WEBINAR: The Impact of Firewall Sprawl

CTOvision

Register >> Network firewalls have long been established as the ubiquitous first line of defense for every organization’s network security strategy. Sprawling deployments of firewalls and other security devices that increase complexity, cost and risk. Join representatives from research firm, the Aberdeen Group , as they share their insights on the rise of firewall sprawl and learn how the FireMon platform answers the call for more strategic firewall management.

Azure Storage Account Networking: When to Use Firewalls and Service Endpoints

Linux Academy

Recently, when building content for one of my upcoming courses, Microsoft Azure Architect Technologies – Exam AZ-300 , I found the Microsoft documentation wasn’t immediately clear on the exclusivity of Storage Account Firewalls, and Service Endpoints. Do I need to use Service Endpoints and the Storage Firewall together? When configuring Storage Account Firewalls, we don’t have to configure a Service Endpoint. Storage Account Firewalls.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Top 5 Tips to Improve Your Linux Desktop Security 2017

Galido

Having Linux as your operating system is one of the better decisions you can make concerning your computer’s security. However, many Linux users make the same mistakes of believing that it’s enough just to have it on your computer and only that fact will make all threats simply disappear, when unfortunately the reality is quite different. This is why we decided to talk about 5 tips to improve your Linux desktop security in 2017 that are easy to follow and will give great results.

Linux 64

Outbound Traffic Filtering | Roadmap to Securing Your Infrastructure

Linux Academy

This is filtering provided at the network edge by a firewall with rules (ACLs) restricting what internal users are allowed to access. Some firewalls have the ability to filter by an application (layer 7 firewalls), but we’re going to concentrate on standard packet-filtering firewalls and their capabilities. We discuss whitelist and blacklist approaches in the CompTIA CySA+ course here at Linux Academy. Review Your Firewall Logs to Find Infections.

SMB 60

Step-by-Step: Running FREE Linux Virtual Machines in the Cloud.

IT Pros Rock!

Step-by-Step: Running FREE Linux Virtual Machines in the Cloud with Windows Azure. Step-by-Step: Running FREE Linux Virtual Machines in the Cloud with Windows Azure. Step-by-Step: Running FREE Linux Virtual Machines in the Cloud with Windows Azure. The Windows Azure Infrastructure as a Service (IaaS) offering supports running Windows virtual machines and Linux virtual machines in the Cloud. Linux? That’s right, Linux! What about custom Linux images?

Linux Academy Monthly Update – October

Linux Academy

Hi, I’m Anna, COO of Linux Academy. Anthony is out on some much-needed vacation, but that’s not going to stop us from updating you on everything new in this Linux Academy Monthly Update. CompTIA Linux Plus XK0-004. Securing a Virtual Network with Azure Firewall . Using Ansible Firewalls Rules. CompTIA Linux+ XK0-004 Certification Exam . To enter to win, you need to: Have a Linux Academy account (free or paid).

Using Secure Configurations | Standardize Your Security

Linux Academy

Ansible can help automate the backup, and you can learn more in this month’s how-to video that covers using Ansible to back up a Cisco ASA firewall. Red Hat offers OpenSCAP , can be used to scan Linux hosts for compliance but doesn’t scan Windows hosts. Here at Linux Academy, we even have labs that teach scanning with OpenSCAP in our DevSecOps Essentials course and our upcoming Red Hat Certified Specialist in Security course.

1 Year Anniversary: Linux Academy + Jupiter Broadcasting

Linux Academy

September 12th marks one year since Jupiter Broadcasting was announced to be joining forces with Linux Academy in a team effort to give back to the community. Let’s look back on this alliance of two powerful educational advocacy entities: One year ago: Linux Academy and Jupiter Broadcasting share the mission to inspire people to follow their passions. We are so proud to welcome the Jupiter Broadcasting team to Linux Academy.

