Got sick and tired of conference keynotes? You might love the Lies, Damned Lies, and Keynotes rant by Corey Quinn. Here are just two snippets:
They’re selling a fantasy, and you’ve been buying it all along.
We’re lying to ourselves. But it feels better than the unvarnished truth.
Enjoy!
Welcome to Next Platform TV for today, July 7, 2020.
We are featuring an in-depth interview with Dr. …
Next Platform TV for July 7, 2020 was written by Nicole Hemsoth at The Next Platform.

Cloudflare has deployed a new managed rule protecting customers against a remote code execution vulnerability that has been found in F5 BIG-IP’s web-based Traffic Management User Interface (TMUI). Any customer who has access to the Cloudflare Web Application Firewall (WAF) is automatically protected by the new rule (100315) that has a default action of BLOCK.
Initial testing on our network has shown that attackers started probing and trying to exploit this vulnerability starting on July 3.
F5 has published detailed instructions on how to patch affected devices, how to detect if attempts have been made to exploit the vulnerability on a device and instructions on how to add a custom mitigation. If you have an F5 device, read their detailed mitigations before reading the rest of this blog post.
The most popular probe URL appears to be /tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp followed by /tmui/login.jsp/..;/tmui/util/getTabSet.jsp, /tmui/login.jsp/..;/tmui/system/user/authproperties.jsp and /tmui/login.jsp/..;/tmui/locallb/workspace/tmshCmd.jsp. All contain the critical pattern ..; which is at the heart of the vulnerability.
On July 3 we saw O(1k) probes ramping to O(1m) yesterday. This is because simple test patterns have been added to scanning tools and small test programs made available by Continue reading
Steve Bellovin began working on networks as a system administrator, helping to build USENIX, which supports operating system research. His work as a system administrator drew his interest into security and cryptographic protection of data, leading him into working on some of the foundational protocols on the Internet.

Because 'command line' is deprectated
The post Dictionary: Finger Defined Networking appeared first on EtherealMind.
Storage is perhaps one of the thorniest issues in computing, whether you are looking at an enterprise datacenter or an HPC environment. …
Bringing The Enterprise SAN Into The Cloud Era was written by Daniel Robinson at The Next Platform.
Huge dataset sizes and computationally intense demands of computational fluid dynamics (CFD) workloads are motivating some organizations to seek highly elastic HPC solutions with enormous memory volumes. …
Puffing Up Computational Fluid Dynamics On The Cloud was written by Timothy Prickett Morgan at The Next Platform.
The Lawful Access to Encrypted Data Act recently introduced to U.S. Congress may be the worse in a recent string of attacks on encryption, our strongest digital security tool online.
While the recently-amended EARN IT Act would leave strong encryption on unstable ground if passed into law, the Lawful Access to Encrypted Data Act (LAEDA) is a direct assault on the tool millions of people rely on for personal and national security each day.
LAEDA would facilitate the death of end-to-end encryption by forcing companies to provide “technical assistance” to access encrypted data upon request by law enforcement investigations.
The problem is the only way for companies to comply would be to build backdoors into their products and services, or not use encryption at all, making everyone more vulnerable to the same crime we are all trying to prevent. To be clear – we’re talking about the same encryption used to keep activities like online banking, working from home, telehealth, and talking with friends secure online.
The Internet Society raised its concerns in an open letter to the co-sponsors of LAEDA in the Senate, which was signed by over 75 global cybersecurity experts, civil society organizations, companies, and Continue reading


Cloudflare TV is inspired by television shows of the 90s that shared the newest, most exciting developments in computing and music videos. We had three basic requirements for Cloudflare TV:

Building a lot of the technology behind Cloudflare TV from scratch was not part of the plan, especially given our aggressive timeline. So why did we decide to pursue it? After evaluating multiple live streaming solutions, we reached the following conclusion:
Our last blog on how NSX secures physical servers provided background on why physical server security is crucial. We cover the percentage share of physical servers to all workloads in the data center and the specific roles physical servers still play. Today, physical servers by percentage are playing a decreasing role in the data center. However, it’s still a vital one, as we pointed out in our last blog on Securing Physical Servers with NSX Service-defined Firewall. In this blog, we will cover a primary way VMware NSX provides secure connectivity for physical servers using a bare metal agent. VMware NSX-T can now offer secure connectivity for Linux and Windows Server physical servers.
There are several ways in which NSX can provide security for physical servers. Our original article, Extending the Power of NSX to Bare Metal, outlines each of these methods.
VMware NSX Continue reading
Today's Network Break podcast discusses critical security patches from F5 and Palo Alto Networks, examines the implications of a Senate bill that targets encryption, and dives into VMware's latest acquisition. We also explore a new space-oriented business unit at AWS and more tech news analysis.
The post Network Break 291: F5 Patches Severe Vulnerability; Senate Bill Aims To Weaken Encryption appeared first on Packet Pushers.
SD-WAN has been one of the most hyped technologies in a long time but as the hype settles out and real world deployments start to take shape, the picture is becoming clearer on what SD-WAN is and is not. In this episode we take a look at the original promises, where we are today in relation to those promises, and what SD-WAN might look like in the years to come.
![]() |
A considerable thank you to Unimus for sponsoring today’s episode. Unimus is a fast to deploy and easy to use Network Automation and Configuration Management solution. You can learn more about how you can start automating your network in under 15 minutes at unimus.net/nc. |
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post The Future of SD-WAN appeared first on Network Collective.
Voting with their dollars: Hundreds of companies have pulled their advertising from Facebook because of the social media giant’s lax policing of misinformation and hate speech, CNN reports. Still, most of the company’s biggest advertisers haven’t joined the boycott, and Facebook CEO Mark Zuckerberg has reportedly predicted “these advertisers will be back on the platform soon enough.”
Driving as a service: German car maker BMW is exploring ways to offer common features, like heated seats and cruise control, in a subscription-based, as-a-service model, The Independent reports. The Next Web called the subscription model “anti-consumer rubbish.” Video game maker Brianna Wu also tweeted her disappointment: “Sorry, but if this catches on, I will never buy another new car. Never.”
Networked threats: The U.S. Federal Communications Commission has designated Chinese networking companies Huawei and ZTE as national security threats, Al Jazeera says. This follows long-term concerns about the companies’ relationship with the Chinese Communist Party and the possibility of surveillance through their equipment. The FCC has proposed that rural telecom carriers be required to replace equipment from the two vendors.
Paying for speed: The Japanese government plans to subsidize local 5G companies as a way to catch up Continue reading

Since I seem to have a lot more time on my hands without travel thanks to current…things, I’ve been consuming podcasts more and more during my morning workouts. I’ve got a decent list going now and I wanted to share it with you. Here are my favorite podcasts (not including the one that I do for Gestalt IT, the On-Premise IT Roundtable: