article thumbnail

Malvertising Is a Cybercrime Heavyweight, Not an Underdog

SecureWorld News

The attackers then mishandle this well-known adversary simulation tool to harvest information about the operating system, exfiltrate data, and locate directories and services with weak access control settings. Ad blockers are worthwhile as long as they are backed by proper ethics and DevOps security best practices.

article thumbnail

Technology Short Take #84

Scott Lowe

Anthony Burke gives a little bit of a sneak peek at some functionality from the upcoming v3 release of PowerNSX: searching NSX Distributed Firewall (DFW) rules. Operating Systems/Applications. I really enjoyed this article by Jon Hall on the Andon cord and ITSM’s DevOps challenge. Cloud Computing/Cloud Management.

Windows 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take #84

Scott Lowe

Anthony Burke gives a little bit of a sneak peek at some functionality from the upcoming v3 release of PowerNSX: searching NSX Distributed Firewall (DFW) rules. Operating Systems/Applications. I really enjoyed this article by Jon Hall on the Andon cord and ITSM’s DevOps challenge. Cloud Computing/Cloud Management.

Windows 60
article thumbnail

Technology Short Take #84

Scott Lowe

Anthony Burke gives a little bit of a sneak peek at some functionality from the upcoming v3 release of PowerNSX: searching NSX Distributed Firewall (DFW) rules. Operating Systems/Applications. I really enjoyed this article by Jon Hall on the Andon cord and ITSM’s DevOps challenge. Cloud Computing/Cloud Management.

Windows 60
article thumbnail

Technology Short Take #79

Scott Lowe

Tony Sangha took PowerNSX (a set of PowerShell cmdlets for interacting with NSX) and created a tool to help document the NSX Distributed Firewall configuration. Operating Systems/Applications. I really enjoyed this article by Evgeny Zislis on DevOps transformation using Theory of Constraints. What’s that? That’s handy.

Linux 60
article thumbnail

Technology Short Take #63

Scott Lowe

At DevOps Networking Forum 2016, I had the opportunity to share a presentation on some Linux networking options. Here’s another topic that came up at the recent DevOps Networking Forum: Spotify’s SDN Internet Router (SIR). Russell Pope at Kovarus recently wrote about using security groups to manage the VMware NSX distributed firewall.

Vmware 60
article thumbnail

Technology Short Take #66

Scott Lowe

In the event you’re interested in an idea of how much latency the use of in-kernel hypervisor firewalling (such as that offered by VMware NSX) adds, have a look at this article by Sean Howard. Operating Systems/Applications. It’s a good post, well worth reading (in my opinion). Servers/Hardware. Nothing this time around.

Vmware 60