Welcome!


Firewalls

Global information technology networks that are rich in services are typically complex and require hard-to-manage security solutions. The latest versions of next-generation firewalls now offer multiple security layers that can complicate management, particularly as more and more featur...
The first law of change management is not to use change management. To be more precise, the first law of change management is not to use change management until you use configuration management first. Okay so that might be a slightly sneaky way of making a point, but many change manag...
What is the most secure way to authenticate electronic data? Until recently, many technical people would have answered ‘cryptographic keys’ without blinking. But recent headline events – and a ‘biggie’ last year – have raised serious doubts about the ability of cryptographic keys to pr...
It goes without saying that 'Big Data' is very much a hot topic right now. In fact, there doesn't seem to be a day when we're not being spoken to, about or on the subject, and when you consider the possibilities of what Big Data provides it's not hard to see why. It allows organizati...
After you have secured your private electronic information using encryption and learned how to encrypt and digitally sign files for others, how do you extract the information and determine who encrypted the file? Asymmetric public/private key encryption allows you to decipher the infor...
In today’s environment, information security is crucial for everyone. Security needs vary widely from protecting social security numbers to guarding corporate strategy. Information espionage can occur at all levels. A human resources employee or manager takes employee personnel files h...
This article explores the issues of running an Internet company whilst dealing with the impact that Retails Banks have on the business. First let me set the scenario. I am CEO of Storage Made Easy, a business that can be categorised (in bank speak) as an online internet business. We a...
Wireshark doesn’t just work in real time. If you save a history of network activity in a pcap file using a tool such as tcpdump, you can filter the data with Wireshark to search for evidence. Intrusion detection tools that use the libpcap C/ C++ library [1] for network traffic capture...
Companies that are undergoing PCI compliance checks will have to ensure they educate all staff working with sensitive materials so that data is kept secure, it has been stated. Research director at Gartner Australia Rob McMillan explained in an interview with Computer World that one o...
It’s that time of the year again. The flood of email alerts showcasing online holiday shopping deals fill the inbox at your office PC, laptops and wireless devices as merchants attempt to lure online shoppers to “click and save” while supplies last. In fact, reports show that this year...
Data centres are the lifeline of organizations and companies. This is because most backend operations like web hosting, data back up, data storage, email hosting and e-commerce activities are all carried out at the data centres. These data centres are also pivotal in ensuring websites ...
The powerful Metasploit framework helps you see your network as an intruder would see it. You might discover it is all too easy to get past your own defenses. The Metasploit Framework is a penetration testing toolkit, exploit development platform, and research tool. The framework incl...
Whether you choose to embrace it or you try to resist it, the BYOD (Bring Your Own Device) trend is set to grow. The Cisco IBSG Horizons Study found that 78% of white-collar workers in the U.S. use a mobile device for work purposes and 41% of respondents indicated a majority of smartph...
A penetration tester simulates an attack on a customer’s network by trying to find a way inside. Many such attacks begin using a scanning tool, such as NeXpose, Nessus, or Nmap, to look for network vulnerabilities; however, several of the leading Intrusion Detection/Protection systems ...
As the pace of life appears to quicken, customers are demanding services that are faster, more mobile and more convenient. Microwave meals are ready in two ticks, a trip to an exotic island is only a couple of mouse clicks away and when travelling to a new destination, we trust GPS dev...
Creating a Vulnerability Analysis is a quick and dirty calculation to help you begin the protection process. Nothing speaks to a business owner like the threat of losing money, losing customers, or losing employees. If you are tasked with "figuring it out", the following calculation is...
Disaster recovery represents a fundamental aspect of business, as it involves a series of steps taken in order to minimize the effects of an unplanned outage. This can include a natural disaster such as an earthquake, a computer virus that rips through systems or a gaping hole in secur...
An Open Group panel explores how the technical and legal support of ID management best practices have been advancing rapidly. ID management is really the process of identifying folks who are logging onto computing services, assessing their identity, looking at authenticating them, and...
Big security vendors have been pushing the same technology for over 25 years. Yet every day these technologies are proven to be ineffective and easily breached. If you’re in charge of security at your company and you’re using anti-virus and tokens and you think you’re safe, this is you...
Many IT departments have weak patching processes – especially on the client-side. And it’s no wonder – patching is tough. Across all industries and platforms, the Window of Exploit (WOE) – that is, the time lag between announced discovery and the availability of a patch – for web-based...
