Trojan Horse? Here Comes the Trojan Home

How many homeowners do you know who are Wi-Fi network specialists? Unless they work in technology, I’m willing to bet that your average apartment or condo complex contains very few experts. So when it comes to cybersecurity, very few residents will th… Continue reading Trojan Horse? Here Comes the Trojan Home

VLANs Streamline Network Connectivity and Increase Security

Network administrators now have a new tool in their arsenal as they work to increase network efficiency and minimize operational costs. Using virtual local area networks, or VLANs, network administrators can segment network traffic and layer intelligen… Continue reading VLANs Streamline Network Connectivity and Increase Security

Mixed VLAN tags and BPF syntax

By Richard Bejtlich, Principal Security Strategist, Corelight This post contains a warning and a solution for anyone using BPF syntax when filtering traffic for network security monitoring.  Introduction I have been writing material for the Zeek docume… Continue reading Mixed VLAN tags and BPF syntax

20 Critical Security Controls: Control 14 – Controlled Access Based on the Need to Know

Today, I will be going over Control 14 from version 7 of the CIS top 20 Critical Security Controls – Controlled Access Based on the Need to Know. I will go through the nine requirements and offer my thoughts on what I’ve found. Key Takeaway… Continue reading 20 Critical Security Controls: Control 14 – Controlled Access Based on the Need to Know

Sony Closes Backdoors in IP-Enabled Cameras

Backdoors, likely intentional remote administration features, were closed off in 80 different Sony IP-enabled cameras running the IPELA Engine technology. Continue reading Sony Closes Backdoors in IP-Enabled Cameras