User Account Review | Roadmap to Securing Your Infrastructure

Linux Academy

We spend so much time on other things — like managing firewall rules, system patching , analyzing report data, etc. ” But here’s some food for thought: When you deploy a new group policy in Active Directory for password complexity or enable password requirements on Linux, that only affects newly created accounts or when an existing account’s password is changed. On a Linux host, simply run the lastlog command to get a list of the last login date of all users on a system.

Cloud Playground for Beginners: Navigating your first Server

Linux Academy

Welcome to Linux Academy’s Cloud Playground! Used basic Linux commands on that server. The great thing about this in-browser terminal is that it bypasses restrictions that corporate firewalls typically have, so you can learn on the job without restriction. While we won’t go over all of the information outputted with this command, check out the Linux Essentials course if you are interested in learning what all of that information means. Cloud Playground Linux Academy

Learn Google Cloud by Doing with New Google Cloud Training!

Linux Academy

From new courses to new labs, we have a ton of exciting new Google Cloud updates at Linux Academy ( where you can get the most Google Cloud training on this planet! ). With engaging features like Cloud Playground, Interactive Diagrams, Hands-On Labs in live cloud environments, customizable flashcards, study groups, direct access to our expert Training Architects, downloadable Course videos, and more, Linux Academy has the highest quality and quantity of Google Cloud training.

Top Ten Ways Not To Sink the Kubernetes Ship

Linux Academy

These policies, like any firewall, provide an invaluable means of limiting attack vectors both inside and outside the VPC. It is important to remember that just because an endpoint is behind a firewall doesn’t mean it is not a vulnerability. These suggestions and others are covered in Linux Academy’s Kubernetes Security Course. The post Top Ten Ways Not To Sink the Kubernetes Ship appeared first on Linux Academy Blog. Linux Academy kubernetes security

Learn AWS by Doing with New AWS Hands-On Training!

Linux Academy

With engaging features like live AWS cloud sandboxes and servers, Interactive Diagrams, Hands-On Labs in live cloud environments, customizable flashcards, study groups, direct access to our expert Training Architects, downloadable Course videos, and more, Linux Academy is the #1 cloud training platform that helps you learn AWS by doing. Start your 7-day free trial or check out Linux Academy for Business and see how you can upskill your team in AWS today!

AWS Sandbox Environments On Demand with Playground

Linux Academy

” Approving AWS (and Azure, Google Cloud, or Linux) environments for your employees can pose a few problems: Administrative overhead of managing individual environments. Linux Academy manages all of the overhead associated with provisioning, securing, and tearing down the accounts. As our users have told us: “It takes weeks or months for us to get approval for AWS (Azure/Google Cloud/Linux) environments.” Linux Academy

Technology Short Take #77

Scott Lowe

Vivek Gite over at nixCraft explains how to use ufw (Uncomplicated Firewall) on Ubuntu to limit SSH connections. Flatpak is a (relatively) new application packaging/sandboxing mechanism for Linux applications. Who would have thought that one day you’d refer to a Microsoft web site for instructions on configuring something in Linux? Looks like I’m not the only one making the leap from OS X to Linux—check out this pair of articles on Wesley Moore’s switch ( part 1 and part 2 ).

IPv6 60

Technology Short Take #84

Scott Lowe

Anthony Burke gives a little bit of a sneak peek at some functionality from the upcoming v3 release of PowerNSX: searching NSX Distributed Firewall (DFW) rules. Aside from a Windows VM I maintain for the occasional thing I can’t do effectively on Linux or OS X, I haven’t worked with Windows in any significant capacity in quite a while. Welcome to Technology Short Take #84! This episode is a bit late (sorry about that!), but I figured better late than never, right?

IPv6 60

Technology Short Take #84

Scott Lowe

Anthony Burke gives a little bit of a sneak peek at some functionality from the upcoming v3 release of PowerNSX: searching NSX Distributed Firewall (DFW) rules. Aside from a Windows VM I maintain for the occasional thing I can’t do effectively on Linux or OS X, I haven’t worked with Windows in any significant capacity in quite a while. Welcome to Technology Short Take #84! This episode is a bit late (sorry about that!), but I figured better late than never, right?

