Cisco Security Group Access: An Introduction
The concept of identity-based network access -- essentially, providing credentials to gain access to a network or a resource -- is not a new phenomenon. Over the years, it's evolved from logging onto...
View ArticleSecure Networks: How To Develop An Information Security Policy
Security is often referred to as an overlay to a network topology. While security methods provide protection for access and infrastructure, these methods should be the result of a carefully defined...
View ArticleBuilding an Information Security Policy Part 1: Network Devices
In my previous blog I outlined some important business and high-level design considerations for building an effective security policy. Understanding your network topology is key to a good security...
View ArticleBuilding An Information Security Policy Part 2: Hardware and Software
In my previous blog, I outlined how understanding the roles of network devices is important for building an effective security policy. In this post, I will cover considerations when selecting hardware...
View ArticleBuilding An Information Security Policy Part 3: Logical And Physical Design
In my previous blog, I discussed key points for the selection of appropriate hardware and software in order to build and maintain an effective security policy. In this post, I will cover security...
View ArticleBuilding an Information Security Policy Part 4: Addresses and Identifiers
The first three posts in this series have focused on many physical aspects of building a secure network: choosing hardware and software, and understanding your physical topology in order to apply your...
View ArticleBuilding An Information Security Policy, Part 5: Managing Identities
In my previous blog post in this multi-part series on constructing an information security policy, I reviewed identifiers such as IP addresses and VLAN IDs and their role as security policy match...
View ArticleNETCONF: Introduction To An Emerging Networking Standard
Standards bodies like the IETF have been responsible for introducing innovative new protocols and methods for vendor-agnostic deployment. Some of the most well-known protocol definitions that have gone...
View ArticleNetwork Analytics: Beyond Log Files
Collecting information about network events has long been essential to providing a record of activities related to requirements such as accounting, billing, compliance, SLAs, and forensics. Systems and...
View ArticleDIY Big Data Security Analytics: OpenSOC
Big data analytics provides scalable, high-performance analysis of large data sets. It allows for the examination of large volumes data to discover patterns, behaviors and correlations that can be used...
View Article
More Pages to Explore .....