Stealth – the art of remaining hidden - has been a force of nature since before the dawn of mankind. Long before we were standing upright on the Savannah, nature had already figured out that one great way of staying alive was to remain silent, hidde
Look for evidence in the public domain that any government has admitted to targeting another government’s civilian or military digital infrastructure and you won’t find much, for obvious reasons. To date, almost all official rhetoric has been about defending citizens and infrastructure against foreign states, but that is changing. In 2017 I believe we will see more nations move the narrative from one of passive def
At the root of John Boyd’s “OODA loop” methodology, there is the notion that we need to acknowledge and work with levels of “uncertainty”—gaps that result when applying established models to new and changing contexts[i]. Unfortunately, the networking community—desperate for operational stability—largely ignores these mismatches, designing network and security architectures as if they can dictate how applications are
For decades, the people who bought infrastructure were the same people (or at least working for the same company) as the people who used that infrastructure. Put less obtusely, companies were responsible for buying, building, and ultimately using the compute, storage, networking, and applications on which their businesses relied.
That dynamic is changing, and I believe there will ultimately be a bifurcation of the
This is the second part of a 3 part series discussing how VOQ architectures differ from one another and how they evolved over time. In this part, we will duscuss about the fundamental backplane components and how the need for VOQ came about.
Stealth – the art of remaining hidden - has been a force of nature since before the dawn of mankind. Long before we were standing upright on the Savannah, nature had already figured out that one great way of staying alive was to remain silent, hidden out of sight and with the wind in your face as you watch your prey. As in nature, the art of remaining hidden continues to evolve for the cybercriminal, as well.
The security enforcent delegation to the service provider is one of interesting option expetially in case of volumetric DDoS attacks. The traffic re-direction to cleaning devices (cluster) and then re-insertion into network need to be done in a way that prevents routing loops. Commonly used techniques base on either (A) Filter/ACL based forwarding /policy-routing (B) L3VPN instances on ASBRs and/or Edge routers or (C
“You can pay for school, but you can’t buy class.”
Everyone wants to be classy. Tuxedos, five-star restaurants, playing the piano—all are associated with “class.” However, while no one wears a tuxedo every day, and few people can afford to eat at a five-star establishment for every meal, anyone can play the piano—provided the instrument is automated. With a player piano, you can hear Mozart, Beethoven, or Chop