VIRTUAL DESKTOP TOOLS
Red River | July 01, 2022
Red River, a technology transformation company serving government and enterprise customers, announced today that it has been designated as a VMware Regional Academy for IT support and training. In partnership with the VMware IT Academy, Red River will provide instructors and students at academic institutions with training and learning resources for high-demand IT skills such as digital workspace, application modernization and multi-cloud.
VMware academic programs have created positive change throughout the pandemic, providing next-generation technology to academic institutions, allowing instructors to teach virtually and giving students access to industry certifications.
“Red River understands the evolving needs of the IT Industry and its talent,” said Jackie Barker, Director of VMware IT Academy. “VMware IT Academy is thrilled to work with Red River to provide educational resources and experience to students in academia.”
As a VMware Regional Academy for IT support, Red River will contribute to industry and economic development, providing skills to students seeking high-demand careers in areas such as cloud, dev ops, data, mobility and security. Red River will also support the remote delivery of VMware courses, helping students excel through online certification opportunities, hands-on labs and other VMware learning resources.
“We are pleased to be a part of the Regional Academy, sharing years of technology expertise to benefit the next generation of IT professionals, This opportunity enables us to invest in our industry, so we can better prepare students for work and career growth in a digital world.”
Richard Ackerman, Vice President of Workforce Development for Red River
Red River’s workforce development program offers extensive training programs, new career opportunities and dedicated partnerships. The company is set on making a positive impact on employees, customers, partners and communities. To learn more about workforce development at Red River visit www.redriver.com/resources/workforce-development. For more information on the VMware IT Academy, visit https://www.vmware.com/company/it-academy.html.
VMware is a leading provider of multi-cloud services for all apps, enabling digital innovation with enterprise control. As a trusted foundation to accelerate innovation, VMware software gives businesses the flexibility and choice they need to build the future. Headquartered in Palo Alto, California, VMware is committed to building a better future through the company’s 2030 Agenda.
About Red River
Red River brings together the ideal combination of talent, partners and products to disrupt the status quo in technology and drive success for business and government in ways previously unattainable. Red River serves organizations well beyond traditional technology integration, bringing 25 years of experience and mission-critical expertise in security, networking, analytics, collaboration, mobility and cloud solutions.
CISA | May 20, 2022
VMware yesterday addressed issues in several of its products: VMware Workspace ONE Access (Access), VMware Identity Manager (vIDM), VMware vRealize Automation (vRA), VMware Cloud Foundation, and vRealize Suite Lifecycle Manager. That these are more significant than the ordinary run of patches may be seen by the way the US Cybersecurity and Infrastructure Security Agency (CISA) has discussed them. Alert (AA22-138B), "Threat Actors Chaining Unpatched VMware Vulnerabilities for Full System Control" warns that "malicious cyber actors, likely advanced persistent threat (APT) actors, are exploiting CVE-2022-22954 and CVE-2022-22960 separately and in combination." The Alert adds, "CISA expects malicious cyber actors to quickly develop a capability to exploit newly released vulnerabilities CVE-2022-22972 and CVE-2022-22973 in the same impacted VMware products. In response, CISA has released, Emergency Directive (ED) 22-03 Mitigate VMware Vulnerabilities, which requires emergency action from Federal Civilian Executive Branch agencies to either immediately implement the updates in VMware Security Advisory VMSA-2022-0014 or remove the affected software from their network until the updates can be applied." US Federal civilian agencies have until next Monday to identify and remediate the issues, and they're required to report completion no later than Tuesday.
Fraudulent liquidity mining.
Sophos describes the way the threat of fraudulent liquidity mining is shaping up in decentralized finance systems. "Legitimate liquidity mining exists to make it possible for decentralized finance (DeFi) networks to automatically process digital currency trades," Sophos explains, and criminals are using social engineering to abuse such systems to defraud cryptocurrency investors of their holdings.
More loosely regulated than conventional cryptocurrency exchanges, which use market makers and seek to ensure that sufficient reserves are on hand to back trades, DeFi exchanges use Automated Market Makers (AMMs). Sophos explains that "Smart contracts built into the DeFi network have to rapidly determine the relative value of the currencies being exchanged and execute the trade. Since there is no centralized pool of crypto for these distributed exchanges to pull from to complete trades, they rely on crowdsourcing to provide the pool of cryptocurrency capital required to complete a trade—a liquidity pool." Liquidity pool tokens, ("LP tokens") are used to represent the portion of the liquidity pool an investor contributed. But unethical DeFi operators can cancel the tokens (or simply not create a pool to back them in the first place), and this, Sophos observes, offers "ample opportunity for digital Ponzi schemes, fraudulent tokens, and flat-out theft."
CMS vulnerabilities disclosed and patched.
Texas Department of Insurance clarifies facts surrounding its data incident.
The Texas Department of Insurance (TDI) has sent around a fact sheet that clarifies a data incident the agency sustained earlier this year: "In January 2022, TDI found the issue was due to a programming code error that allowed internet access to a protected area of the application. TDI promptly disconnected the web application from the internet. After correcting the programming code, TDI placed the web application back online. The forensic investigation could not conclusively rule out that certain information on the web application was accessed outside of TDI. This does not mean all the information was viewed by people outside TDI. Because we couldn't rule out access, we took steps to notify those who may have been affected." While data could have been accessed by unauthorized personnel, TDI has investigated and found that, "There is no evidence to date that there was a misuse of information."
VIRTUAL DESKTOP STRATEGIES
Tailscale | June 27, 2022
Tailscale has released Tailscale SSH to beta, which makes authentication and authorization trustworthy and effortless by replacing SSH keys with the Tailscale identity of any machine. With Tailscale, each server and user device gets its own identity and node key for authenticating and encrypting the Tailscale network connection, and uses access control lists defined in code for authorizing connections, making it a natural extension for Tailscale to now manage access for SSH connections in your network.
