Over 45 thousand readers come back for our content every month!
Below, I’ve summarized the most common issues we see during FortiGate audits for customers and in everyday operations. In practice, configuration errors with this popular firewall rarely stem from a lack of knowledge of network protocols, but more often from a misunderstanding of the FortiOS philosophy and the differences between local configuration and the one […]
Network segmentation is one of those solutions that everyone knows in theory, but in practice… things can be a bit different. In many companies, it still operates as “partially implemented” or “we’ll do it someday.” However, well-designed segmentation is the first line of defense against the effects of incidents, infrastructure chaos, and unplanned downtime. By […]
Wondering how to plan IT security when there are hundreds of solutions, and you’re just a one-person IT department or a small team? You look at your own company infrastructure and think, “Where do I begin?” The problem is that security architecture isn’t a single tool or a single recipe. Rather, it’s a map of […]
Cisco is introducing intelligent switches (the Smart Switches series). This isn’t just the next step after the Catalyst 9200 and 9300. According to the manufacturer, it’s a completely new approach to designing enterprise networks. In this article, we’ll show how Smart Switches differ from traditional models and what this means for IT engineers and managers. […]
Imagine this scenario… You have Cisco 2960X switches in your network. It’s the middle of the week. Your company’s IT department is working on an important project. Suddenly – boom! – the network in a key branch goes down. Troubleshooting reveals: switch failure. You call manufacturer support… and are told: “We’re sorry, but this model […]
Modern public institutions rely on complex IT infrastructure to function. Hospitals, offices, and local government units all provide public services and store vast amounts of data. Therefore, implementing new IT infrastructure in the public sector must ensure the highest level of cybersecurity and business continuity. Meanwhile, cyberattacks on the public sector in Poland are becoming […]
If you work in IT or networks, you’ve probably heard of the ISO/OSI model. It may seem like theory for students, but in practice, it’s the foundation for understanding how network communications work. Even if we talk about TCP/IP every day, the ISO/OSI model is still your guide for designing and troubleshooting. In the 1980s, […]
Understanding IP addressing, network masks, and subnetting is essential for anyone working with computer networks. In this guide, we’ll cover the fundamentals of IP addresses, subnet masks, address ranges, and how to design efficient IP addressing plans. What is an IP address and network mask? Every IP device with an IP address operates inside a […]
Cyberthreats have long ceased to be a problem solely for the private sector. Hospitals, offices, and public institutions have all become targets of increasingly sophisticated attacks. From ransomware paralyzing hospitals to the encryption of documents in marshal’s offices, the consequences are not only costly but also threaten the daily functioning of citizens. NIS2 in the […]
In an era of ever-increasing phishing attacks, increasingly sophisticated identity theft methods, and new regulations such as NIS2, the question is no longer whether MFA is worth investing in, but rather whether my organization can afford to continue to rely on outdated authentication methods? In this interview with Marcin Majchrzak, Sales Director for Yubico in […]