security

November 21, 2013

SECURITY

Cisco Updates Its Next-Generation Firewall Management Application – Prime Security Manager

4 min read

Cisco Prime Security Manager is a management application that was introduced in 2012 to manage Cisco ASA 5500-X Series Next-Generation Firewalls. It is built on Web 2.0 technologies and supports both single-device and multi-device manager form factors to help manage various features such as Application Visibility and Control (AVC), along with web security in a simple, light-weight, and scalable manner.

November 20, 2013

DATA CENTER

#EngineersUnplugged S4|Ep5: Secure the Infrastructure!

1 min read

We all know we need it, but no one wants to talk about. Today, we break through that taboo. Secure the Infrastructure! This bold declaration brought to you courtesy of Matthew Brender (@mjbrender) and Mike Foley (@mikefoley) as they talk about how to use a hardening guide, and how to execute security in the real […]

November 20, 2013

SECURITY

Christmas Packets: Web Browsing and the Festive Period

4 min read

The web browsing behaviour of users changes as the end of the year approaches. The holiday season can provide a large distraction from work duties that may need to be managed. Equally, even during periods when the office is closed, there will be some individuals who cannot resist accessing work systems. Managing these changes in […]

November 19, 2013

PERSPECTIVES

Securing Critical Internet Infrastructure: an RPKI case study in Ecuador

3 min read

Securing the Critical Internet Infrastructure is an ongoing challenge for operators that require collaboration across administrative boundaries. Last September something exceptional happened in Ecuador, a small South American country. The entire local network operation community got together to be pioneers in securing its local Internet infrastructure by registering its networks in the Resource Public Key […]

November 13, 2013

SECURITY

Cybersecurity: Where are the Biggest Threats?

1 min read

Rarely a week goes by that we don’t hear of a database compromise that results in confidential data—many times consisting of personally identifiable information (PII)—falling into the hands of those who should not have access to the data. Protection of our PII is becoming increasingly critical as more and more information is collected and stored through the use of Internet-enabled devices.

November 12, 2013

EDUCATION

STEM Education Must be a Hands-on Approach

1 min read

Science, technology, engineering and math (STEM) fields are critical to innovation and the continued development of the U.S. economy. However, trends are showing that while there are and will continue to be plenty of jobs in these fields, many students are unprepared or lack the desire necessary for employers of the future to fill these […]

November 7, 2013

EXECUTIVE PLATFORM

Secure BYOD for Midsize Businesses

2 min read

The Internet of Everything will connect 50 billion things by 2020. Your midsize business needs to stay ahead of potential security risks. Are you ready? Previously, I wrote about the importance of driving success for midsize businesses. Today I am focusing on security and BYOD for midsize companies. Are you fully aware of all of […]

November 4, 2013

SECURITY

Massive Increase in Reconnaissance Activity – Precursor to Attack?

2 min read

Update 2013-11-12: Watch our youtube discussion Update 2013-11-05: Upon further examination of the traffic we can confirm that a large percentage is destined for TCP port 445. This is indicative of someone looking for nodes running SMB/DCERPC. With that in mind it is extremely likely someone is looking for vulnerable windows machines or it is quite possible that […]

November 1, 2013

SECURITY

Using a “Playbook” Model to Organize Your Information Security Monitoring Strategy

7 min read

CSIRT, I have a project for you. We have a big network and we’re definitely getting hacked constantly. Your group needs to develop and implement security monitoring to get our malware and hacking problem under control.   If you’ve been a security engineer for more than a few years, no doubt you’ve received a directive […]