Application Session Filtering – Network Appliance workload

ASF – Application Session Filtering concept

Simple drawing to get the point across.  

Extracting application sessions of interest per content

 

When you think about the volume of traffic that security and monitoring tools must inspect to identify threats, you can begin to appreciate the enormity of this task. The device must inspect every packet that coming in and out and analyze what level priority and network attack rating to assign it. Continue reading

Advertisements

Software-Defined Visibility – Automate Security Operations

Software Development – via Creative Commons Zero License CC

Software-defined visibility (SDV)

 

Security appliances are only as effective as the traffic they see. Unfortunately, an enterprise network is a dynamic and complex entity, so providing visibility is an ongoing effort, and it must be automated to be truly effective. (The last thing security administrators need is another item on their to-do list, right?) Enter software-defined visibility. Continue reading

Reviewing 3 Simple Common Network Defenses

MAC keyboard – Creative Commons Zero License CC

Reviewing common network defenses

Traditional security defense strategies, which many companies continue to use, are based on three simple assumptions:

  •  A perimeter around the network can keep the bad guys out and the good guys in. Perimeter security defenses
    typically include a firewall at the Internet edge and endpoint security software, such as an antivirus tool, on
    client devices.

Continue reading

Blockchain Makes Security Better

(sample code) – via Creative Commons Zero License CC

 

Blockchain Makes Security Better

Given the already significant technical impact the Internet has had on society and economies, a new technology has emerged that portends to radically transform network connections and make global data flows even better. The technology is known as Blockchain.
When deployed across a network, Blockchain can remove inefficiencies, increase trust and security, and enable new technological advancements without the need for middlemen , the primary beneficiaries of the Internet economy in the current paradigm.  Continue reading

Majority of Security Incidents are from Extended Enterprise

Keys to the Network – via Creative Commons Zero License CC

Majority of Security Incidents are from Extended Enterprise

 

Internal attacks pose biggest threat to organizations around the world. Many companies will not provide details of their attack since doing so will show their lack of responsibility, quality of service and security principles. Companies like Equifax did their best not letting this kind of information out to the public until its is leaked. Every time a company releases the truth about their hacked network (internal or external) employee or just the bad hacker out there they are telling their shareholder, investors, customers, suppliers, vendors, government regulator that we are not good at what we do. This is the sad part of this discussion, which many companies will not release information due to backlash the people will have on their image. Continue reading

Four Network Security Principles

Creative Commons Zero (CC0) license.

 

For all those who are new to security and would like to learn the very basic network security principles

4 Basic Network Security Principles

There are many principles of Infrastructure Security one can point out but for the purpose of simplicity here are 4 basic network security principles that should be followed when designing and planning Enterprise network Security.  You can call these basic principles or whatever your heart decides but they cover the major components of a good planning and decision making for a robust network security. Continue reading

☁ The New Modern Information Technology Manager

The New IT

 

The days of the Information Technology manager keeping the Infrastructure running are over. IT now has new job descriptions, new duties and responsibilities.

By keeping up with the latest technology developments, IT Manager can learn and have enough knowledge about the upcoming technological advances. Since Technology matures quickly, as an IT Manager you do not want to get left behind. Keeping up with the latest Cloud developments, Artificial Intelligence projects
and advances, Voice  and NLP (natural language processing) etc. Continue reading