Simple view of Blockchain, new updated block to the distributed ledger added in blue.
Blockchain is the next revolution in the Internet of connectivity. Blockchain is a mechanism to provide accountability to the highest degree by verification. No one entity or company is in control of the verification process.
– No human errors
– No missed transaction due to the central system
– No Machine errors
– Transactions have had the consent of all parties
– Blockchain solves the problem of manipulation (Vitalik Buterin, inventor of Ethereum) Continue reading
ASF – Application Session Filtering concept
Simple drawing to get the point across.
Extracting application sessions of interest per content
When you think about the volume of traffic that security and monitoring tools must inspect to identify threats, you can begin to appreciate the enormity of this task. The device must inspect every packet that coming in and out and analyze what level priority and network attack rating to assign it. Continue reading
Software Development – via Creative Commons Zero License CC
Software-defined visibility (SDV)
Security appliances are only as effective as the traffic they see. Unfortunately, an enterprise network is a dynamic and complex entity, so providing visibility is an ongoing effort, and it must be automated to be truly effective. (The last thing security administrators need is another item on their to-do list, right?) Enter software-defined visibility. Continue reading
MAC keyboard – Creative Commons Zero License CC
Reviewing common network defenses
Traditional security defense strategies, which many companies continue to use, are based on three simple assumptions:
- A perimeter around the network can keep the bad guys out and the good guys in. Perimeter security defenses
typically include a firewall at the Internet edge and endpoint security software, such as an antivirus tool, on
(sample code) – via Creative Commons Zero License CC
Blockchain Makes Security Better
Given the already significant technical impact the Internet has had on society and economies, a new technology has emerged that portends to radically transform network connections and make global data flows even better. The technology is known as Blockchain.
When deployed across a network, Blockchain can remove inefficiencies, increase trust and security, and enable new technological advancements without the need for middlemen , the primary beneficiaries of the Internet economy in the current paradigm. Continue reading
Keys to the Network – via Creative Commons Zero License CC
Majority of Security Incidents are from Extended Enterprise
Internal attacks pose biggest threat to organizations around the world. Many companies will not provide details of their attack since doing so will show their lack of responsibility, quality of service and security principles. Companies like Equifax did their best not letting this kind of information out to the public until its is leaked. Every time a company releases the truth about their hacked network (internal or external) employee or just the bad hacker out there they are telling their shareholder, investors, customers, suppliers, vendors, government regulator that we are not good at what we do. This is the sad part of this discussion, which many companies will not release information due to backlash the people will have on their image. Continue reading
Creative Commons Zero (CC0) license.
For all those who are new to security and would like to learn the very basic network security principles
4 Basic Network Security Principles
There are many principles of Infrastructure Security one can point out but for the purpose of simplicity here are 4 basic network security principles that should be followed when designing and planning Enterprise network Security. You can call these basic principles or whatever your heart decides but they cover the major components of a good planning and decision making for a robust network security. Continue reading