Sony’s Interesting Take on Firewall Management
I have to admit, like most of you I was amazed to hear that in regard to the recent breaches on the PSN, Sony did not have a firewall in place. I guess one could say that is one way to solve the...
View ArticleFireMon’s Taking It To The Streets
One of the biggest disconnects we hear at FireMon is that while security administrators recognize what a herculean task it is to stay on top of firewall rules, security and access policies and...
View ArticleAdvancements of Next Generation Firewalls
It seems every day another security vendor releases their version of the NextGen firewall. While Palo Alto Networks staked their claim to the NextGen firewall some time ago, everyone from Check Point...
View ArticleFireMon Risk Analyzer News
Proactive, complete network attack simulation and risk measurement solution allowing you to assess the security of your most valuable assets. When FireMon announced the acquisition of Saperix...
View ArticleDocumenting Firewall Rules
For years, firewall managers have been required to justify why a firewall rule was added to the rule base. In the past, lots of us met that requirement by putting the change control ticket number in...
View ArticleVirtualization and Firewall Management
Chris Hoff (@beaker) had a blog post up recently on his Rational Survivability blog, once again making the call for automating security (and compliance and audit as well) in both physical and virtual...
View ArticleRisk Analysis: What and Why
When FireMon announced that it had acquired Saperix Technologies and their patent pending, MIT Lincoln Labs developed, risk analysis technology, many people nodded their heads but didn’t really...
View ArticleDissecting Big Firewall Rules
A while back, I worked with one of our clients who was put in a tough spot by their external auditors. The auditor flagged every firewall rule that accepted traffic and used the “Any” object in the...
View ArticleSecurity and Network Device Back Up: An Often Overlooked but Important Part...
Disaster Recover (DR) and back up long ago became staples of a competent network and security strategy. Backing up databases, applications and data can be as simple as setting up a schedule or...
View ArticleAre You UNITED?
There is no shortage of security industry conferences and trade shows. Some are local in scope and some are national or international. Some are targeted at security training, others on security...
View Article
More Pages to Explore .....