Companies are struggling to fully understand the cost, complexity, and time it will take to build and maintain an SD-WAN. A new report revealed even when companies are working with an operator to get it set up there are still many challenges. Aryaka’s 2019 State of the WAN report surveyed 795 IT and network practitioners … continue reading
It’s no secret that IT teams are overwhelmed. Sometimes they don’t have the time or resources required to get everything that needs to be done done. And when employees have to wait long periods of time for IT to approve something, sometimes they decide to take IT matters into their own hands. Shadow IT is … continue reading
Open vSwitch is a virtual switch designed to allow for massive network automation. It can support distribution across multiple physical servers. According to the team, the project can operate as a soft switch that runs within the hypervisor and the control stack for switching silicon. Currently a Linux Foundation project, Open vSwitch is used in … continue reading
NS1 and Salesforce have announced that they have collaborated on the first implementation of multi-signer DNSSEC. This enables the cryptographic signing of DNS records across zones with multiple DNS platforms. According to NS1, DNSSEC prevents DNS spoofing and cache-poisoning attacks. They believe that this implementation is well-timed because cybercriminals have been increasingly targeting DNS lately. … continue reading
Cloudflare has announced a new tool meant to simplify IT operations. Magic Transit is a new networking solution that brings the benefits of Cloudflare’s network to its customers’ on-premise and data center networks. Specific benefits of Magic Transit include Layer 3 DDos mitigation, improved performance, and lower total cost of ownership. Deployed in front of … continue reading
A new open-source project has been launched to make it easier to encrypt Kubernetes secrets. To enable this the project Secreter consists of two components. The first is a CLI tool that encrypts secrets and stores them outside of the Kubernetes cluster. The second is a Kubernetes operator for both creating and decrypting Kubernetes secrets. … continue reading
Google wants to make it easier to gain context-aware access to VMs with a new feature. Earlier this year, the company introduced context-aware access capabilities in Cloud Identity-Aware Proxy (IAP). Cloud IAP is used to provide controls over cloud applications and VMs running on Google Cloud. The new capability allows administrators to gain access to … continue reading
Sysdig Secure 2.4 is now available. This new update adds runtime profiling and new interfaces. According to the company, these new features are designed to improve the experience of creating security policies. “Sysdig Secure 2.4 expands on its previous runtime security and vulnerability management capabilities with the addition of runtime profiling and the new policy … continue reading
Google has announced the general availability of its Cloud Security Scanner in GKE and Compute Engine. The new service will provide insights into app vulnerabilities and allow organizations to take action before those vulnerabilities can be exploited. Potential use cases include notifying organizations of common external vulnerabilities in their application, alerting them of accessible GIT … continue reading
It’s not always possible to predict massive traffic spikes, but some organizations are fortunate enough to have some idea of when their traffic will be increased. Those that do have that foresight can take steps to ensure that when the time comes, they are ready. For example, ahead of the 2018 midterm elections, the New … continue reading