What is Radius Authentication Protocol?
As part of securing a network, access to your devices needs to be restricted and monitored. This includes direct access to routers, switches and servers but it can extend to allowing users to log on to particular services such as logging on to your ISP. It would be a tedious task if, for example, on every new router you added […]
Firewall Migration: 8 Steps Practical Guide
As a security consultant, in the last years I’ve been involved in a good amount of projects about network firewall migration. As technology evolves and performance increases, it is normal to decide not only for a hardware upgrade but for a complete migration to a different vendor that is a real challenge. Furthermore, the top […]
Network Security – Your eyes can deceive you; don’t trust them.
Network security can be tricky sometimes. You always want to follow best practices and ensure that those evil network hackers stay out of your beautiful network. But many times you find that those same tactics you’ve used for keeping out the Riff-Raff has also locked you out of your own devices. Network Security isn’t […]