To check whether a given IT infrastructure is resilient, and its LAN security strong, first, we need to run audits and penetration tests. While performing these, we use various protection breaching techniques to access the company’s resources. One of the basic tests is an attempt to obtain as much information as possible at a local […]
A cyber security audit is often the first step to ensuring the security of your business, especially when most employees work remotely. An audit is the starting point for building a continuous safety improvement process in the company. The process starts with non-invasive testing of specific resources in the infrastructure and checking these against given […]
Many people wonder why good design and implementation of corporate LAN and Edge features is necessary. There are many answers to this simple question and among them, we require a good network to be least vulnerable to unwanted intrusions along with it to be able to support all our requirements. We have compiled a list that you […]
On 8th of October 2019 we hosted first event from the new series: Tech Meeting Series. The conference cycle is intended for IT departments, engineers and IT managers who want to follow latest technology trends, want to talk about the technology with others, share experience and look for solutions best suitable for their organizations.
Technology combined training. We are announcing the Cisco ISE & Internet Edge 4 Days accelerated workshop. This is one-time training & the only one in the market. This is combined training for those who want to improve Cisco ISE troubleshooting and configuration skills as well as get familiar with BGP routing for Enterprise WAN & […]
No matter the attack is original Petya worm or it’s modified version (already called NotPetya), the fact is that it hits biggest brands starting at Ukraine government, Chernobyl power station continuing with Raben, Maersk or St Gobain. So yes, it is disruptive. What we know so far and how we can try to prevent if […]
Latest threats like the already known WannCry ransomware show today, like never before, that organizations must concentrate more intensively on complementary approach to IT Security and that having obsolete solutions that were good a decade ago can bring tragic effects on brand image or even cause the bankruptcy of the biggest enterprises. Standard, legacy approach The […]
After we prove the CPU utilization can be easily increased by anyone anytime (as shown in the previous blog post, “Protect the Control Plane – part 1, trivial attack.”), I feel obliged to show how to quickly prevent the cause of potential network and services damage.
Hi, it is common situation, that ISE admins are not aware that the initial ISE GUI admin password expires after 45 days after installation. This is the default behavior of ISE. It is worth to be aware of this setting and to remember to uncheck the Administrator Password Expire .. in Password Lifetime section. You […]
How many of you use the control plane protection features given by the vendor with the benefit of inventory? From what I see mostly, it is a very rare practice to use CoPP. Most of the network engineers haven’t even heard of it. “Because my network performs well, why should I care about control plane […]