Tech Update in English

English

NFV network function virtualization security considerations

I have been asked to write down a few things related to NFV and security. NFV is relatively a new thing in the IT world. It has been on the news in 2012 and since then it has followed the developing path common to the virtualization technologies. Virtualization has made dramatic improvement in the last years. It all started at first with simple virtualization platforms, of course VMware on top of our mind, but not only. The idea was to abstract HW platforms from software ones. Developing the idea, the abstraction growth covering multiple hw platforms moving also to the…

Firewall: Traditional, UTM and NGFW. Understanding the difference

Firewall: Traditional, UTM and NGFW. Understanding the difference One of the problem nowadays when we talk about firewalls is to understand what actually a firewall is and what means the acronym that are used to define the different type of firewalls. The common definition today recognizes 3 main types of firewalls: • Firewalls • UTM • NGFW But what are the differences (if any) between those things? Let’s start with the very basic: what a firewall is. Firewall: A firewall is software used to maintain the security of a private network. Firewalls block unauthorized access to or from private networks…

Pretty Good Privacy (PGP)

Pretty Good Privacy (PGP) Pretty Good Privacy or PGP is a popular program used to encrypt and decrypt email over the Internet, as well as authenticate messages with digital signatures and encrypted stored files. Previously available as freeware and now only available as a low-cost commercial version, PGP was once the most widely used privacy-ensuring program by individuals and is also used by many corporations. It was developed by Philip R. Zimmermann in 1991 and has become a de facto standard for email security. How PGP works Pretty Good Privacy uses a variation of the public key system. In this…

Dataprivacyasia: Antonio Ieranò at Asia’s premier data protection, privacy and cybersecurity conference. Watch videos

Missed @AntonioIerano at Asia‘s premier #dataprotection, #privacy and #cybersecurity conference? Watch videos — Data Privacy Asia (@dataprivacyasia) December 10, 2016 from http://twitter.com/dataprivacyasia Missed @AntonioIerano at Asia's premier #dataprotection, #privacy and #cybersecurity conference? Watch videos at https://t.co/h1920sHGPF pic.twitter.com/MiCcqkFpOy — Data Privacy Asia (@dataprivacyasia) December 10, 2016   Related articles How Businesses Are Preparing for the GDPR (cmswire.com) Related posts: Berlusconi ed il popolo dei brainless FW SPAM: hello, i see your profile at (linkedin.com) Evento V-Valley con MICROSOFT-JUNIPER-PLANTRONICS World Dictionary New Words and Meaning: Communist Related posts brought to you by Yet Another Related Posts Plugin.

unhappy employee are a cyber security concern

Have you ever considered the fact that the “best place to work” is something a security chap should take into serious consideration? A lot of people keep thinking that security is all about one of that technology, most of those expert master perfectly one of another specific technology and think they have the sacred graal of security. Since I am not so a big tech expert I am allowed to think that security isn’t in that specific technology, but in a systemic approach where technology cover just one part, and is just a part of a whole process. One of the aspect…

Cryptography, keeping on the big lie

So Cryptography would be a National Security Issue? I’m tired to be polite and politically correct when talking about encryption. Let us be clear and honest, all those crypto_war is a pile of crap. Every time I heard someone claiming that we should not enforce strong cryptography I wonder: to they have the slightest idea what they are talking about? Probably not, considering also most of the objections against cryptography I heard. Listening to those “enlighten” minds it seems that without cryptography the world be a sort of heaven where intelligence could have the possibility to solve any criminal case. And…

The IoT Files: The need for cryptography

The IoT Files: The need for cryptography One of the main arguments that should be touched by IoT discussion is cryptography. There is an undisputed consensus that cryptography is a mandatory requirement to preserve security and privacy in the IoT world, but we are far away for a general consensus on how to operate. The need for cryptography in IoT comes from two main aspects: Data security Data privacy The first need is clear; encryption is a mandatory requirement when we want to implement any form of authentication and non repudiation. Encryption is widely used even if we don’t know…

Managers and Leaders are not the same thing

Managers and Leaders are not the same thing There is always a lot of talk about managers and leadership, but I sometimes have the feeling there is a little confusion on the subject. I can agree that a manager needs to have leadership qualities, as some other key soft skills, but leadership, per se, is not enough. Wait, this means that a great leader can’t be also a great manager? Exactly, a manager need leadership skills to be good, but this is only one of the several skills he need. He should be able to understand the job heshe is…

weak manager style

In a previous post (http://www.thepuchiherald.com/2016/03/04/management-style-common-error-to-avoid/)  I tried to put some rationale on my thoughts about management, designing some of the characteristics a manager usually have (bad ones of course). One of the biggest “Ahas!” new and experienced managers (and the people who work for them) have experienced  is the realization that being a strong manager doesn’t mean being forceful or domineering. It’s just the opposite — strong managers are strong enough to lead through trust, whereas weak managers have to use the force of their job titles to make people listen to them. Most of the management style depicted (not…

What is Openstack

OpenStack is an open source platform for creating and managing large groups of virtual private servers in a cloud computing environment. The platform supports interoperability between cloud services and allow businesses to build and deploy private cloud services in their own data centers. The National Aeronautics and Space Administration (NASA) worked with Rackspace, a managed hosting and cloud computing service provider, to develop OpenStack. RackSpace donated the code that powers its storage and content delivery service and production servers. NASA contributed the technology that powers their high performance computing, networking and data storage cloud service. OpenStack has a modular architecture…

Posts navigation
Stop censorship
%d bloggers like this: