Distinguishing and Combating DDoS Attacks
Cyber Attacker, Brian Krebs, wrote an article criticizing criminals who use DDoS (or Distributed Denial of Service) for extortion. They flood your servers with traffic. This makes them inaccessible to your intended audience. After a few hours of attack you receive a message explaining how you can pay to make it stop. Soon after his […]
Patch Your Samba Servers or Risk a Worse Version of WannaCry
The big cybersecurity news of the past couple of weeks has been the WannaCry worm. It took advantage of some rather old bugs, dating back to Windows XP and Windows Server 2003. We got lucky! The vulnerability, the problems in the targets, allowed unlimited abuse. But the exploit, the attackers’ code, had a built-in “kill […]
Is Perfect the Enemy of Good Enough in Software-Defined Networking?
Perfect is the enemy of good. That’s an old saying. Confucius (551-479 BC) said, “Better a diamond with a flaw than a pebble without.” Aristotle (384-322 BC) said something similar. Voltaire popularized the phrase in the 1770s. And maybe that’s where we are with SDN WAN. Software-Defined Networking and Wide Area Network Links Software-defined networking, […]
How to Instill Cyber Security Across the Organization
“A chain is only as strong as its weakest link” “What a cliché!”, you say. Well, it became a cliché for a reason. People keep saying that because it does describe many situations. It’s a useful way of thinking about the world. In cyber security, we have a crucial security chain with links forged from […]
Do You Know the New Names for Linux Network Interfaces?
Do you know how to check the IP address of a Linux server? “Of course!”, you say, and you type this: $ ifconfig eth0 Not anymore! Both the command ifconfig and the interface name eth0 have been obsolete for a few years now. However, many organizations still use something like Red Hat Enterprise Linux 6, […]