article thumbnail

Microsegmentation – Secure Your Internal Network

CTOvision

Threat actors they say primarily now travel east-west. The problem I have with these statements is that every network engineer I know segments their network more than just at the subnet level and their segmentation is not limited to just north-south traffic. This is something you can’t do with static network ACLs at layer 2.

Network 150
article thumbnail

DevOps Enterprise Summit – London

Linux Academy

Linux Academy DOES it again! This year, instead of attending DevOps Enterprise Summit (DOES) North America, our team will be traveling to DOES in London! We are hosting a meetup for Linux Academy learners, and we want to see you! The post DevOps Enterprise Summit – London appeared first on Linux Academy Blog.

Devops 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Patch Management | Roadmap to Securing Your Infrastructure

Linux Academy

Well, there’s all of your network devices, IoT devices, hypervisors, and let’s not forget about all of those wonderful applications! Patching in a Linux environment. For Linux patching there are a few patch management solutions, however, they can be pricey. What do you mean we can’t stop there? What else is there?

article thumbnail

Employee Spotlight – Tia Williams, AWS Training Architect

Linux Academy

Our Training Architects are dedicated to pushing the boundaries of online learning and helping professionals become cloud and Linux experts! Hear from one of our AWS Training Architects, Tia Williams, below and see why she loves working at Linux Academy. What do you do at Linux Academy? I have a huge movie catalog.

article thumbnail

Wireless Security | Roadmap to Securing Your Infrastructure

Linux Academy

Remember: Wireless signals are not contained to copper or fiber like a wired network — these signals leave your office and your building and travel a good distance. As a pentester, I enjoyed working to crack wireless networks to gain access to the wired network. .

article thumbnail

Data on the move: Safeguarding business transactions with VPNs

Dataconomy

A VPN (Virtual Private Network) comes into the fold here. Without a business VPN, the employees connected to the company’s network would be putting their data and sensitive data at risk of being at the disposal of cyber criminals. Internet access over a public network exposes their online activities to malicious actors.

Data 41
article thumbnail

Cloud Conversations: Revisiting re:Invent 2014 and other AWS updates

Storage IO Blog

SQL Server among others).

Cloud 83