Blog Posts Tagged with "DMZ"


Web Application Firewalls: There is No Spoon

July 12, 2012 Added by:Wendy Nather

I agree that some apps can't be remediated in a short time span, others can't ever be fixed, and so on - for those exigencies a WAF is better than nothing. However, I would caution anyone against deciding that the wave of the future is to rely on the WAF or other network-based security device for application security...

Comments  (1)


ICS-CERT: Longer Term Security Recommendations

June 27, 2012 Added by:Infosec Island Admin

Network segmentation involves separating one large network into smaller functional networks using firewalls, switches, and other similar devices. Effective segmentation restricts communication between networks and can lessen the extent to which a threat can move laterally through a network...

Comments  (0)


A Tribute to Our Oldest and Dearest Friend - The Firewall

April 22, 2012 Added by:Ian Tibble

We have a lot of bleeding edge software and hardware products in security backed by fierce marketing engines which set unrealistic expectations. Out of all these products, the oldest carries the highest bang for our bucks - the firewall...

Comments  (0)


Secure Networks: Remember the DMZ in 2012

April 17, 2012 Added by:Brent Huston

Recently, I have talked to two companies who have been hit by malicious activity that compromised a web application and gave the attacker complete control over a box sitting INSIDE their primary business network with essentially unfettered access to the environment...

Comments  (0)