Splunk Makes Security Hygiene Sexy Again

“Vulnerability management, configuration management, patch management — those things should...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Protect your team with Cloudflare Gateway

Protect your team with Cloudflare Gateway

On January 7th, we announced Cloudflare for Teams, a new way to protect organizations and their employees globally, without sacrificing performance. Cloudflare for Teams centers around two core products - Cloudflare Access and Cloudflare Gateway. Cloudflare Access is already available and used by thousands of teams around the world to secure internal applications. Cloudflare Gateway solves the other end of the problem by protecting those teams from security threats without sacrificing performance.

Today, we’re excited to announce new secure DNS filtering capabilities in Cloudflare Gateway. Cloudflare Gateway protects teams from threats like malware, phishing, ransomware, crypto-mining and other security threats. You can start using Cloudflare Gateway at dash.teams.cloudflare.com. Getting started takes less than five minutes.

Why Cloudflare Gateway?

We built Cloudflare Gateway to address key challenges our customers experience with managing and securing global networks. The root cause of these challenges is architecture and inability to scale. Legacy network security models solved problems in the 1990s, but teams have continued to attempt to force the Internet of the 2020s through them.

Historically, branch offices sent all of their Internet-bound traffic to one centralized data center at or  near corporate headquarters. Administrators configured that to make sure all Continue reading

Worth Reading: 10 Optimizations on Linear Search

Stumbled upon an article by Tom Limoncelli. He starts with a programming question (skip that) but then goes into an interesting discussion of what’s really important.

Being focused primarily on networking this is the bit I liked most (another case of Latency Matters):

I once observed a situation where a developer was complaining that an operation was very slow. His solution was to demand a faster machine. The sysadmin who investigated the issue found that the code was downloading millions of data points from a database on another continent. The network between the two hosts was very slow. A faster computer would not improve performance.

The solution, however, was not to build a faster network, either. Instead, we moved the calculation to be closer to the data.

Lesson learned: always figure out the real problem and what the most effective way of solving it as opposed to pushing the problem down the stack or into the cloud.

Worth Reading: 10 Optimizations on Linear Search

Stumbled upon an article by Tom Limoncelli. He starts with a programming question (skip that) but then goes into an interesting discussion of what’s really important.

Being focused primarily on networking this is the bit I liked most (another case of Latency Matters):

I once observed a situation where a developer was complaining that an operation was very slow. His solution was to demand a faster machine. The sysadmin who investigated the issue found that the code was downloading millions of data points from a database on another continent. The network between the two hosts was very slow. A faster computer would not improve performance.

The solution, however, was not to build a faster network, either. Instead, we moved the calculation to be closer to the data.

Lesson learned: always figure out the real problem and what the most effective way of solving it as opposed to pushing the problem down the stack or into the cloud.

AWS Bottlerocket Launches Into Container OS Space

Jeff Barr, chief evangelist for AWS, noted that it “includes only the packages that are needed”...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Daily Roundup: Amazon, Apple Convene COVID-19 Response at White House

Amazon, Apple convened for COVID-19 response at White House; Microsoft defeated Necurs Botnet; and...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Microsoft Leads Massive Necurs Botnet Takedown

Between 2016 and 2019, Necurs was the most prominent spam and malware-delivery method and was...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Money Moves: February 2020

HPE buys Scytale, embraces open source security; Intel ditches Nervana, high on Habana; plus the...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Coronavirus Wreaks Havoc on Tech Industry

"This is one of those moments when companies must strive more than ever to act with values and...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Hitachi Vantara Skims Containership’s Kubernetes Assets

Containership sank last fall after failing to monetize its Kubernetes distribution.

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

JSON

JSON(Java Script Object Notification) is another data type apart from XML and YAML ,It’s easy for human and machine to understand than XML.

As usual, lets start with json example:

anurudh@anurudh:~/newfolder$ cat ex1_js.json
{
  "hostname": "Router1",
  "vendor": "cisco",
  "users": {
      "admin": 15,
      "storage": 10
},
  "vlans": [
     { 
       "vlan_name": "VLAN10",
       "vlan_id": 10
     },
     {
      "vlan_name": "VLAN20",
      "vlan_id": 20
     }
   ]
}

We like to put few point :

  • The whole thing is wrapped in curly braces {}.
  • JSON  use string values when describing the keys in these constructs.

Working with JSON in Python

anurudh@anurudh:~/newfolder$ cat ex1_js.py 
# Module need to be imported to use json 
import json

# File is open and stored in varible dat 
with open("ex1_js.json") as f:
     data = f.read()

# json.loads places json data into json_out (dictionary)
json_out = json.loads(data)

# print output
print(json_out)

# Lets check the data type 'json_out'
print("The Json document loaded as type {0}\n".format(type(json_out)))

# Method json.dumps will  convert python object back json string
json_out1 = json.dumps(json_out)

#print output
print(json_out1)

# Lets check the data type 'json_out1'
print("The Json document loaded as type {0}\n".format(type(json_out1)))

anurudh@anurudh:~/newfolder$ 

OUTPUT

anurudh@anurudh:~/newfolder$ python3 ex1_js.py 
{'hostname': 'Router1',  Continue reading

Intermediary Liability: The Hidden Gem

There is a law in the United States that consists of twenty-six words: “No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.” Otherwise known as Section 230 of the Communications Decency Act (CDA), it has been characterized as the law that “created the Internet.”

Only part of this statement is true. Section 230 did not actually create the Internet because the Internet was created through the collaboration of a diverse set of people around the world. What is true, however, is that the intermediary liability regime has undergirded the Internet as we know it. It has been responsible for three primary features of the Internet:

  • It has created certainty and predictability: intermediary liability rules have allowed Internet providers (both infrastructure and content) to design compliance strategies based on a limited set of laws and their Terms of Service (ToS). Because of intermediary liability, companies can design businesses that suit their needs.
  • It has created good Internet citizens: intermediary liability rules have ensured that the burden of determining whether a business is going to speak in a particular way is Continue reading

NtC – Source Of Truth

In this inaugural episode of Network to Code on Network Collective, Jeremy Stretch, John Anderson, Rick Sherman, and Jordan Martin meet up around the virtual roundtable to discuss what a source of truth is, how it can play a critical role in your network automation efforts, and how the open source project Netbox might fill that role in your network.

Jeremy Stretch
Guest
John Anderson
Guest
Rick Sherman
Host
Jordan Martin
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post NtC – Source Of Truth appeared first on Network Collective.

Open sourcing our Sentry SSO plugin

Open sourcing our Sentry SSO plugin

Cloudflare Access, part of Cloudflare for Teams, replaces legacy corporate VPNs with Cloudflare’s global network. Using your existing identity provider, Access enables your end users to login from anywhere — without a clunky agent or traffic backhaul through a centralized appliance or VPN.

Today, we are open sourcing a plugin that continues to improve that experience by making it easier for teams to use Cloudflare Access with one of the software industry’s most popular engineering tools, Sentry.

What is Sentry?

Sentry is an application that helps software teams find and diagnose errors in their products. We use Sentry here at Cloudflare. When you encounter an error when using a Cloudflare product, like our dashboard, we log that event. We then use Sentry to determine what went wrong.

Sentry can categorize and roll up errors, making it easy to identify new problems before investigating them with the tool’s event logging. Engineering managers here can use the dashboards to monitor the health of a new release. Product managers often use those reports as part of prioritizing what to fix next. Engineers on our team can dig into the individual errors as they release a fix.

Sentry is available in two forms: Continue reading