Making the Business Case for Firewall Policy Management: Part 3 of 4
If you manage your organization's network, you have most assuredly had one of those days... where network traffic isn't flowing properly or even worse where there is an outage (see GoDaddy Stops - Why...
View ArticleAutomating Policy Management for Next-Generation Firewalls
Next-Generation firewalls provide more granular control than traditional firewalls, but there are many things to consider when implementing these devices. Not only should you have a plan for what...
View ArticleTales From the Network... Spooky Network Security Stories
As you prepare for Halloween this evening, here are some spooky stories coming out of the network security space. I sat down with Alan Shimel and Matthew Pascucci to share some of the scary things...
View ArticleMaking the Business Case for Firewall Policy Management: Part 4 of 4
So far, we've examined the business case for firewall policy management around the following areas:Simplifying Firewall Audits and PreparationReducing the Time to Process Firewall Change RequestsSaving...
View ArticleIncluding Firewall Rule Recertification as Part of Your Change Control Process
We've spent a lot of time and written many articles on this blog around the challenges of firewall change management. One area that we've touched on, but not spent a great deal of time on is around the...
View ArticleCool versus Control: Part 1 of 3
Throughout the World, the more interoperable, fringe, or radical a system, person, or thing is, the cooler it is… and generally the less under control it is. And cool technology is all around us these...
View ArticleEnhancing Your Security at the Edge: Part 1 of 2
Guest post by Matthew Pascucci, Information Security Writer and PractitionerI think many of us can agree that the network perimeter as we’ve known it is no longer. In this two-part blog series we won’t...
View ArticleEnhancing Your Security at the Edge: Part 2 of 2
Guest post by Matthew Pascucci, Information Security Writer and PractitionerIn our last article we looked at how to harden your perimeter with traditional firewalls and routers. In part 2 we will...
View ArticleCool versus Control (History Repeats Itself): Part 2 of 3
In our first Cool versus Control post we began to examine the evolution of technology and its impact from both a coolness perspective and also from the security point of view. In part 2 of this series...
View ArticleNetwork Complexity – The Security Admin’s Kryptonite
Renowned security professional Bruce Schneier has said that "complexity is the worst enemy of security." In our Dangers of Network Security Complexity survey, we found that organizations continue to...
View ArticleTop 5 Network Security Resolutions for 2013
So we're past the predictions and trends that come with the holiday season and now that it's the beginning of the year, it's time to make our resolutions. Here are my top 5 network security resolutions...
View ArticleThe Need for Application-Centric Security Policy Management
In today's interconnected environment, no large organization can run without the applications that run both its internal operations (email, HR, Finance etc.) as well as its customer- and partner-facing...
View ArticleBack in Time and Back to the Future: Looking at the Evolution of the Firewall
Guest post by Matthew Pascucci, Information Security Writer and PractitionerAs we’ve entered a New Year and we look back at the events of the past year, I thought it would be interesting to examine the...
View ArticleCool versus Control: Being a Cool Parent - Part 3 of 3
In part 2 of our Cool vs. Control blog series we examined the traditional corporate security approach to a very cool, yet out-of-control application - email. In part 3, we’ll look at how to enable cool...
View ArticleDebating the State of the Firewall in 2013
Two weeks ago, AlgoSec guest blogger Matthew Pasccuci wrote about the Evolution of the Firewall. I'd like to continue this discussion... In his blog Matt forsees a network security environment that...
View ArticleBarracuda Backdoor Highlights Importance of Configuration Compliance
At the end of last week, SEC Consult Vulnerability Lab issued a security advisory for several Barracuda Networks devices regarding an undocumented backdoor in the firmware that enables an attacker to...
View ArticleBring Your Own Device/Disaster
Anyone following information security over the past 3 years has heard the nasty four letter acronym of BYOD or Bring Your Own Device. This phenomenon has taken shape as the consumerization of IT has...
View ArticleState of the Firewall - UTM vs. NGFW
In our recent webcast discussion alongside panelists from Fortinet, NSS Labs and General Motors, we examined the State of the Firewall in 2013. We received more audience questions during the webcast...
View ArticleState of the Firewall - Panelists Answer More of your Questions
Since it's RSA week, it's a perfect time to continue the discussion of the State of the Firewall in 2013. Last week we attempted to address the most asked question from our State of the Firewall...
View ArticleState of the Firewall: Even More Q&A with Our Panelists
Continuing our follow-up from the State of the Firewall in 2013 webcast, our panelists addressed questions such as "What's the difference between UTM and NGFW?" and "Besides cost savings, what's the...
View Article