IPv6 60

Quick Tip: List Current Client Connections on Azure Point-to-Site VPN with PowerShell and REST API

IT Pros Rock!

This solution uses SSTP (Secure Socket Tunneling Protocol) to provide a secure, firewall-friendly solution that uses the native VPN client built-in with Windows 7 and later. In a future article, we'll also look at a cross-platform Client VPN connectivity option to Azure for Linux and Mac OS X clients. Microsoft Azure provides secure access to cloud-based VMs for developers and IT operations teams via Point-to-Site VPN (aka. Client VPN) connectivity.

DockerCon 2016 Vendor Meetings

Scott Lowe

Plumgrid is one of the primary commercial sponsors behind the IO Visor project , a Linux Foundation project, which leverages the extended Berkeley Packet Filter (eBPF) subsystem in the Linux kernel. Using eBPF, Plumgrid has created in-kernel virtual network functions (VNFs) that do things like bridging, routing, network address translation (NAT), and firewalling. Docker OSS Linux Networking Security Storage DockerCon2016

Technology Short Take #46

Scott Lowe

It was good to read this post on Cumulus Linux first impressions by Jeremy Stretch. I’m a fan of Cumulus, but I’m admittedly a Linux guy (see here ) so you might say I’m a bit biased. Jeremy is a “hard-core” networking professional, and so hearing his feedback on Cumulus Linux was, in my opinion, useful. I like that Jeremy was completely honest: “I’m not going to lie: Cumulus Linux was not immediately appealing to me.”

Technology Short Take #79

Scott Lowe

Tony Sangha took PowerNSX (a set of PowerShell cmdlets for interacting with NSX) and created a tool to help document the NSX Distributed Firewall configuration. Here’s a walkthrough to install Arch Linux on VirtualBox. Thinking of virtualizing Linux on Hyper-V? Then you may find this list of tips for Linux performance on Hyper-V to be useful. Welcome to Technology Short Take #79! There’s lots of interesting links for you this time around. Networking.

Technology Short Take #33

Scott Lowe

This post by Ranga Maddipudi shows you how to use App Firewall in conjunction with VXLAN logical networks. Via Forbes Guthrie on Twitter, I saw this post on how to setup a CA on Linux and use it in a Windows environment. App Firewall? Networking Security Storage Virtualization Automation Hardware HP HyperV Linux Macintosh OpenStack Puppet SDN vCloud vSphere VXLAN Writing

Technology Short Take #71

Scott Lowe

The use of VMware NSX for microsegmentation is a really popular use case, and so the topic of scripting distributed firewall (DFW) rules often comes up. Red Hat Enterprise Linux Atomic Host (how’s that for a mouthful?) This is a fairly significant departure from a lot of other container-optimized Linux hosts, which require you to leverage containers for anything not included in the base distribution. Welcome to Technology Short Take #71!

Technology Short Take #63

Scott Lowe

At DevOps Networking Forum 2016, I had the opportunity to share a presentation on some Linux networking options. Russell Pope at Kovarus recently wrote about using security groups to manage the VMware NSX distributed firewall. I knew Microsoft was cozying up to Linux, but I honestly didn’t expect they would port SQL Server to Linux. You may also find this (related) article on memory inside Linux containers to be helpful. Welcome to Technology Short Take #63.

Technology Short Take #68

Scott Lowe

In the event you accidentally locked yourself out of vCenter using NSX’s distributed firewall, this post by Roie Ben Haim provides a workaround for getting yourself out of this pickle. This is a highly technical article on scheduling in the Linux kernel , but it’s well worth reading. It’s not uncommon for folks to use a tool like VirtualBox to run Linux VMs on which they run/test/develop Docker containers.

