Quantcast
Channel: Playing with Fire
Browsing all 27 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Making the Business Case for Firewall Policy Management: Part 3 of 4

If you manage your organization's network, you have most assuredly had one of those days... where network traffic isn't flowing properly or even worse where there is an outage (see GoDaddy Stops - Why...

View Article



Automating Policy Management for Next-Generation Firewalls

Next-Generation firewalls provide more granular control than traditional firewalls, but there are many things to consider when implementing these devices. Not only should you have a plan for what...

View Article

Tales From the Network... Spooky Network Security Stories

As you prepare for Halloween this evening, here are some spooky stories coming out of the network security space. I sat down with Alan Shimel and Matthew Pascucci to share some of the scary things...

View Article

Image may be NSFW.
Clik here to view.

Making the Business Case for Firewall Policy Management: Part 4 of 4

So far, we've examined the business case for firewall policy management around the following areas:Simplifying Firewall Audits and PreparationReducing the Time to Process Firewall Change RequestsSaving...

View Article

Including Firewall Rule Recertification as Part of Your Change Control Process

We've spent a lot of time and written many articles on this blog around the challenges of firewall change management. One area that we've touched on, but not spent a great deal of time on is around the...

View Article


Image may be NSFW.
Clik here to view.

Cool versus Control: Part 1 of 3

Throughout the World, the more interoperable, fringe, or radical a system, person, or thing is, the cooler it is… and generally the less under control it is.  And cool technology is all around us these...

View Article

Image may be NSFW.
Clik here to view.

Enhancing Your Security at the Edge: Part 1 of 2

Guest post by Matthew Pascucci, Information Security Writer and PractitionerI think many of us can agree that the network perimeter as we’ve known it is no longer. In this two-part blog series we won’t...

View Article

Image may be NSFW.
Clik here to view.

Enhancing Your Security at the Edge: Part 2 of 2

Guest post by Matthew Pascucci, Information Security Writer and PractitionerIn our last article we looked at how to harden your perimeter with traditional firewalls and routers. In part 2 we will...

View Article


Image may be NSFW.
Clik here to view.

Cool versus Control (History Repeats Itself): Part 2 of 3

In our first Cool versus Control post we began to examine the evolution of technology and its impact from both a coolness perspective and also from the security point of view. In part 2 of this series...

View Article


Image may be NSFW.
Clik here to view.

Network Complexity – The Security Admin’s Kryptonite

Renowned security professional Bruce Schneier has said that "complexity is the worst enemy of security."  In our Dangers of Network Security Complexity survey, we found that organizations continue to...

View Article

Image may be NSFW.
Clik here to view.

Top 5 Network Security Resolutions for 2013

So we're past the predictions and trends that come with the holiday season and now that it's the beginning of the year, it's time to make our resolutions. Here are my top 5 network security resolutions...

View Article

Image may be NSFW.
Clik here to view.

The Need for Application-Centric Security Policy Management

In today's interconnected environment, no large organization can run without the applications that run both its internal operations (email, HR, Finance etc.) as well as its customer- and partner-facing...

View Article

Image may be NSFW.
Clik here to view.

Back in Time and Back to the Future: Looking at the Evolution of the Firewall

Guest post by Matthew Pascucci, Information Security Writer and PractitionerAs we’ve entered a New Year and we look back at the events of the past year, I thought it would be interesting to examine the...

View Article


Image may be NSFW.
Clik here to view.

Cool versus Control: Being a Cool Parent - Part 3 of 3

In part 2 of our Cool vs. Control blog series we examined the traditional corporate security approach to a very cool, yet out-of-control application - email. In part 3, we’ll look at how to enable cool...

View Article

Image may be NSFW.
Clik here to view.

Debating the State of the Firewall in 2013

Two weeks ago, AlgoSec guest blogger Matthew Pasccuci wrote about the Evolution of the Firewall. I'd like to continue this discussion... In his blog Matt forsees a network security environment that...

View Article


Image may be NSFW.
Clik here to view.

Barracuda Backdoor Highlights Importance of Configuration Compliance

At the end of last week, SEC Consult Vulnerability Lab issued a security advisory for several Barracuda Networks devices regarding an undocumented backdoor in the firmware that enables an attacker to...

View Article

Image may be NSFW.
Clik here to view.

Bring Your Own Device/Disaster

Anyone following information security over the past 3 years has heard the nasty four letter acronym of BYOD or Bring Your Own Device. This phenomenon has taken shape as the consumerization of IT has...

View Article


Image may be NSFW.
Clik here to view.

State of the Firewall - UTM vs. NGFW

In our recent webcast discussion alongside panelists from Fortinet, NSS Labs and General Motors, we examined the State of the Firewall in 2013. We received more audience questions during the webcast...

View Article

Image may be NSFW.
Clik here to view.

State of the Firewall - Panelists Answer More of your Questions

Since it's RSA week, it's a perfect time to continue the discussion of the State of the Firewall in 2013. Last week we attempted to address the most asked question from our State of the Firewall...

View Article

Image may be NSFW.
Clik here to view.

State of the Firewall: Even More Q&A with Our Panelists

Continuing our follow-up from the State of the Firewall in 2013 webcast, our panelists addressed questions such as "What's the difference between UTM and NGFW?" and "Besides cost savings, what's the...

View Article
Browsing all 27 articles
Browse latest View live


Latest Images