article thumbnail

Does your cloud-access security broker support IPv6? It should.

Network World

Cloud access security brokers ( CASB ) insert security between enterprises and their cloud services by providing visibility and access control, but IPv6 could be causing a dangerous blind spot. Related: What is IPv6, and why aren’t we there yet? Related: What is IPv6, and why aren’t we there yet?

IPv6 135
article thumbnail

Liveblog: IPv6 in the Cloud - Protocol and Service Overview

Scott Lowe

This is a liveblog of an AWS re:Invent 2017 breakout session titled “IPv6 in the Cloud: Protocol and Service Overview.” Global IPv6 adoption is currently around 22%, and is expected to hit 25% by the end of the year. T-Mobile, for example, now has 89% of their infrastructure running on IPv6.

IPv6 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Interop Liveblog: IPv6 Microsegmentation

Scott Lowe

This session was titled “IPv6 Microsegmentation,” and the speaker was Ivan Pepelnjak. The session starts with a discussion of the problems found in Layer 2 IPv6 networks. All of these messages derive from the assumption that one subnet = one security zone, and therefore intra-subnet communications are not secured.

IPv6 60
article thumbnail

New Route 53 and ELB features: IPv6, Zone Apex, WRR and more.

All Things Distributed

New Route 53 and ELB features: IPv6, Zone Apex, WRR and more. allthingsdistributed.com) point to same location where for example www.allthingsdistributed.com is pointing to jump through complex redirect hoops. Elastic Load Balancing support for IPV6. All Things Distributed. By Werner Vogels on 24 May 2011 05:26 AM. Comments ().

IPv6 114
article thumbnail

Beyond the Office: Securing Home Devices and Networks Against Corporate Breaches

SecureWorld News

However, many end-users do not recognize their home networks as extensions of their company's security boundaries. They often feel that using a company-provided laptop linked to the corporate security system is sufficient. As a result, they might not take enough measures to secure their other home devices.

Network 81
article thumbnail

Bogons: Do not let them in or through your networks

CTOvision

So bogon packets cannot be used to, for example, send spam e-mails or to send HTTP/web traffic. But filtering the full bogon list requires about 5000 rules for IPv4 and about 70,000 rules for IPv6. Additionally, IPv4 networks are not safe from an IPv6 bogon bandwidth flooding attack.

IPv6 242
article thumbnail

A Tutorial For Enhancing Your Home DNS Protection

CTOvision

Consider for example, the example of the old fashioned phone operator. You can also use it to make customized filtering decisions for your home system (for example, you can tell it that no one should have access to certain types of sites). Also, consider again the example of the telephone operator. But guess what?

Fashion 177