Blog

Always be up to date with our blog!

German AWS Community Day 2020

German AWS Community Day 2020

On Friday the 25th of September 2020, the fourth edition of the German AWS Community Day happened. After Cologne (2017), Frankfurt (2018) and Hamburg (2019) this was the first time where it was held as a purely online event and with a full day of...

read more
How much is my password?

How much is my password?

Most people probably see good passwords as a cumbersome necessity. They come attached with a seemingly ever-changing set of rules that force us to create intricate text strings that are usually a pain memorize.

In this post I will try to highlight the joy of good passwords by assigning them a monetary value albeit admittedly an imperfect one. I encourage everybody not to see password creation as a tedium but instead to enjoy the financial catastrophe we inflict to an imaginary attacker foolish enough to attempt cracking our password. In addition I will present a scheme that allows the creation of good passwords that are also easy to remember.

read more
NSX-T Edge Multi-TEP Flow-Cache Bug

NSX-T Edge Multi-TEP Flow-Cache Bug

NSX-T supports Multi-TEP just like NSX-V. But this feature was limited to ESXi hosts and it was not supported for Edge Nodes. Since NSX-T version 2.4 Multi-TEP is supported for Edge Nodes as well, which optimizes the North-South network performance.
Starting with NSX-T 2.4 the Multi-TEP was supported but not recommend from reference design guide perspective. The recommendation was added after the reference design guide was updated for NSX-T 2.5. Since then a deployment with a single NVDS vor VLAN and Overlay transport zones combined with Multi-TEP for ESXi and Edge Nodes is recommended.

read more
Detecting DNS Tunneling/Exfiltration with Elastic machine learning

Detecting DNS Tunneling/Exfiltration with Elastic machine learning

If you have never heard of DNS tunneling/exfiltration, or even had contact with it in your enterprise network and are wondering how to detect it, you have probably come to the right place. In this blog post, we explain what exactly is DNS exfiltration or tunneling attack, as well as why it has previously been difficult to detect it and how we can successfully use the built-in machine learning capabilities of Elasticsearch.

read more