Remove Architecture Remove Firewall Remove Linux Remove Windows
article thumbnail

Microsegmentation – Secure Your Internal Network

CTOvision

The problem is that threat actors are able to get through the castle gates (firewalls) and once in, are able to evade the castle guards (IPS). The argument is that today with the expansion of n-tier distributed systems and massively parallel architectures, east-west traffic has increased exponentially. Microsegmentation will fix this.

Network 150
article thumbnail

Technology Short Take #79

Scott Lowe

Tony Sangha took PowerNSX (a set of PowerShell cmdlets for interacting with NSX) and created a tool to help document the NSX Distributed Firewall configuration. Here’s a walkthrough to install Arch Linux on VirtualBox. Thinking of virtualizing Linux on Hyper-V? What’s that? You haven’t heard of PowerNSX before? Virtualization.

Linux 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Short Take #66

Scott Lowe

I recently spoke at Interop 2016 in Las Vegas, and while I was there I scribbled down some notes pertaining to how decomposing applications into microservices-based architectures was similar in some respects to decomposing networks into an overlay network and an underlay (physical) network. Networking. Servers/Hardware. Maybe next time?

Vmware 60
article thumbnail

What Are the Best Cybersecurity Certifications in 2023?

SecureWorld News

The course will revolve around real-world system architectures, the threats and exploits that could result in a data breach , and the defense mechanisms that could be employed to protect a network. Focusing on TCP/IP protocol suites, this certification centers around the methods used when creating and configuring firewall solutions.

Course 60
article thumbnail

Technology Short Take #68

Scott Lowe

In the event you accidentally locked yourself out of vCenter using NSX’s distributed firewall, this post by Roie Ben Haim provides a workaround for getting yourself out of this pickle. This is a highly technical article on scheduling in the Linux kernel , but it’s well worth reading. Cloud Computing/Cloud Management. Virtualization.

Linux 60
article thumbnail

Spotlight on Cybersecurity Leaders: Evgeniy Kharam

SecureWorld News

My work spanned from Linux and Windows to handling cables; essentially, anything the Navy required, whether below or above water, I was involved. Additionally, I earned my Microsoft Certified Systems Engineer (MCSE) certification for Windows in 2000 during my military service.

article thumbnail

Technology Short Take #57

Scott Lowe

We all know that security is more than just a host-based firewall, but a host-based firewall can be part of an overall security strategy. This article provides a good introductory overview of Linux iptables commands for configuring host-based firewall rules on your Linux systems. Cloud Computing/Cloud Management.

Windows 60