Technology Short Take #70

Scott Lowe

I saw two articles talking about his experience: one on redirecting NSX firewall logs into SmartLog and a second one ranting on how the NSX DFW isn’t quite enterprise ready. I do agree with the post that Linux skills are a good place to invest your time/energy, which is what I’ve been recommending for a few years now. I’m more an Linux+Ansible guy myself, but for all you vSphere folks out there this is something you should definitely be examining.

eBook 60

DevOps Basics: Introduction to Docker Registry and Images

CanITPro

You can also deploy and maintain your own private repository under your firewall on a container. Uncategorized Azure container DevOps Docker endpoint How-To Linux Python Ubuntu VMThe concept of a Docker container is to build something (your application) on the top of an existing image. Let’s say for example that you have a Python application and you want to run this application on an Ubuntu image, because you like this distribution.

Technology Short Take #66

Scott Lowe

In the event you’re interested in an idea of how much latency the use of in-kernel hypervisor firewalling (such as that offered by VMware NSX) adds, have a look at this article by Sean Howard. Nick Janetakis discusses some of the differences it’s made for some of his Docker images to switch to using Alpine Linux as the base (instead of the more common Ubuntu or Debian base images). Welcome to Technology Short Take #66!

Google Cloud Sandbox Environments On Demand with Playground

Linux Academy

Just by having a paid account with Linux Academy, you and your organization can access not only our Google environments but all of Linux Academy’s Cloud Playground environments without ever having to open up a port or worrying about leaking information. Linux Academy manages all of the overhead associated with provisioning, securing, and deleting the environments. Another common issue that teams face is corporate firewall restrictions which blog SSH access over port 22.

Technology Short Take #33

Scott Lowe

This post by Ranga Maddipudi shows you how to use App Firewall in conjunction with VXLAN logical networks. Via Forbes Guthrie on Twitter, I saw this post on how to setup a CA on Linux and use it in a Windows environment. App Firewall? Networking Security Storage Virtualization Automation Hardware HP HyperV Linux Macintosh OpenStack Puppet SDN vCloud vSphere VXLAN Writing

Vulnerability Scanning – Roadmap to Securing Your Infrastructure

Linux Academy

For internal vulnerability scanning, you can set up an OpenVAS server running on Linux. There is no licensing cost for Linux or OpenVAS, which is a bonus. If you’re interested in learning more about vulnerability scanning, it’s covered in Linux Academy’s CompTIA Pentest+ course here. There will be a fee, usually based on the number of IP addresses being scanned, but these only need to be run quarterly or after an edge device replacement, such as a firewall.

Linux 60

Technology Short Take 136

Scott Lowe

This article by Joshua Fox outlines how and when to use each of the various types of firewalls offered by AWS. Ryan Blunden has authored a fairly comprehensive piece on environment variables in Linux and macOS. Linux may be coming to the Apple M1 chip. Welcome to Technology Short Take #136, the first Short Take of 2021! The content this time around seems to be a bit more security-focused, but I’ve still managed to include a few links in other areas.

Linux 60

8 of the most in-demand skills for ethical hacking and the online courses to learn them

Mashable VR

BEST FOR LEARNING LINUX. Kali Linux Tutorial For Beginners. Take your Linux knowledge to the next step. £19.99 Become the architect of your very own network firewalls, built for maximum security. £19.99 Hack Windows, Mac OS X, Linux & Android.

Linux 55

Regulatory Compliance and Red Hat Security

Linux Academy

The Linux Audit system is a great solution. Your security team can use the Linux Unified Key Setup (LUKS) to encrypt and decrypt physical disks to keep data secure when not in use. OpenSCAP shows that a firewall is installed and running, that the Telnet protocol is disabled, and so on. Stay Compliant with Linux Academy. Check out the course, and get in touch with Bob on LinkedIn or the #security channel of the Linux Academy Community Slack.

