Latest posts

Verifying NAT Operation and Basic NAT Troubleshooting


Verifying NAT Operation and Basic NAT Troubleshooting Translations Download Print Updated:Dec 19, 2013Document ID:8605 Contents Introduction Prerequisites Requirements Components Used Conventions How to Rule Out NAT Sample Problem: Can Ping One Router But Not Another Problem Summary Sample Problem: Outside Network Devices Cannot Communicate with Inside Routers Problem Summary Troubleshooting Checklists Translation Not Installed in […]

A Cyber Security Chronicle

Cyber Security Chronicle

thanks to   In the opening scene of Hamlet, Bernardo is asked to identify himself by reciting a password before he can take over his castle post from Francisco: “Long live the king!”.1 This exchange, from Shakespeare’s prolific tragedy, is one of the most famous examples of passwords in literature. Historically, we have relied […]

Ransomware+: A New Shade of Evil


Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the system’s screen or by locking the users’ files unless a ransom is paid. More modern ransomware families, collectively categorized as crypto-ransomware, encrypt certain file types on infected systems and forces users to pay the ransom through […]

The Six Steps for a Successful Firewall Migration


The six steps to an effective firewall migration. Firewall technology longevity spans across a lifecycle of 5-7 years within the infrastructure; this duration is often dictated by growing security requirements within the organization, enhanced security feature requirements and more importantly firewall throughput performance. We believe that using a proven migration framework and methodology the process […]

Network Security Architecture Design

Cyber Security Chronicle, Network Security Architecture Design

Network Security Architecture Design As the first layer of defense in your network, it is important to take a step back and review the design of your perimeter security. To ensure a sound network security architecture design, you want to start with what ultimately must be protected and then design your perimeter security so it […]