Networks

#DidYouKnow Network Security

#DidYouKnow? The first step in cyber security is knowing WHAT you are securing! Forescout shows you every asset… what is it, who owns it, where it is and when it connected to your network. Through the power of control you can automate hundreds of tasks, including network isolation to limit the blast radius and give you time to investigate!

Learn more at https://www.forescout.com/

Netskope One Platform Demo

Unrivaled visibility. Real-time data and threat protection. The Netskope One platform unifies all the core components of a SASE architecture, including Secure Web Gateway (SWG), Cloud Access Security Broker (CASB), Zero Trust Network Access (ZTNA), Cloud Firewall (FWaaS) and Software Defined WAN (SD-WAN) all with a single engine and policy framework.

Focus Terrapin patching efforts with Zeek

In this blog, we will demonstrate how Zeek’s metadata approach can help focus patching efforts related to the recent SSH “Terrapin” attack. One of the interesting aspects to bear in mind as you read this is that Zeek provides visibility of the vulnerable elements of this encrypted protocol, and thus serves as a reminder that network monitoring is still very much relevant, even in a heavily encrypted world.

The Future of Kubernetes Network Policy

In the ever-changing world of Kubernetes security, it’s crucial to stay ahead of threats while maintaining operational efficiency. That’s why we’re excited to introduce our latest feature: Auto-Generated Kubernetes Network Policy, based on application runtime behavior, powered by eBPF (extended Berkeley Packet Filter) technology. With this addition, organizations can easily apply native Kubernetes network rules without worrying about disrupting their production systems.

SASE | The future of secure networking in the cloud

Forward-thinking CIOs are turning to SASE. Secure networking has become imperative as new operating models emerge and workloads/applications shift rapidly to the cloud. Learn why SASE offers improved resilience and security while reducing complexity and enhancing efficiency for a more scalable IT infrastructure.

CSPM importance for CISOs. What security issues can be prevented\defended with CSPM?

Cloud Security is a broad domain with many different aspects, some of them human. Even the most sophisticated and secure systems can be jeopardized by human elements such as mistakes and miscalculations. Many organizations are susceptible to such dangers, especially during critical tech configurations and transfers.

SMB Port Numbers: A Guide to Optimizing and Securing Your Network

In the digital age, where data is the new gold, ensuring the security and efficiency of network communication is paramount for businesses of all sizes. The Server Message Block (SMB) protocol plays a crucial role in facilitating file sharing, network browsing, and printer access among devices on a network. Understanding SMB port numbers is essential for IT professionals looking to optimize and secure their networks.

Netskope One & The Zero Trust Engine

The Netskope Zero Trust Engine is at the center of the Netskope One platform, which ensures continuous adaptive trust-based policy controls extend effortlessly and consistently across Secure Web Gateway (SWG), Cloud Access Security Broker (CASB), Zero Trust Network Access (ZTNA), Cloud Firewall (FWaaS), and Software Defined WAN (SD-WAN) services, leaving no security gaps and delivering an exceptional user experience.

Exploring host discovery techniques in a network

In a network assessment, one of the first tasks is to narrow down a large set of IP addresses to a list of active or interesting hosts. It's like trying to find specific houses in a big neighbourhood without knocking on every door. Scanning every possible connection of every single IP address can be slow and often unnecessary. What makes a host interesting depends on what you're looking for.

RMM Software: How to Protect it with a Firewall

Remote monitoring and management (RMM) solutions provide flexible methods to enable MSPs to detect network or device anomalies early, facilitating proactive systems monitoring. While these tools are deployed for legitimate purposes, it is common for cybercriminals to make malicious use of them.