Remove Architecture Remove Definition Remove Firewall Remove Linux
article thumbnail

Microsegmentation – Secure Your Internal Network

CTOvision

The problem is that threat actors are able to get through the castle gates (firewalls) and once in, are able to evade the castle guards (IPS). The argument is that today with the expansion of n-tier distributed systems and massively parallel architectures, east-west traffic has increased exponentially. Microsegmentation will fix this.

Network 150
article thumbnail

Technology Short Take #77

Scott Lowe

Jeff Geerling has a great article on why he returned his 2016 MacBook Pro with Touch Bar ; it’s definitely worth a read, in my opinion. Vivek Gite over at nixCraft explains how to use ufw (Uncomplicated Firewall) on Ubuntu to limit SSH connections. Some people love it, others absolutely hate it. Not sure what a bastion host is?

Linux 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Short Take #70

Scott Lowe

According to this article , “It is hard to overstate what a sea change” this sort of architecture will create. I saw two articles talking about his experience: one on redirecting NSX firewall logs into SmartLog and a second one ranting on how the NSX DFW isn’t quite enterprise ready. and Trend Micro’s Deep Security in this article.

Vmware 60
article thumbnail

Technology Short Take #49

Scott Lowe

I highly recommend you read the entire post, but in short the five skills Matt recommends are software skills (which includes configuration management and software development tools like Git ), Linux, deep protocol knowledge, hypervisor and container networking, and IPv6. What does this mean? Servers/Hardware. You’re welcome.

Vmware 60
article thumbnail

Technology Short Take #57

Scott Lowe

In part 2 Larry walks through the node definitions in Vagrant , and in part 3 he reviews the Vagrantfile and turns up the environment. We all know that security is more than just a host-based firewall, but a host-based firewall can be part of an overall security strategy. Cloud Computing/Cloud Management.

Windows 60
article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

So he invites me to go to a book that, you know, one of those first black hats and Doug Song was set doing his thing on checkpoint firewall bypass, and I'm sitting there, and a guy named Jeff Nathan. But it definitely was a different time. I was living in Alameda off of the Navy base there. Come sit next to me. I think those are cool.

article thumbnail

EP 49: LoL

ForAllSecure

I have all the abilities built into Windows or built into Linux or Mac to do this for me. The modular nature of Kasaya security architecture will prevent the attack from hindering any modules other than VSA, the rapid response team of Kasaya as well as the tremendous and immediate support of Homeland Security.