Skip to main content

February 24, 2015

Encryption: The Solution to Corporate Breaches?

In the aftermath of recent breaches, the discussion has centered around encryption of data, more specifically, data at rest, when data resides in the ...

See Details

November 18, 2014

The Case for Automated Firewall Management

In my blog series on network segmentation, I discussed the need for segmentation, the Zero Trust and positive enforcement model, and why they are crit...

See Details

October 23, 2014


In my previous blog post, I discussed the importance of segmentation and network design. Moving along in the series brings us to micro-segmentation. T...

See Details

September 18, 2014

Your Network: An Asset or Liability?

The recent breaches at major retailers show that a network and Internet connectivity is not only an asset for an organization, but can also be a liabi...

See Details

September 16, 2014

Next Generation Network Design

In my previous blog post, I discussed the basic level of network segmentation. While segmentation creates separate compartments between different area...

See Details

September 03, 2014

Segmentation, Segmentation, Segmentation!

When designing a network from a security perspective, segmentation is the name of the game. Segmentation is the process of dividing a network into sub...

See Details

August 13, 2014

What Does a Risk Assessment Do For Your Organization?

The purpose of a risk assessment is two-fold: to identify the threats that an organization faces and to help determine how to best prioritize resource...

See Details

July 15, 2014

So Many Breaches…What’s Being Done?

It seems that every day we’re hearing news of a new vulnerability or breach that is compromising data. Will this ever end? Unfortunately, no – it’s th...

See Details

April 10, 2014

Heartbleed Bug: Vendor Compensating Controls

A critical vulnerability in OpenSSL (CVE-2014-0160) known as the Heartbleed Bug was recently disclosed, affecting servers running OpenSSL 1.0.1 throug...

See Details