Security is difficult and tricky, but we've got an amazing guest on today's Day Two Cloud podcast to help you improve your security posture and manage your cloud risk. Our guest is Tanya Janca, Founder, Security Trainer, and Coach at She Hacks Purple. We discuss key security areas including the network, identity, and applications; taking advantage of cloud visibility; securing SaaS apps; and more.
The post Day Two Cloud 055: Securing Cloud Infrastructure And Applications appeared first on Packet Pushers.
Organizational change, growth, and environmental diversity are all challenges for IT teams, and they’re going to be a part of everyday life for the foreseeable future. As the number of device models and network architectures increases, so, too, does management complexity. Coping with 2020’s ongoing gift of unpredictability requires technological agility, something Cumulus Networks, acquired by NVIDIA, can help you with.
It’s easy to worry about the consequences of our collective, rapidly changing economic circumstances as though the problems presented are somehow novel. They’re not.
2020 has increased uncertainty, leading to an increased velocity of change, but change is the only constant in life, and the need for agile networking has been obvious to many in the industry for some time. Even without problems like having to rapidly figure out how to cope with large chunks of the workforce working from home, change-responsive networking has been a challenge for organizations experiencing growth for decades, a problem many continue to struggle with today.
At a practical level, one of the biggest problems with rapid change is that it quickly leads to a dilemma: precisely meet the needs of the moment, resulting in a significant uptick in equipment diversity, or deploy Continue reading
Earlier this month, we were talking to the James Kulina, the new executive director of the OpenPower Foundation, which is the organization created by IBM and Google back in the summer of 2013 to create a community around the Power architecture. …
Big Blue Open Sources The Core Inside BlueGene/Q Supercomputers was written by Timothy Prickett Morgan at The Next Platform.
Access credentials and secrets are a crucial piece of today’s infrastructure management: if they get compromised, the environment itself is at risk. Thus some time ago, back at about version 3.5.1, the idea of a secrets management system was introduced into Ansible Tower, one of the components of our Red Hat Ansible Automation Platform. What this essentially means is that Ansible Tower has a credential store where it will encrypt at-rest secrets that you need in order to log in to a remote host, authenticate with a cloud endpoint or pull content from a version control system.
We have always needed secrets in order to log in and then configure a remote resource. We do this every day with usernames and passwords. Ansible Tower has a very secure built-in mechanism for providing this capability, but some may see that as an additional security island or bespoke to the enterprise direction. In this blog post, I will highlight the Ansible way of solving the “security island” problem and propose a solution using Ansible credential plugins integration via CyberArk Conjur. Conjur is an API addressable vault where you store access and authorization information instead of having the secrets stored Continue reading
In today’s sponsored Heavy Networking podcast we talk to Telia Carrier. Telia runs its own global IP backbone, and as the public Internet becomes the de facto enterprise WAN, your choice of carrier becomes critical. Our guest is Mattias Fridström, Vice President & Chief Evangelist at Telia Carrier. We discuss why enterprises should consider Telia services including DCI, cloud connections, and SD-WAN.
The post Heavy Networking 526: Rethinking Your Global Enterprise WAN With Telia Carrier (Sponsored) appeared first on Packet Pushers.
HTTP/3 is the third major version of the Hypertext Transfer Protocol, which takes the bold step of moving away from TCP to the new transport protocol QUIC in order to provide performance and security improvements.
During Cloudflare's Birthday Week 2019, we were delighted to announce that we had enabled QUIC and HTTP/3 support on the Cloudflare edge network. This was joined by support from Google Chrome and Mozilla Firefox, two of the leading browser vendors and partners in our effort to make the web faster and more reliable for all. A big part of developing new standards is interoperability, which typically means different people analysing, implementing and testing a written specification in order to prove that it is precise, unambiguous, and actually implementable.
At the time of our announcement, Chrome Canary had experimental HTTP/3 support and we were eagerly awaiting a release of Firefox Nightly. Now that Firefox supports HTTP/3 we thought we'd share some instructions to help you enable and test it yourselves.
Simply go to the Cloudflare dashboard and flip the switch from the "Network" tab manually:
Firefox Nightly has experimental support for Continue reading
The term “general purpose” in regards to compute is an evolving one. …
The New General And New Purpose In Computing was written by Timothy Prickett Morgan at The Next Platform.
Last month, we held our inaugural APAC Insights. The idea behind this is to bring together thought leaders and subject matter experts to discuss issues related to the Internet and its use in the Asia-Pacific.
However, the intention is not to make this another run-of-the-mill talk shop – rather, we want this to be a forum that shares and contrasts experiences, explores challenges and opportunities in a pragmatic way, and provides attendees insights into the issues beyond the usual.
With the global pandemic causing major disruptions to our professional and personal lives, the topic for the first APAC Insights zoomed in on the role the Internet has played in helping communities deal with the coronavirus pandemic.
Speakers from across the region – representing the world’s largest Internet shutdown to the world’s strictest – discussed initiatives that worked well and those that didn’t work so well, and the critical role of the Internet in rolling out these initiatives. During a Q&A segment, attendees had the opportunity to ask the speakers questions.
One of the key points made was that even though the Asia-Pacific is regarded as a mobile-first region, the shutdowns demonstrated (in some countries in particular) how fragile connectivity can Continue reading
Latency is a big deal for many modern applications, particularly in the realm of machine learning applied to problems like determining if someone standing at your door is a delivery person or a … robber out to grab all your smart toasters and big screen television. The problem is networks, particularly in the last mile don’t deal with latency very well. In fact, most of the network speeds and feeds available in anything outside urban areas kindof stinks. The example given by Bagchi et al. is this—
A fixed video sensor may generate 6Mbps of video 24/7, thus producing nearly 2TB of data per month—an amount unsustainable according to business practices for consumer connections, for example, Comcast’s data cap is at 1TB/month and Verizon Wireless throttles traffic over 26GB/month. For example, with DOCSIS 3.0, a widely deployed cable Internet technology, most U.S.-based cable systems deployed today support a maximum of 81Mbps aggregated over 500 home—just 0.16Mbps per home.
Bagchi, Saurabh, Muhammad-Bilal Siddiqui, Paul Wood, and Heng Zhang. “Dependability in Edge Computing.” Communications of the ACM 63, no. 1 (December 2019): 58–66. https://doi.org/10.1145/3362068.
The authors claim a lot of the problem here is just Continue reading
Security professionals are increasingly adopting automation as a way to help unify security operations into structured workflows that can reduce operational complexity, human error, time to respond and can be integrated into existing SIEM (Security Information and Event Management) or SOAR (Security Orchestration Automation and Response) platforms.
In October of 2019 the Ansible network automation team introduced the concept of resource modules:
So what exactly is a “resource module?” Sections of a device’s configuration can be thought of as a resource provided by that device. Network resource modules are intentionally scoped to configure a single resource and can be combined as building blocks to configure complex network services.
Keep in mind that the first network automation modules could either execute arbitrary commands on target devices, or read in the device configuration from a file and deploy it. These modules were quite generic and provided no fine-tuning of certain services or resources.
In contrast, resource modules can make network automation easier and more consistent for those automating multiple platforms in production by avoiding large configuration file templates covering all kinds of configuration. Instead they focus on the task at hand, providing separate building blocks which can be used to Continue reading
There was not an 'old normal' and there won't be a 'new normal'. Don't be fuddled about this.
The post BiB095 – On New and Old Normal in IT Infrastructure appeared first on Packet Pushers.