Cisco announces that its SecureX platforms becomes generally available on June 30th, GitHub will change repository names from “master” to “main”, and Intel integrates CET into Tiger Lake CPUs. All this and the rest of the IT news of the week on the Gestalt IT Rundown, streaming live at 12:30pm ET every Wednesday.
This week on the Rundown:
GCP acquired Elastifile last year, and we’re now seeing those assets integrated into their services. Google is rolling out a new storage tier called Filestore High Scale, which offers scalable capacity and performance, up to 16 GB/sec throughput and 480K IOPS, with concurrent access on up to tens of thousands of users. Google offering this as a fully managed service, and will provide integration into high-performance computing workload management scheduling systems.
Turkish security researcher Yunus Çad?rc? recently outlined a flaw in the Universal Plug and Play network protocol called CallStranger. This allows a remote and unauthenticated user to interact with devices that are supposed to be accessible only inside local networks, potentially to orchestrate DDOS attacks. The attack exploits the protocols SUBSCRIBE function, which is used to send and confirm notifications to other connected devices on the network when specified events happen. CallStranger sends subscription requests that forge the URL that’s to receive the resulting “callback,” as the basis for a DDOS attack. Vulnerable devices include Windows 10, the Xbox One, routers from Asus, Huawei, DLink and Cisco, Samsung smart TVs and other devices, and requires them to be exposed to the internet. Cadirci notified the Open Connectivity Foundation who maintains the UPnP protocol and they have updated the underlying specification, but vendors will need to implement their own patches.
Box announced details to its Relay workflow engine. Relay was launchin in 2019 as a way to standardize content review and approval workflows, by moving them out of email and closer to the storage. The update now makes it easier to set up these kind of workflows, with pre-built templates for 24 lines of business like sales, marketing, HR, legal, and finance. Box also integrated File Request into Relay, which can now trigger an automated handoff between sending and receiving files securely from third parties and Box Relay workflows. They don’t use the word no-code, but this feels very no-codish.
Intel’s new Tiger Lake mobile CPUs will be the first to integrate the company’s Control-flow Enforcement Technology. The specification for CET was first published in 2016, and looks to put in controls on silicon to prevent malware. One feature to do this is shadow stack, which stores a copy of an apps order of operations in a secure part of the CPU, and compares this when the app is running, to see if malware has impacted this. The other is indirect branch tracking, which provides additional proections against apps CPU jump tables to read memory locations outside of what its using. Intel plans to include CET in all upcoming server and desktop chips as well. Intel has had no end of side-channel attack exploits the last few years, does this help turn the tide?
Github CEO Nat Friedman announced that the code-hosting service would switch from using the word “master” to “main” to denote the main branch of a repository. The move comes as other projects also work to remove terms from code libraries with either ties to slavery or racially loaded terms. The Android Open Source Project (AOSP), the Go programming language, Grammarly, and the Curl download utility are among those who have all changed whitelist and blacklist usage to allowlist and blocklist, and LinkedIn Developer Gabriel Csapo said on Twitter he is working to update Microsoft’s internal software libraries to make similar changes. The Drupal CMS project was one of the earlier adopters of this language, having changed “master/slave” terminology with “primary/replica” in 2014.
On Monday T-Mobile had a major voice and data service outage in the US, which went from about 12pm ET until 1am, and was widespread enough other online services were being reported as being down because people couldn’t connect. At the time, Cloudflare CEO Matthew Prince attributed the outage to “changes to their network configurations” that created a “cascade of failures” across voice and data networks. Tmobile CEO Mike Sievert said the event was triggered by a “leased fiber circuit failure from a third party provider in the Southeast”. T-Mobile’s network redundancy didn’t help, resulting in an “IP traffic storm that spread from the Southeast to create significant capacity issues across the IMS (IP multimedia Subsystem) core network that supports VoLTE calls.” Tom were you impacted and how unprecedented is a 13 hour outage?
Bloomberg’s Mark Gurman’s sources say Apple may announce it will replace Intel chips with its own main processors in Macs at WWDC, which starts June 22. The new ARM-based processors are based on the same technology used in Apple-designed iPhone and iPad chips, but Macs will still run the macOS operating system. Apple has changed chips twice before. In the early 1990s, it switched from Motorola processors to PowerPC, and at WWDC 2005, Apple announced it was switching from PowerPC to Intel. Tom, questions of software aside, Apple is a prominent consumer, creator, and developer platform. Would a switch to ARM move enough developers to move the needle, let’s say for businesses to adopt ARM.
Cisco announced that its SecureX security platform will be generally available on June 30th. Cisco first detailed SecureX back in March, and positions it as a way to unify security visibility from Cisco and third-party devices, ananlyzing data across endpoints, cloud, network, and applications. SecureX is now integraated across the company’s entire security portfolio. The company also announced it’s integrating its SD-WAN by Viptela into Cisco Umbrella to effectily block malicious destinations before making a network connection. DNA Center is getting endpoint identification at scale with support for logical grouping based on analytics, as well as the ability to analyze traffic flows between groups of endpoints to help design segmentation policies.
The Gestalt IT Rundown is a live weekly look at the IT news of the week. It broadcasts live on YouTube every Wednesday at 12:30pm ET. Be sure to subscribe to Gestalt IT on YouTube for the show each week.