Remove Apple Remove Firewall Remove Security Remove Storage
article thumbnail

Overcoming the Equation: Security = Friction

CTOvision

Why does security have to be so onerous? Is this password secure enough: Mxyzptlk? Now that’s secure – good luck remembering it! We’ve migrated to a userid-password society; as we’ve added layers of security, we password-protect each layer: PC (and now device), network, enclave, application, database, and storage (encryption).

Security 249
article thumbnail

Technology Short Take #68

Scott Lowe

Sysdig Falco , a behavioral security tool with support for containers (can run in a container and can monitor containers) looks like it could be a useful addition to your security toolset. I enjoyed Adam Leventhal’s evaluation of APFS , the new file system announced at the most recent Apple WWDC. Virtualization.

Linux 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take #77

Scott Lowe

There was a fair amount of wailing and gnashing of teeth when Apple updated the MacBook Pro line with the Touch Bar. Vivek Gite over at nixCraft explains how to use ufw (Uncomplicated Firewall) on Ubuntu to limit SSH connections. If you’re interested in learning more about some of the new security features in vSphere 6.5,

Linux 60
article thumbnail

Technology Short Take #63

Scott Lowe

Russell Pope at Kovarus recently wrote about using security groups to manage the VMware NSX distributed firewall. In talking with customers, I find that one of the things that really challenges their thinking is how to best utilize security groups to their maximum effect. Servers/Hardware. VMware recently GA’d version 6.2

Vmware 60
article thumbnail

Fountainhead: Infrastructure Orchestration in use within SPs.

Fountainhead

Infrastructure Orchestration abstracts and defines/configures the infrastructure world (I/O, NIC cards, HBA cards, storage connectivity, LANs, switches, etc.). So, not only can you define a virtual server instantly, you can define a *physical* server (maybe a virtual host, or a physical machine) down to I/O, NICs, Storage and Network.

article thumbnail

Technology Short Take 139

Scott Lowe

In this post , Jakub Sitnicki digs way deep into the Linux kernel to uncover the answer to the question, “Why are there no entries in the conntrack table for SYN packets dropped by the firewall?” Even worse, this isn’t just limited to Intel chips, but may also affect ARM-based systems like Apple’s M1 CPUs.

Vmware 60
article thumbnail

Technology Short Take 145

Scott Lowe

a bevy of security articles (including a couple on very severe vulnerabilities), Kubernetes, AWS IAM, and so much more! Ivan Pepelnjak shares some links and thoughts on configuring the NSX-T firewall with a CI/CD pipeline built on GitHub Actions and Terraform Cloud. What will you find in this Tech Short Take? Networking. are affected).