Splunk Makes Security Hygiene Sexy Again
“Vulnerability management, configuration management, patch management — those things should...
“Vulnerability management, configuration management, patch management — those things should...

On January 7th, we announced Cloudflare for Teams, a new way to protect organizations and their employees globally, without sacrificing performance. Cloudflare for Teams centers around two core products - Cloudflare Access and Cloudflare Gateway. Cloudflare Access is already available and used by thousands of teams around the world to secure internal applications. Cloudflare Gateway solves the other end of the problem by protecting those teams from security threats without sacrificing performance.
Today, we’re excited to announce new secure DNS filtering capabilities in Cloudflare Gateway. Cloudflare Gateway protects teams from threats like malware, phishing, ransomware, crypto-mining and other security threats. You can start using Cloudflare Gateway at dash.teams.cloudflare.com. Getting started takes less than five minutes.
We built Cloudflare Gateway to address key challenges our customers experience with managing and securing global networks. The root cause of these challenges is architecture and inability to scale. Legacy network security models solved problems in the 1990s, but teams have continued to attempt to force the Internet of the 2020s through them.
Historically, branch offices sent all of their Internet-bound traffic to one centralized data center at or near corporate headquarters. Administrators configured that to make sure all Continue reading
Stumbled upon an article by Tom Limoncelli. He starts with a programming question (skip that) but then goes into an interesting discussion of what’s really important.
Being focused primarily on networking this is the bit I liked most (another case of Latency Matters):
I once observed a situation where a developer was complaining that an operation was very slow. His solution was to demand a faster machine. The sysadmin who investigated the issue found that the code was downloading millions of data points from a database on another continent. The network between the two hosts was very slow. A faster computer would not improve performance.
The solution, however, was not to build a faster network, either. Instead, we moved the calculation to be closer to the data.
Lesson learned: always figure out the real problem and what the most effective way of solving it as opposed to pushing the problem down the stack or into the cloud.
Stumbled upon an article by Tom Limoncelli. He starts with a programming question (skip that) but then goes into an interesting discussion of what’s really important.
Being focused primarily on networking this is the bit I liked most (another case of Latency Matters):
I once observed a situation where a developer was complaining that an operation was very slow. His solution was to demand a faster machine. The sysadmin who investigated the issue found that the code was downloading millions of data points from a database on another continent. The network between the two hosts was very slow. A faster computer would not improve performance.
The solution, however, was not to build a faster network, either. Instead, we moved the calculation to be closer to the data.
Lesson learned: always figure out the real problem and what the most effective way of solving it as opposed to pushing the problem down the stack or into the cloud.
Jeff Barr, chief evangelist for AWS, noted that it “includes only the packages that are needed”...
Amazon, Apple convened for COVID-19 response at White House; Microsoft defeated Necurs Botnet; and...
Different Data types i.e YAML,XML,JSON has been already discussed in below blogs :
JSON : https://knowpackets.com/2020/03/11/json/
XML: https://knowpackets.com/2020/02/28/xml/
YAML: https://knowpackets.com/2020/02/26/yaml/
Here you will find the comparison between all the three mentioned data types in one page:


And some agreed that despite the SD-WAN's advantages, MPLS wasn't going anywhere.
Between 2016 and 2019, Necurs was the most prominent spam and malware-delivery method and was...
HPE buys Scytale, embraces open source security; Intel ditches Nervana, high on Habana; plus the...
"This is one of those moments when companies must strive more than ever to act with values and...
Containership sank last fall after failing to monetize its Kubernetes distribution.
JSON(Java Script Object Notification) is another data type apart from XML and YAML ,It’s easy for human and machine to understand than XML.
As usual, lets start with json example:
anurudh@anurudh:~/newfolder$ cat ex1_js.json
{
"hostname": "Router1",
"vendor": "cisco",
"users": {
"admin": 15,
"storage": 10
},
"vlans": [
{
"vlan_name": "VLAN10",
"vlan_id": 10
},
{
"vlan_name": "VLAN20",
"vlan_id": 20
}
]
}
We like to put few point :
Working with JSON in Python
anurudh@anurudh:~/newfolder$ cat ex1_js.py
# Module need to be imported to use json
import json
# File is open and stored in varible dat
with open("ex1_js.json") as f:
data = f.read()
# json.loads places json data into json_out (dictionary)
json_out = json.loads(data)
# print output
print(json_out)
# Lets check the data type 'json_out'
print("The Json document loaded as type {0}\n".format(type(json_out)))
# Method json.dumps will convert python object back json string
json_out1 = json.dumps(json_out)
#print output
print(json_out1)
# Lets check the data type 'json_out1'
print("The Json document loaded as type {0}\n".format(type(json_out1)))
anurudh@anurudh:~/newfolder$
OUTPUT
anurudh@anurudh:~/newfolder$ python3 ex1_js.py
{'hostname': 'Router1', Continue reading
There is a law in the United States that consists of twenty-six words: “No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.” Otherwise known as Section 230 of the Communications Decency Act (CDA), it has been characterized as the law that “created the Internet.”
Only part of this statement is true. Section 230 did not actually create the Internet because the Internet was created through the collaboration of a diverse set of people around the world. What is true, however, is that the intermediary liability regime has undergirded the Internet as we know it. It has been responsible for three primary features of the Internet:
Kubernetes is making a lot of noise in the infrastructure world. Day Two Cloud co-host Ethan Banks spent three days taking a deep-dive course on the orchestration platform, and on today's show aims to provide Kubernetes fundamentals as they apply to your infrastructure.
The post Day Two Cloud 039: Kubernetes Fundamentals For Infrastructure appeared first on Packet Pushers.
In this inaugural episode of Network to Code on Network Collective, Jeremy Stretch, John Anderson, Rick Sherman, and Jordan Martin meet up around the virtual roundtable to discuss what a source of truth is, how it can play a critical role in your network automation efforts, and how the open source project Netbox might fill that role in your network.
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post NtC – Source Of Truth appeared first on Network Collective.

Cloudflare Access, part of Cloudflare for Teams, replaces legacy corporate VPNs with Cloudflare’s global network. Using your existing identity provider, Access enables your end users to login from anywhere — without a clunky agent or traffic backhaul through a centralized appliance or VPN.
Today, we are open sourcing a plugin that continues to improve that experience by making it easier for teams to use Cloudflare Access with one of the software industry’s most popular engineering tools, Sentry.
Sentry is an application that helps software teams find and diagnose errors in their products. We use Sentry here at Cloudflare. When you encounter an error when using a Cloudflare product, like our dashboard, we log that event. We then use Sentry to determine what went wrong.
Sentry can categorize and roll up errors, making it easy to identify new problems before investigating them with the tool’s event logging. Engineering managers here can use the dashboards to monitor the health of a new release. Product managers often use those reports as part of prioritizing what to fix next. Engineers on our team can dig into the individual errors as they release a fix.
Sentry is available in two forms: Continue reading

An open videoconference to be nice to each other, blow the Corona blues away.
The post Invitation: Packet Pushers Virtual Happy Hour – March 2020 appeared first on EtherealMind.
Another interesting question I got from an ipSpace.net subscriber:
Assuming we can simplify the physical network when using overlay virtual network solutions like VMware NSX, do we really need datacenter switches (example: Cisco Nexus instead of Catalyst product line) to implement the underlay?
Let’s recap what we really need to run VMware NSX: