Blockchain Explained

Simple view of Blockchain, new updated block to the distributed ledger added in blue.


Blockchain is the next revolution in the Internet of connectivity. Blockchain is a mechanism to provide accountability to the highest degree by verification. No one entity or company is in control of the verification process.

– No human errors
– No missed transaction due to the central system
– No Machine errors
– Transactions have had the consent of all parties
– Blockchain solves the problem of manipulation (Vitalik Buterin, inventor of Ethereum) Continue reading


Application Session Filtering – Network Appliance workload

ASF – Application Session Filtering concept

Simple drawing to get the point across.  

Extracting application sessions of interest per content


When you think about the volume of traffic that security and monitoring tools must inspect to identify threats, you can begin to appreciate the enormity of this task. The device must inspect every packet that coming in and out and analyze what level priority and network attack rating to assign it. Continue reading

Software-Defined Visibility – Automate Security Operations

Software Development – via Creative Commons Zero License CC

Software-defined visibility (SDV)


Security appliances are only as effective as the traffic they see. Unfortunately, an enterprise network is a dynamic and complex entity, so providing visibility is an ongoing effort, and it must be automated to be truly effective. (The last thing security administrators need is another item on their to-do list, right?) Enter software-defined visibility. Continue reading

Reviewing 3 Simple Common Network Defenses

MAC keyboard – Creative Commons Zero License CC

Reviewing common network defenses

Traditional security defense strategies, which many companies continue to use, are based on three simple assumptions:

  •  A perimeter around the network can keep the bad guys out and the good guys in. Perimeter security defenses
    typically include a firewall at the Internet edge and endpoint security software, such as an antivirus tool, on
    client devices.

Continue reading

Blockchain Makes Security Better

(sample code) – via Creative Commons Zero License CC


Blockchain Makes Security Better

Given the already significant technical impact the Internet has had on society and economies, a new technology has emerged that portends to radically transform network connections and make global data flows even better. The technology is known as Blockchain.
When deployed across a network, Blockchain can remove inefficiencies, increase trust and security, and enable new technological advancements without the need for middlemen , the primary beneficiaries of the Internet economy in the current paradigm.  Continue reading

Majority of Security Incidents are from Extended Enterprise

Keys to the Network – via Creative Commons Zero License CC

Majority of Security Incidents are from Extended Enterprise


Internal attacks pose biggest threat to organizations around the world. Many companies will not provide details of their attack since doing so will show their lack of responsibility, quality of service and security principles. Companies like Equifax did their best not letting this kind of information out to the public until its is leaked. Every time a company releases the truth about their hacked network (internal or external) employee or just the bad hacker out there they are telling their shareholder, investors, customers, suppliers, vendors, government regulator that we are not good at what we do. This is the sad part of this discussion, which many companies will not release information due to backlash the people will have on their image. Continue reading

Four Network Security Principles

Creative Commons Zero (CC0) license.


For all those who are new to security and would like to learn the very basic network security principles

4 Basic Network Security Principles

There are many principles of Infrastructure Security one can point out but for the purpose of simplicity here are 4 basic network security principles that should be followed when designing and planning Enterprise network Security.  You can call these basic principles or whatever your heart decides but they cover the major components of a good planning and decision making for a robust network security. Continue reading