East west Palo Forescout
Does what Palo Alto offers for east west traffic offering the VM firewall compare to what forescout offers for a NAC solution
Collaborate Disseminate
Does what Palo Alto offers for east west traffic offering the VM firewall compare to what forescout offers for a NAC solution
So my stepson gets on the PS4 with WPS I disabled it changed password and while he’s still connected via WPS he asks PS4 what the wifi password is it gives it to him and he keeps changing his Mac address so I can’t block it a… Continue reading I think someone built a network behind mine
The question What information was stolen from JPL during the Raspberry Pi hack? refers to an event in recent news (e.g. Engadget’s A rogue Raspberry Pi helped hackers access NASA JPL systems) and references NASA’s Office of I… Continue reading Was the Raspberry Pi-related NASA JPL network breach primarily caused by the failure to keep an updated list of authorized devices?
I’m a junior penetration tester and recently went into the client’s office in order to test an internal server of theirs.
They gave me their laptop with Windows installed that is connected to the AD domain and the laptop had… Continue reading Setting up a virtual machine in a client’s environment
The Cloud Security Alliance (CSA) released a survey earlier this year that focuses on who should take responsibility for breaches in the cloud. It’s a good question. The advent of hybrid IT, among other things, has done much to destroy our traditional… Continue reading Who’s Responsible for a Cloud Breach? It Depends
The environment
Our company has a reasonable (from the point of view of a regular employee) security policy consisting of, among other things:
Sophos suite covering both local antivirus solution and Internet access screeni… Continue reading Extending on-premise security to a virtual machine used in Home Office environment
I just started my job as a penetration tester.
Me and my mentor got to the client’s office and our first order of business was to bypass the NAC system.
Searching for a printer or other similar devices was our first priority… Continue reading NAC bypass with MAC spoofing
Background:
Every PC, networking component (including printers), smart phones and possibly other electronic devices within my residence have been infected with malware, coupled with a hacker presence (occasionally) for 23 mo… Continue reading Determining Persistent Malware Location
We keep getting advice without really explaining why transferring to Software-defined perimeter is more beneficial even we use already NAC in the organization. I don’t understand the reasons for this advice and how it could b… Continue reading Should we stop using NAC for our BYOD deployment and switch to SDP?
Our school requires everyone to bring their own laptops for homework, etc.
It uses something called ‘Genian NAC’ to authenticate users.
I can either use Ethernet or Wi-Fi to connect, but both require a couple of programs to … Continue reading How dangerous is this Network?