Linux 60

Microsegmentation – Secure Your Internal Network

CTOvision

The problem is that threat actors are able to get through the castle gates (firewalls) and once in, are able to evade the castle guards (IPS). Cisco EPGs can be a physical server, a virtual machine, a Linux container, or even a mainframe. Illumio is vendor independent supporting VMware, KVM, XEN and Hyper-V hypervisors, bare metal servers, private data center, public clouds like Amazon, all versions of Windows and virtually every major flavor of Linux. Nathaniel Crocker.

Is Information Security the Right Profession for Me?

Linux Academy

These controls could be firewalls, Security Information and Event Monitoring (SIEM) systems, Intrusion Prevention Systems (IPSs), Network Access Control (NAC) systems, etc. This is because you have to audit technical controls and be able to understand things like firewall rules, Active Directory structure, file permissions, backups, etc. appeared first on Linux Academy Blog. Wondering if information security is the right profession for you? Great question!

Technology Short Take 132

Scott Lowe

” Ivan Pepelnjak attempts to answer the question, “How much do I need to know about Linux networking?” ” Speaking of Linux networking…Marek Majkowski of Cloudflare digs deep into conntrack , used for stateful firewalling functionality. Intel has released a security advisory for BlueZ , which is related to Bluetooth support in the Linux kernel. Welcome to Technology Short Take #132!

May Intro | Roadmap to Securing Your Infrastructure

Linux Academy

As many of you know, most firewalls today come with a default rule set permitting all outbound traffic to flow freely. You put the firewall in place, and traffic flows outbound unimpeded. The post May Intro | Roadmap to Securing Your Infrastructure appeared first on Linux Academy. Can you believe it’s already May? Spring is here, flowers are in bloom, and the grill is fired up. I really enjoy springtime.

Self-Audits | Roadmap to Securing Your Infrastructure

Linux Academy

Firewall rules : Attempt to access something your firewall should be blocking. The post Self-Audits | Roadmap to Securing Your Infrastructure appeared first on Linux Academy Blog. The word audit often brings up some negative emotions. I’ll be honest — many years ago, I grimaced at the word audit , it shook me to the core. I didn’t like the idea of outsiders putting me or my work under a microscope, looking for flaws. Who would?

May Intro | Roadmap to Securing Your Infrastructure

Linux Academy

As many of you know, most firewalls today come with a default rule set permitting all outbound traffic to flow freely. You put the firewall in place, and traffic flows outbound unimpeded. The post May Intro | Roadmap to Securing Your Infrastructure appeared first on Linux Academy Blog. Can you believe it’s already May? Spring is here, flowers are in bloom, and the grill is fired up. I really enjoy springtime.

May Intro | Roadmap to Securing Your Infrastructure

Linux Academy

As many of you know, most firewalls today come with a default rule set permitting all outbound traffic to flow freely. You put the firewall in place, and traffic flows outbound unimpeded. The post May Intro | Roadmap to Securing Your Infrastructure appeared first on Linux Academy. Can you believe it’s already May? Spring is here, flowers are in bloom, and the grill is fired up. I really enjoy springtime.

TeamViewer is not working – How to fix it

TechnoBezz

At the time of this writing, the latest PC update (Windows, macOS, and Linux) is 15.6.7. Other methods that you can look at but won’t be explored in this article include: Checking if the Windows Firewall is on and turning it off (for Windows Defender users). Of the many web conferencing and remote administration tools, one that stands out is TeamViewer. This German application software has been at loggerheads with the likes of Remote PC, VNC Connect, and LogMeIn.

3 Tools to Secure Your WordPress Blog

Galido

All In One WP Security & Firewall. Firewall functionality: basic, intermediate and advanced protection. Vobla is a cloud backup service for Linux machines. When it comes to security, WordPress is famously lacking. In 2013 it was reported that 73% of WordPress blogs are vulnerable to attack, and that number is so large that it’s a safe bet that lots of blogs are vulnerable, still. So how do you avoid being attacked?

Tools 68