Firewall Improvement Plan

Conquer Complexity

Don’t Get Comfortable: More Change is Coming

The year that changed everything, and how you’ll have to adapt in 2021 The pandemic will burn itself out eventually, but its effects will not. We’re different people now – we’re intimate with streaming catalogs and we’ve learned to knit, yodel, or speak Esperanto. And the way we do business is forever changed as well. …

Don’t Get Comfortable: More Change is Coming Read More »

4 Steps to a Clean Firewall

Firewall Security: Is a Secure, Firewall-less Network Possible? Perhaps, But Why Would You?

Just three years ago, technology headlines were rife with articles stating that the firewall was obsolete. And maybe that prophecy would have come true if we were stuck with the same old firewalls that could only perform simple packet filtering. But even as the way we define network perimeter evolves and blurs, firewalls maintain a …

Firewall Security: Is a Secure, Firewall-less Network Possible? Perhaps, But Why Would You? Read More »

COMPLIANCE & SECURITY MYTH #3: It’s Better To Block Than To Permit Access

This is part 3 of a 4-part series addressing compliance myths and what you need to know about uniting compliance and security in a hybrid environment. Read myth #2 here. One of the oldest security practices is to “just say no.” Businesses engaged in digital transformation can’t take that path. They have internal and external …

COMPLIANCE & SECURITY MYTH #3: It’s Better To Block Than To Permit Access Read More »

Myth #2: Compliance Is Only Urgent When There’s an Audit

Myth #2: Compliance Is Only Urgent When There’s an Audit

This is part 2 of a 4-part series addressing compliance myths and what you need to know about uniting compliance and security in a hybrid environment. Read part #1 here.  Many organizations have adopted a passive compliance playbook. Since they don’t know how to figure out what’s really on their hybrid networks, they do the …

Myth #2: Compliance Is Only Urgent When There’s an Audit Read More »

Firewall Cleanup in 4 Steps

Security Misconfigurations in the Pandemic – and What to Do About Them

Change has never been a friend of network security. Neither has complication. Right now, we have too much of both. The Covid-19 pandemic has resulted in an unprecedented shift to remote work, bringing an avalanche of new access requests, along with all the configuration complications they introduce. Threat actors have noticed, and attempts to cash …

Security Misconfigurations in the Pandemic – and What to Do About Them Read More »

Firewall Policy Basics – How to Verify Stealth Rules

Updated – January 2017   The firewall stealth rule is the explicit rule near the top of the policy denying access to the firewall beyond what is required to manage the device. It should be defined like: Source = ANY Destination = [self] Service / Application = ANY Action = DROP Logging = Enabled This …

Firewall Policy Basics – How to Verify Stealth Rules Read More »