Human Vulnerability in Security Systems

November 19, 2018

A system is only as strong as its weakest component. In IT security, that’s often the people operating it.

Keep Reading

Proactive Intruder Monitoring

November 7, 2018

The cybersecurity ecosystem is constantly changing. It's time to take a proactive approach to securing your company's systems.

Keep Reading

Using Subresource Integrity to Secure your Web Applications

October 17, 2018

Running third-party code on your web application? Keep your customers' data secure through the use of Subresource Integrity.

Keep Reading

Hacking with Hidden Hardware: What’s the real story on SuperMicro?

October 10, 2018

New information continues to surface surrounding the SuperMicro scandal - who should we believe, and how do we address this potential threat?

Keep Reading

Lessons from the Latest Facebook Breach

October 2, 2018

On Friday morning, Facebook announced that 50 million users had been affected by a security breach. How can we learn from this incident to improve our own security protocols?

Keep Reading

Security Updates: September 6, 2017

Cisco Startup config errors are not present Highly available cluster member interface is down ASDM history is enabled

Keep Reading

Cisco ASA Firewall Cluster Member Replacement

April 8, 2018

So one of your firewalls in your highly available cluster died. It happens. It’s not your fault. But, you have to put humpty dumpty back together again. Do it the wrong way, and you can erase your configuration and bring the cluster down! Prepare for Success Backup current configuration:  Use the more system:running-config command b.      Certificates [...]

Keep Reading

Security Updates: August 4, 2017

August 4, 2017

Check Point Gaia Management SecurePlatform IPSO ClusterXL old or too-new arriving updates percentage is normal Database revisions are set to automatically delete ClusterXL old or too-new arriving updates percentage is normal ICMP out of state drops are disabled on gateway ClusterXL Avg missing updates per request under 20 Database revision control will not be deleted [...]

Keep Reading

Security Updates: July 19, 2017

July 19, 2017

Check Point Secure Internal Communication (SIC) is established Fan speed is within normal levels System temperature is high CPU temperature is high Power supplies are healthy Free memory level is acceptable More than 50% of packets are taking medium path More than 50% of packets are taking slow path ICMP inspection is enabled  

Keep Reading

Check Point Firewall – Find Your Top 5 Rules Used on the CLI

July 15, 2017

An easy way to find out your top 5 used rules in R76 and above from the CLI (command-line interface) on your Check Point firewall is to type cpstat blades.  The command is not super intuitive, but it does produce results. [[email protected]:0]# cpstat blades |grep -A9 "Top Rule" Top Rule Hits ----------------------- |rule index|rule count| [...]

Keep Reading
OlderNewer