“SSH is an everyday tool for developers, but managing SSH keys for a server isn’t so simple or secure, SSH keys are difficult to protect and time consuming to manage. Protecting your network connections with SSH keys requires that admins spend significant resources managing, provisioning, or deprovisioning user access. Tailscale SSH removes the pain from SSH key management with the same powerful simplicity Tailscale offers for virtual private networks.”
Tailscale Product Manager Maya Kaczorowski
Kris Nóva, Senior Principal Engineer and published distributed systems expert used Tailscale to create a private network between her homelab in New York and a datacenter in Iceland: “Tailscale is seriously the best user experience of my life. I ran a Kubernetes 1.24 cluster on Tailscale with eBPF CNI networking on top of a tailnet, which connects my private subnet at home, across the Arctic ocean to a private subnet in a volcano-powered datacenter in Iceland. It blew my mind how easy and powerful it was to use. I’m excited to use their new SSH feature.”
With Tailscale SSH, users can now securely code from their iPad running Tailscale, across operating systems to a Linux workstation, without having to figure out how to get their SSH private key onto their iPad. Enterprise Tailscale customers will reduce churn and resources on SSH key management or bastion jump boxes, and avoid risk of exposing memory unsafe servers to the open internet. The beta release gives all users:
Authentication and encryption: Authenticate, authorize, and encrypt SSH connections using Tailscale. No need to generate, distribute, and manage SSH keys.
SSO and MFA: Use existing identity providers and multi-factor authentication to protect SSH connections the same way you authorize and protect application access.
Built-in key rotation: Tailscale makes it simple to rotate keys with a single command and manages key distribution. Node keys can be rotated by re-authenticating the device, as frequently as every day.
Re-verify SSH connections: Tailscale works with existing identity providers and re-verifies before SSH connections are established, and gives users the option to re-authenticate when establishing high-risk SSH connections.
Revoke SSH access easily: When an employee offboards, Tailscale allows admins to revoke access to SSH to a machine almost instantaneously with Tailscale ACLs.
Manage permissions as code: Define connections to devices using a standard syntax and understand SSH access controls in a centralized configuration file.
Reduced latency with point-to-point connections: Connect directly from a device to a server, without having to hairpin through a bastion. Developers can connect wherever they work, without slowing them down by routing their traffic through the main office.
Add a user or server painlessly: Maintain users and servers in a network without adding complexity. Tailscale ACLs to give the right people access and add it to a team's known hosts.
Tailscale makes network security accessible to teams of any scale and gives developers and DevOps teams the ability to connect to resources easily and securely in the cloud, on-premises, and everywhere in between. Tailscale uses the WireGuard® protocol, the open source, opinionated standard for secure connectivity. It is set up and configured in a matter of minutes on average, while other VPN solutions take weeks to fully implement and several hours a week to maintain.
Tailscale builds software that makes it easy to interconnect and secure devices, no matter where they are. Every day, banks and multinational companies use Tailscale to protect their corporate networks. Homelabs and start-ups trust Tailscale to collaborate and share access to tooling. We're building a future for the Internet that's easy, small and safe, like it used to be. Founded in 2019 and fully distributed, we’re backed by Accel, CRV, Heavybit, Insight Partners, and Uncork Capital.
VIRTUAL SERVER INFRASTRUCTURE
Scale | May 25, 2022
Scale Computing, a market leader in edge computing, virtualization and hyperconverged solutions, today announced its partnership with Servix, one of the largest technology integrators in Latin America. Servix will now deliver simple, reliable, affordable, and easy-to-deploy infrastructure solutions to the IT market in Brazil via Scale Computing’s award-winning HC3 virtualization platform, while simultaneously expanding its partner community in the region.
Together, Scale Computing and Servix are bringing a virtualization alternative to customers and partners in Brazil. The Scale Computing virtualization platform combines servers, storage, and virtualization into a single solution to make IT infrastructure easier for organizations of every size. Whether an organization has one IT administrator or hundreds, the award-winning Scale Computing hyperconverged infrastructure eliminates complexity, lowers costs, and frees up management time.
Many of today’s virtualization solutions consist of multiple vendor products, making them more complicated and expensive than necessary. Moreover, properly configuring disparate server and storage components takes up valuable department resources, and that's even before a company has installed and configured hypervisors or tested for compatibility and performance. Scale Computing’s virtualization software and appliances, meanwhile, are based on patented technologies designed from the ground up to minimize infrastructure complexity and cost. Whether an organization is considering migrating from its existing virtualization platform or is virtualizing from scratch for the first time, Scale Computing’s hyperconverged approach is the shortest path to affordable virtualization that’s easy to deploy, easy to manage, and easy to scale.
“To navigate today’s complex infrastructure environments, businesses need flexibility, scalability, and resiliency. Scale Computing has a strong reputation for delivering results to IT operation leaders around the world, and we’re thrilled to be offering the HC3 solutions to Brazil. This partnership further demonstrates our commitment to providing our partners and customers with the most innovative and reliable solutions,” said Cleber Calejon, CEO, Servix.
Scale Computing continues to be the top choice for organizations thanks to the simplicity, efficiency, and innovation of Scale Computing software. Automated machine learning capabilities found in the company’s solutions mean that the typical Scale Computing customer sees a reduction in on-going management costs of between 60 and 80 percent.
Servix is a leading HCI integrator in Brazil, and we are proud to be partnering with an IT organization that is so forward thinking, embracing new technology as it makes sense for their customer base,”
Scott Mann, VP of Sales, ROW & Global Channel Chief, Scale Computing.
About Scale Computing
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing is the ideal infrastructure platform.