Category Archives: Security

Rising Outages Mean Days Without the Internet Could Soon be Reality

By Paul Gampe

Most of us experience internet outages on an individual — and generally irregular — level. Perhaps we’re unable to check in with friends on social media, stream a movie or pull up a recipe for that evening’s dinner. The inconvenience is frustrating, but the impact is limited. 2016 may not have been when many people first became aware of the vulnerabilities featured in the underlying routing architecture of the public internet, but it remains a watershed year where these vulnerabilities became such prominent and repeated targets. This yielded a wider impact on communities and businesses from large-scale internet outages, caused by deliberate and malicious cyber-attacks. As industries, services and governments have grown more reliant on the public internet, malicious characters…

Relics of the Past: Why the Principle of Least Privilege Needs a Modern Rethink

By Brad Mandell

IT might live at the bleeding edge of innovation, but one of the fundamentals of modern IT security is still rooted in the early 1970s: the Principle of Least Privilege. When it was first introduced, the idea was that, to prevent breaches, every user should be given the minimal level of access to their organization’s IT infrastructure necessary to do their jobs. No more, no less. And, in theory, it made sense – limit the number of people who can reach your most sensitive data, and you limit your exposure to a breach. But, the Principle of Least Privilege was born at a time when the first floppy disks and microprocessors were barely off the assembly line. IT today is…

SDN and IoT Security

By Jay Turner

If we split IoT devices into 3 tiers, the highest would consist of well-protected devices, like laptops, that are complex machines with plenty of security software. The middle tier would be made of occasional use, moderate-complexity devices like thermostats, TVs, and refrigerators. Then we have the lowest tier.

SDN Security – Challenges, Benefits, and Strategies

By Jay Turner

As software-defined networking continues to increase in popularity as a flexible and dynamic approach to networking, it’s going to need a flexible and dynamic approach to security, as well. SDN forces security solutions to be proactive, protean, and responsive. 

Is there Static in the Cloud? – Part 1

By William B. Norton

Dr.Peering in the Cloud I wanted to compare the connectivity within the clouds to the connectivity into the clouds, so I deployed about 20 VMS across Amazon Web Services, Google Cloud Platform, Microsoft Azure and had them ping each other.  I was expecting a completely green matrix, one that showed flawless connectivity between the major cloud providers, but then something else happened (see matrix below). On the left axis are my agent regions, and across the top are the agent regions that they are pinging. It is tiny, but the numbers in each cell of the table are median latency measures. The coloring of the cells reflects deviation from the median. Red means that there have been measures today that deviate 50% from the median!…

Cloud Interconnection Models

By William B. Norton

The Internet is evolving into two hemispheres: the Public Internet and the Private Internet. The public Internet is the shared best-effort packet delivery vehicle that we all know and love. The private Internet is attached to the side of the public Internet, and consists of dedicated private (not-shared) connections between entities. The private connection is architectural; you set it and forget it. The routing algorithms automatically flow traffic along the shortest path. Why does this Public-Private Internet distinction matter? Public Internet traffic is intermingled with others Internet traffic. This has some very important implications. First, the good news. Shared resources can lead to economies of scale and aggregation efficiencies. By aggregation efficiencies I mean that the peaks in one flow may be offset…