free of charge, gRPC support and Schema Validation in Beta. During the launch we laid Continue reading
Data exfiltration, or data loss, can be a very time-consuming and expensive ordeal causing financial loss, negative brand association, and penalties from privacy focused laws. Take for example, an incident where sensitive smart grid and metering R&D knowledge information from an industrial control system of a North American electric utility was exfiltrated through an attack that was suspected to have originated from inside the network. Unauthorized access to data from a utilities company can result in a compromised smart grid or power outages.
In another example, a security researcher found exposed and unknown (undocumented) API endpoints for Tesla’s Backup Gateway that could have been used to export data or make unauthorized changes. This would have had very real physical consequences had the unauthenticated API endpoint been used by an attacker to damage the battery or the connected electric grid.
Source: Verizon 2020 Data Breach Investigations Report
Both these examples emphasize the importance of considering internal and external threats when thinking about how to protect a network from data exfiltration. An insider threat isn’t necessarily a user willfully causing harm: according to Fortinet’s 2019 Insider Threat Report, from the organizations surveyed 71% were concerned about a careless user causing an accidental Continue reading
TL&DR: Azure Route Server works as advertised. Setting it up is excruciatingly slow. You might want to start the process just before taking a long lunch break.
I decided to take Azure Route Server for a ride. Simple setup, two Networking Virtual Appliance (NVA) instances running Quagga to advertise a single prefix (just to see how multipathing works).
TL&DR: Azure Route Server works as advertised. Setting it up is excruciatingly slow. You might want to start the process just before taking a long lunch break.
I decided to take Azure Route Server for a ride. Simple setup, two Networking Virtual Appliance (NVA) instances running Quagga to advertise a single prefix (just to see how multipathing works).
As SASE solutions incorporate more user-centric intelligence, the enterprise IT stack will become more supportive of the real-world problems confronting businesses every day.
The server market is a multi-cylinder engine, with eight major hyperscalers and cloud builders all doing their thing almost independently of each other and of the economic conditions at large and the rest of the market being more subject to the waxing and waning of the economic tides. …