Tech
-
What is Border Gateway Protocol (BGP)?
Border Gateway Protocol is one of those foundational, core infrastructure protocols used by Internet users everyday but not top of mind for the average consumer or end-user. Border Gateway Protocol, or BGP, is a routing protocol. BGP is the primary protocol for the Internet, and is a Layer 4 Transport protocol that sits on top of TCP [2]. It’s purpose is to keep the various systems on the Internet up to date with the information needed to send and receive data traffic correctly. So, real quick in a nutshell, when information is sent around these Internets, it’s broken up into chunks of data called ‘packets’. Packets sent on the Internet…
-
News & Links
The Latest Chapter In IBM’s Quest To Build A Cloud For Banks Yesterday, IBM announced the latest chapter in the IBM Cloud for Financial Services, a public cloud capable of overcoming the stringent cybersecurity and regulatory challenges for a bank. [via Forbes] Bitcoin & Blockchain Gain Prominence: 4 Top Stocks to Buy…Ok, forget the link bait about the stocks to buy and just read this article for the sense of the built-in utility of blockchain. Blockchain is enabling enterprises and government agencies to tackle prominent issues, including data tracing, security, visibility and management, and supply chain supervision. [via Yahoo! Finance] Also, in more IBM news…IBM bets on FHE (Fully Homomorphic…
-
What is “Shadow IT”??
Wikipedia describes Shadow IT as: In big organizations, shadow IT (also known as embedded IT, fake IT, stealth IT, rogue IT, feral IT, or client IT) refers to information technology (IT) systems deployed by departments other than the central IT department, to work around the shortcomings of the central information systems. Shadow IT systems are an important source of innovation, and shadow systems may become prototypes for future central IT solutions. On the other hand, shadow IT solutions increase risks with organizational requirements for control, documentation, security, reliability, etc. via Wikipedia [1] My first thought after digesting some basic information is that Shadow IT sounds like people coming up with…
-
Hackers Add a Backdoor to PHP Source Code; 79% of Websites Use PHP
According to the Bleeping Computer new service, PHP’s Git server was hacked via a backdoor to the PHP source code. PHP is a general-purpose scripting language especially suited to web development. Typically a server-side programming language, PHP powers many sites on the internet including big players like Wikipedia and Facebook. In this latest attack the official PHP Git repository was hit and the code base was tampered with. Yesterday, two malicious commits were pushed to the php-src Git repository maintained by the PHP team on their git.php.net server. The threat actors had signed off on these commits as if these were made by known PHP developers and maintainers, Rasmus Lerdorf …
-
Protected: What is Equinix? And Why Are They So Important??
There is no excerpt because this is a protected post.
-
Post-Quantum Cryptography: The Race Is On
Quantum computers and quantum cryptography have become hot industry buzzwords that are popping up more in the press. With that, the question becomes what happens to the security of our data covered by today’s pre-quantum cryptography technology? This Forbes article helps highlight solutions on the way in the race to post-quantum cryptography: The good news is that solutions are on the way. Recognizing the urgency of the task and the time needed to formulate, choose, standardize and deploy new systems, the U.S. National Institute of Standards and Technology (NIST) launched a Post-Quantum Cryptography (PQC) standardization process in 2016. In July 2020, NIST announced seven third-round candidates, covering both public-key encryption (PKE) and digital…
-
A 3-Tiered Approach to Securing Your Home Network
Some tips running from basic to advanced, on how to approach securing your home network from Daniel Miessler. via Daniel Miessler
-
Hackers Breach Thousands of Security Cameras, Exposing Tesla, Jails, Hospitals…
A group of hackers say they gained access to live feeds of 150,000 security cameras inside hospitals, prisons, schools and companies, including a Tesla factory. The hackers say they breached a massive trove of security-camera data collected by Silicon Valley startup Verkada Inc., gaining access to live feeds of 150,000 surveillance cameras inside hospitals, companies, police departments, prisons and schools. The data breach was carried out by an international hacker collective and intended to show the pervasiveness of video surveillance and the ease with which systems could be broken into, said Tillie Kottmann, one of the hackers who claimed credit for breaching San Mateo, California-based Verkada. Kottmann, who uses they/them pronouns,…
-
‘Kings of Leon’ Will Be the First Band to Release an Album as an NFT; Making it a Digital Collector’s Item
Kings of Leon reigned supreme the past two decades in music and they continue to revolutionize the industry with the release of their latest album as a NFT, or non-fungible token. (If you don’t know what NFTs are, you can still read on about this article, and just be aware that 1, there’s a lot to unpack and digest to really, fully understand what NFTs are, and 2, be advised that NFTs are “kind of a big deal” to many people. Also, Rolling Stone has a “quick” primer here.) Okay, back to Kings of Leon!!! By this move of releasing an album as an NFT they are one of the…
-
Blockchain Technology: In the News…
From an article on CNET: Forget Bitcoin: Inside the insane world of altcoin cryptocurrency trading Ironically, it’s blockchain, the behind-the-scenes technology, that could be the solution to the burgeoning deepfake problem. In cryptocurrency, the blockchain is an unalterable ledger that tracks every transaction. Once it’s on the ledger, it can’t be altered. That same technology can be used to track anything — like the creation and distribution of a video, from studio to iPhone screen. There are already startups working toward this, like Truepic. When I asked about blockchain’s ability to neutralize deepfakes, Inman-Grant wasn’t entirely optimistic. “It’s definitely an arms race, but it’s not an arms race we’re winning right now.” via…