Don’t let vendors sell you FUD and waste your money. Consider your risk and mitigations.
Cato Networks has announced a new SD-WAN appliance and new features to extend service availability in the event of device failures, network changes, and even the loss of Cato’s private network.
Nyansa, which monitors user experience for IT operations, has a new feature that lets willing customers unmask anonymized performance metrics to share with one another to facilitate collaboration and peer-to-peer learning.
Got questions about SD-WAN? Sign up for an online summit November 7th and 8th to learn about how to deploy branches more quickly, improve user experience, bolster security, and more. Hear from industry experts, analysts, and the Packet Pushers at this free event.
Introduction to DNS over HTTPS (DOH)
Juniper Networks believes that a new multicloud world creates an opportunity to lure enterprises with the promise of operational consistency: using Juniper software and automation to enforce uniform policies and security controls on premises and across public clouds.
Supply chain safety is more than just implants
Unsurprisingly, Enterprise IT is preventing good encryption because their security devices suck
Deep dive into compromising firmware on Supermicro BMC
One element of the US Govt is supporting vendors in denying the Bloomberg article
A big article from Bloomberg claiming that certain custom manufactured models of Super Micro servers shipped with hardware implants of a company (Elemental) that was offering services to US Security agencies. This company was later sold to Amazon and sold services to a company later acquired by Apple for the Siri voice product. Bloomberg published a…
Seems everyone wants to move to the cloud but, should they move? It’s the classic answer: it depends. What workloads, projects and companies are best for the cloud? Certain companies and projects were designed for the cloud and others are not. To start off I was going to give a definition of what the cloud…
Join the Packet Pushers and special guests for Virtual Design Clinic 2, a live mini-conference that’s online and absolutely free. Learn from deep-dive tech presentations and get your networking questions answered. Sign up now to reserve your place.
After panel session about the value of security, Simon said that we need more operations and better people operating the security that we already have. Thats one of Greg’s hot button issues so he got him in front of the camera to get a bit deeper on how Secrutiny does this and the sort results…
The money’s good. Most everything else isn’t. How much more are you willing to take at this job?
The problems begin when people don’t have imposter syndrome.
Juniper has announced a new software package, Contrail Edge Cloud, that targets service providers and telcos building out edge nodes to support existing and new applications. The package bundles software from Juniper and Red Hat for networking, compute, orchestration, and security.
Docker is not known for superior out-of-the-box security. By default, Docker management code and also code inside Docker containers is running as root. Read on to learn how to deal with these facts if you want to leverage Docker on a management server.
WLAN vendor Mist says it has enhanced its machine learning capabilities to improve anomaly detection, and has boosted the number of natural language queries its virtual assistant can respond to.
Geoff Huston asks the questions that other people don’t
Needing a means to provide some network automation tools to my team, I decided to see if Docker would fit the bill. Read on to learn how to build your own Docker container for network automation.
You’ve probably seen those social media posts that list traits or habits of successful people. Here’s a list of traits from an IT engineering perspective that you don’t want to emulate.
The IPv6 Buzz podcast, a twice-monthly deep dive into the v6 protocol, is now available in its own channel on Packet Pushers.
VMware’s pitch to the enterprise is that they can maintain control over public clouds by bringing VMware with them.
We caught Mike Dvorkin during VMworld 2018 and got two minutes of his time to talk about container security.\