Have you wanted to open up a LAN world to your friends but can’t overcome the challenge of being on the same local network? There are various technical workarounds that are neither cheap nor secure.
The following is a guest post by Pieter-Jan Nefkens and also originally appeared on his blog at: https://www.nefkens.net/enabling-intent-based-with-airwall/
One of the things presented by Tempered Networks at XFD3 was the extensive programmability capabilities of Airwall. Everything you do in Conductor can also be performed leveraging a REST API. I think this is a really good feature that can really demonstrate the capabilities and principles of Intent-Based Networking. In this post, I’ll demonstrate what happens when you combine several technologies and trends together.
Today's blog post is contributed by Frank, one of our Airwall Teams users, who contributes a really useful security project that can be extended to a wide range of IoT devices:
Dark Reading published a timely article titled, “Attackers Heavily Targeting VPN Vulnerabilities” this week. A slew of high-profile published vulnerabilities over the past several months, along with the increasing dependence on VPNs with remote work over the last year-plus have converged to make the VPN a highly attractive target to enter the wider enterprise.
2020 brought great challenges to companies as well as individuals. We’re proud to have been able to help a growing number of organizations improve their security posture and resiliency. While energy providers and municipalities continue to rely on Tempered, we’re also seeing increased activity in the healthcare sector. The rising scourge of ransomware and the highly vulnerable state of medical devices have proven to be key concerns.
Legendary security technologist, Bruce Schneier, recently wrote an article in The Guardian summarizing the impact of the SolarWinds security breach last month, and it’s probably a lot worse than people think. (The breach that is, the article was great!). If you don’t know the gory details of the attack, our CTO, Bryan Skene, covered it nicely here. Schneier was also quoted in an earlier analysis of the hack by noting how extensive the breach was throughout many of our nation’s most sensitive military and industrial networks, and, in fact, the extent of the compromise in each network, or how many networks, may not be known for years.