Quantum computing is an emerging brute-force tool that can provably break virtually all modern encryption protocols, but it has not yet reached the requisite scale. Although “harvest now, decrypt later” is the common threat most often discussed today, it has been a remarkably successful technique for more than a half century. The advent of cloud infrastructure and globally accessible networks enabled the bulk collection and exploitation of flaws in PKI. Although AES may be quantum-safe, it is primarily distributed using quantum-insecure algorithms like RSA and…
We would like to thank Chris Moretti of Cigna and celebrate his and Cigna’s ONUG Community contribution in moving digital transformation forward via hosting this ONUG Spring 2023 and for Cigna being a founding member of the ONUG Collaborative. We thank you for your strong thought leadership and support of the community. We also want to express our gratitude to Chris Moretti’s staff who have been wonderful to work with over the past several months.
Cloud journeys and digital transformation have changed the way applications are delivered – faster and more distributed. Web services continue to expand from the data center, to cloud, the edge, and across global CDNs at an accelerating rate. Applications are more dynamic and are delivered faster than ever however the dynamic applications also add threat surface by exposing interfaces or API’s. Applications are susceptible to anomalous traffic, bot attacks, API threats and others. Application Firewalls (WAFs) have traditionally provided application protection with strictly static approaches….
Multi-cloud use has become common now a day. We can say that it’s a mandatory factor for business success in almost every industry. However, as we call it cloud sprawl, it’s also true that it’s becoming harder and harder to govern the cloud from the financial/security perspective. To address this issue, we believe in monitoring the cloud usage/cost and checking whether the governance works. In this PoC, we introduce the architecture and mechanism for that; Governing Multi-Clouds as codes from the financial/security perspective on the…
As quantum computing advances, mitigating data harvesting between cloud environments connected by networks under adversarial control becomes increasingly urgent. Qrypt addresses this risk by providing easily deployable and simple quantum-secure solutions for data transmissions between cloud providers and geographically distributed enterprises. Our live POC session will discuss quantum risk in detail and showcase Qrypt’s ability to protect geographically separated, multi-cloud networks effectively and seamlessly. We will highlight our successful deployment with Megaport, a leading Network-as-a-Service (NaaS) solutions provider. This use-case demonstrates Qrypt and Megaport’s collaboration…
Modern network operating systems (NOS) not only run on high performance physical platforms; they also can provide a containized variant of the same NOS capable of running on a few cores of an x86 processor. This enables new capabilities and use cases previously unavailable to network operators. Beginning with upskilling network engineers, a digital sandbox enables self-paced education with hands-on experience. The costs of a lab and effort in physical set-up/tear-down lab are essentially removed. Network Automation is focused on generation of code to configure…
Selector AI is an operational intelligence platform that automates anomaly detection and helps diagnose outages for hybrid-cloud connectivity and applications. Selector AI collects data from heterogeneous data sources, applies an ML-based data analytics approach, and provides actionable multi-dimensional insights by correlating metrics and events. Our customers can collaborate and share insights on various messaging platforms (Slack, Microsoft Teams) using search-driven querying with a conversational chatbot experience.
As large organizations test the limits of what’s possible, they’re also testing the limits of what’s manageable — requiring new levels of visibility into their increasingly distributed and complex digital ecosystems. But what most companies call visibility falls short of the data breadth, depth, and intelligence it takes to be unstoppable. This use case will explore the challenges and solutions related to gaining the ultimate level of visibility into Service Assurance and Cybersecurity for complex enterprise application migration/transition projects for single or multiple cloud architectures…
GitNops is an operational framework that takes DevOps best practices used for application development, such as version control, collaboration, compliance, and CI/CD and applies them to network operations and network automation. A Zero Trust implementation of GitNops is GitZT. Both are heavily influenced by the Fast Systems Thinking approach. It teaches network engineers an approach to automation that provides security, extensibility, scalability, reliability, and reparability. The GitHub platform provides GitHub Actions, a CI/CD system that can run containerized applications such as Postman or Terraform in…
It is predicted that quantum computers will be capable of breaking popular encryption protocols at speeds that make it feasible to make use of the decrypted data. Specifically, modern public-key encryption protocols will not be sufficient for protecting the data from threat actors operating a quantum computer. Some threat actors may already be harvesting and storing large quantities of encrypted data that can be decrypted and useful in the future. This session will help the audience to better understand the emerging threats and the opportunities…