What is Assurance, Compliance and GRC and how Assurance and Compliance can be applied to NGFWs?

what is assurance in information security or cybersecurity? Assurance in information security or cybersecurity refers to the level of confidence in the effectiveness of security measures, policies, and procedures employed to protect an organization’s information systems and data. It involves evaluating and ensuring that the implemented security controls are working as intended to maintain theContinue reading “What is Assurance, Compliance and GRC and how Assurance and Compliance can be applied to NGFWs?”

What is the difference between Network, Cyber and Information Security?

Network security, cybersecurity, and information security are all related concepts, but they have slightly different meanings and scopes. Network security refers to the protection of computer networks from unauthorized access or attacks. It involves the use of various hardware and software technologies to secure networks and prevent intruders from gaining access to sensitive information. NetworkContinue reading “What is the difference between Network, Cyber and Information Security?”

ISE (Identity Services Engine) Basic Configuration and Commands

Cisco Switch Dot1x Config: Configuring Global AAA Parameters: conf tusername admin privilege 15 secret Cisco123aaa new-modelaaa authentication login default localaaa authentication dot1x default group radiusaaa authorization network default group radiusaaa accounting dot1x default start-stop group radius radius server Our-ISEaddress ipv4 192.168.1.105 auth-port 1812 acct-port 1813key Cisco123automate-tester username testuserexit aaa group server radius Our-Groupserver name Our-ISEexitContinue reading “ISE (Identity Services Engine) Basic Configuration and Commands”

Network Security (NetSec), Cyber Security(CyberSec/CyberOps) and Information Security(InfoSec)

Security Advisories: Palo Alto: https://securityadvisories.paloaltonetworks.comCisco: https://tools.cisco.com/security/center/publicationListing.x Cisco Talos Advisories: https://www.talosintelligence.com/vulnerability_reports Microsoft Advisories: https://www.talosintelligence.com/ms_advisory_archive/ms-2023Meraki: https://meraki.cisco.com/blog/cisco-meraki-customer-advisoriesFortinet: https://www.fortiguard.com/psirtCheckpoint: https://www.checkpoint.com/advisories/https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsecurityalerts=#severity=&type=Security+Alerts&product=&version=Juniper: https://kb.juniper.net/InfoCenter/index?page=content&channel=SECURITY_ADVISORIESCISA: https://www.cisa.gov/news-events/cybersecurity-advisoriesUS-CERT: https://www.us-cert.gov/ncas/current-activity EoL links:Cisco: https://www.cisco.com/c/en/us/products/security/asa-5500-series-next-generation-firewalls/eos-eol-notice-listing.htmlhttps://www.curvature.com/resources/cisco-end-of-life-guidePalo Alto: https://www.paloaltonetworks.com/services/support/end-of-life-announcements/end-of-life-summary https://www.paloaltonetworks.com/services/support/end-of-life-announcements/hardware-end-of-life-datesMeraki: https://documentation.meraki.com/zGeneral_Administration/Other_Topics/Product_End-of-Life_(EOL)_PoliciesCheckpoint: https://www.checkpoint.com/support-services/support-life-cycle-policy/ CVE (Common Vulnerabilities and Exposures) and CVSS (Common Vulnerability Scoring System):https://www.cvedetails.com/cvss-score-distribution.phphttps://nvd.nist.gov/vuln-metrics/cvsshttps://cve.mitre.org/ Important Organizations: Gartner Magic Quadrant: NGFWs, SD-WAN and SSE: Network security, cybersecurity, and information security are allContinue reading “Network Security (NetSec), Cyber Security(CyberSec/CyberOps) and Information Security(InfoSec)”