Tcpdump is a widely used and powerful tool that captures, parses, and analyzes network traffic. Created by the Network Research Group at Lawrence Berkeley National Laboratory, Berkeley, California, tcpdump (http://www.tcpdump.org) is deployed with libpcap (a C/C++ library for network t...
You may have heard this term recently and wondered what it meant. When it comes to security, everyone thinks of Firewalls, Proxies, IPS, IDS, Honeypots, VPN devices, email security and even Web security, but most people don’t think in terms … May. 19, 2012 04:00 AM EDT  Reads: 6,564
Just as business critical as perimeter security, having strong internal controls to manage users is important. Using cloud-managed security tools can help reduce incidents. So much is written about the events outside your perimeter; those nefarious and shadowy individuals and offshore...
If you look at some of the headline-making breaches of the past few years, they all occurred at large companies with highly dynamic and complex computing environments. Securing these environments is impossible to do without automation, which is why so much of the innovation in IT secur...
There will always be a threat from malware - malicious software that is designed to steal or corrupt data on computers. Malware affects everyone from security services to silver surfers, and when it isn’t checked it can wreak havoc. Ultimately, it doesn’t matter what size your busines...
You bought a static rule-based correlation and you want to get the most out of it, or are you planning on getting and deploying one? There are some simple steps you can take to maximize its efficiency. The main use case for correlation is real-time incident management, so you need a 2...
Peter Silva interviews F5 Security Product Manager Preston Hogue about the BIG-IP Data Center Firewall Solution, BIG-IP’s ICSA Certification and some BIG-IP differences vs. traditional firewalls.
Quick Response (QR) codes are intended to help direct users quickly and easily to information about products and services, but they are also starting to be used for social engineering exploits. This article looks at the emergence of QR scan scams and the rising concern for users today....
Starting last month an unidentified hacker – or maybe it’s hackers – called Yamatough and believed to be part of a group called Lords of Dharmaraja and affiliated with Anonymous – from the looks of it not a native English speaker – or else a semi-literate – demanded $50,000 in blackmai...
The increasing adoption of mobile applications as part of a company’s online services leads to the question of whether we need to monitor it like other parts of our IT infrastructure. As they are part of our shipped application services we need to ensure they are working properly. Howe...
These past few weeks, I published several blogs pointing out problems with static rule based correlation, their current limitations, their high TCO, etc. Because these solutions have been sold for many years as the end all be all to security problems, it has created false expectations...
Managing access to confidential information and application resources via firewalls is the foundation of network security, and firewall audits are central to any mature network security process. However, relying on security and network experts to review rules across multiple firewall z...
Companies across all industries are fighting to secure their proprietary and confidential data behind firewalls and complex passwords; unfortunately, the reality is that this data is most likely still slipping through the cracks. The introduction of employee-owned devices and the consu...
The purpose of this article is to describe some tools and techniques in performing the planning, scoping, and recon portion of a penetration test. In covering these tools and techniques the reader will learn how to use them to find vulnerabilities in their organization and help improve...
Joe Menn explores the current cyber-crime landscape, the underground cyber-gang movement, and the motive behind governments collaborating with organized crime in cyber space. Maybe you can make your enterprise a little trickier to get into than the other guy’s enterprise, but crime pa...
In a recent blog post, Gary Sevounts, VP of marketing at Zetta, looks at the most popular offsite backup solutions for organizations with smaller budgets that can't afford a data center, but need their mission-critical data to be protected. Sevounts lists four options: tape, USB, mirro...
In a switched network environment packets are sent to their destination port by MAC address. This requires that hardware be able to create and maintain a table associating MAC addresses to ports. In a switched environment packets are only sent to devices that they are meant for. Eve...
The OpenSSL is based on SSLeay library developed by Eric A. Young and Tim J. Hudson and licensed under an Apache-style license. OpenSSL has lots of features but I will cover encoding, checksums, encryption, passwords and pass phrases. Many Linux distributions have OpenSSL as part of ...
If you watch the news regularly, it is easy to notice that in almost any given week some company seems to have experienced an electronic break-in or in some other way experienced a form of computer or network compromise. While computer security professionals can help to mitigate such r...
We are using the local port forwarding bound on a victim host so when we execute the route command and exploit internal hosts we can map them back to our initial victim, through the meterpreter connection and back to us. The Metasploit Framework is a penetration testing toolkit, explo...