what is assurance in information security or cybersecurity? Assurance in information security or cybersecurity refers to the level of confidence in the effectiveness of security measures, policies, and procedures employed to protect an organization’s information systems and data. It involves evaluating and ensuring that the implemented security controls are working as intended to maintain theContinue reading “What is Assurance, Compliance and GRC and how Assurance and Compliance can be applied to NGFWs?”
Author Archives: Farzand Ali
What is the difference between Network, Cyber and Information Security?
Network security, cybersecurity, and information security are all related concepts, but they have slightly different meanings and scopes. Network security refers to the protection of computer networks from unauthorized access or attacks. It involves the use of various hardware and software technologies to secure networks and prevent intruders from gaining access to sensitive information. NetworkContinue reading “What is the difference between Network, Cyber and Information Security?”
ISE (Identity Services Engine) Basic Configuration and Commands
Cisco Switch Dot1x Config: Configuring Global AAA Parameters: conf tusername admin privilege 15 secret Cisco123aaa new-modelaaa authentication login default localaaa authentication dot1x default group radiusaaa authorization network default group radiusaaa accounting dot1x default start-stop group radius radius server Our-ISEaddress ipv4 192.168.1.105 auth-port 1812 acct-port 1813key Cisco123automate-tester username testuserexit aaa group server radius Our-Groupserver name Our-ISEexitContinue reading “ISE (Identity Services Engine) Basic Configuration and Commands”
Protected: Etherchannel L2 and L3
There is no excerpt because this is a protected post.
Protected: Subnetting and TCP/IP
There is no excerpt because this is a protected post.
Protected: Common Network Architectures
There is no excerpt because this is a protected post.
Network Security (NetSec), Cyber Security(CyberSec/CyberOps) and Information Security(InfoSec)
Security Advisories: Palo Alto: https://securityadvisories.paloaltonetworks.comCisco: https://tools.cisco.com/security/center/publicationListing.x Cisco Talos Advisories: https://www.talosintelligence.com/vulnerability_reports Microsoft Advisories: https://www.talosintelligence.com/ms_advisory_archive/ms-2023Meraki: https://meraki.cisco.com/blog/cisco-meraki-customer-advisoriesFortinet: https://www.fortiguard.com/psirtCheckpoint: https://www.checkpoint.com/advisories/https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsecurityalerts=#severity=&type=Security+Alerts&product=&version=Juniper: https://kb.juniper.net/InfoCenter/index?page=content&channel=SECURITY_ADVISORIESCISA: https://www.cisa.gov/news-events/cybersecurity-advisoriesUS-CERT: https://www.us-cert.gov/ncas/current-activity EoL links:Cisco: https://www.cisco.com/c/en/us/products/security/asa-5500-series-next-generation-firewalls/eos-eol-notice-listing.htmlhttps://www.curvature.com/resources/cisco-end-of-life-guidePalo Alto: https://www.paloaltonetworks.com/services/support/end-of-life-announcements/end-of-life-summary https://www.paloaltonetworks.com/services/support/end-of-life-announcements/hardware-end-of-life-datesMeraki: https://documentation.meraki.com/zGeneral_Administration/Other_Topics/Product_End-of-Life_(EOL)_PoliciesCheckpoint: https://www.checkpoint.com/support-services/support-life-cycle-policy/ CVE (Common Vulnerabilities and Exposures) and CVSS (Common Vulnerability Scoring System):https://www.cvedetails.com/cvss-score-distribution.phphttps://nvd.nist.gov/vuln-metrics/cvsshttps://cve.mitre.org/ Important Organizations: Gartner Magic Quadrant: NGFWs, SD-WAN and SSE: Network security, cybersecurity, and information security are allContinue reading “Network Security (NetSec), Cyber Security(CyberSec/CyberOps) and Information Security(InfoSec)”
HP Switches
HP ProCurve 2810 Switch Series – Restoring the Factory Default