Remove CTO Remove Data Remove IPv6 Remove Security
article thumbnail

New Route 53 and ELB features: IPv6, Zone Apex, WRR and more.

All Things Distributed

New Route 53 and ELB features: IPv6, Zone Apex, WRR and more. Elastic Load Balancing now provides support for EC2 Security Groups such that customers that hosts their Internet accessible application instances behind ELB can build security rules that for example restrict traffic to only the ELB instances that front them.

IPv6 114
article thumbnail

Bogons: Do not let them in or through your networks

CTOvision

But filtering the full bogon list requires about 5000 rules for IPv4 and about 70,000 rules for IPv6. Additionally, IPv4 networks are not safe from an IPv6 bogon bandwidth flooding attack. Communications CTO Cyber Security Infrastructure' Filtering private IP addresses requires only a few rules.

IPv6 242
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mach37 Spring 2014 Cohort Companies: Watch these hot new disruptors as they accelerate

CTOvision

They are: Axon Ghost Sentinel – Hugh Brooks, President, Harrisonburg, VA – Inspired by natural self-organizing systems, Axon Ghost Sentinel’s cyber security products provide lightweight, adaptive, scalable, and decentralized security for mobile and traditional devices, and enterprise networks. Fast Orientation, Inc.

Company 258
article thumbnail

A Tutorial For Enhancing Your Home DNS Protection

CTOvision

For example, if you select the free DNS service from Google, although there are privacy protections, they will be aggregating even more data on you and your browsing habits. This will speed up your browsing, improve your security, and get you results with no redirection. They get data. Makes browsing faster and more secure.

Fashion 177
article thumbnail

DDoS: Understand The Growing Threat From Botnet #14

CTOvision

If IoT devices supporting IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) are introduced, the potential for larger DDoS attacks compounds. CeNSE is a project that proposes to collect, communicate, and analyze data from billions of nanoscale sensors. After all, there is strength in numbers.

Internet 150
article thumbnail

What is Passive DNS and how do you leverage it in research?

CTOvision

A key use case of passive DNS data is to take an IP address known to be malicious and then find all the domain names that Passive DNS sensors have mapped to that IP address. In DNS, this is known as an "A" record and is one of many different record types including, but not limited to AAAA (IPv6), MX (mail), NS (nameserver), and TXT (text).

Research 150
article thumbnail

The AWS GovCloud (US) Region - All Things Distributed

All Things Distributed

For example a number of our European customers are subject to data residency requirements when it comes to PII data and they use the EU Region to meet to those requirements. Government and Big Data. One particular early use case for AWS GovCloud (US) will be massive data processing and analytics.