Webinar: Real DevSecOps for the security practitioner

While many companies have begun implementing DevOps into at least one, if not several departments, different approaches to DevOps have complicated the industry and have made many practitioners wonder if security will ever be able to keep up. In his…

Read More

Will It Scale? The Security Edition

Guest blog by Johna Johnson, CEO and founder, Nemertes Research Sometimes when you push a security solution too far outside its comfort zone, performance plummets. Or, worse: the system can end up crashing. Worst of all, it can misbehave while…

Read More

Security For the 99%

Guest blog by Johna Johnson, CEO and founder, Nemertes Research Over the last decade, the security space has shifted under our feet—there is a growing gap between cybercrime and skilled professionals able to combat it; finding security professionals who are…

Read More

File Integrity Monitoring Basics

Halo File Integrity Monitoring (FIM) has been available as a beta feature since February. While we have previously posted information for experienced FIM users, in this blog entry I would like to back up a bit and explain the basics of FIM….

Read More

Building a Firewall: Part 4

In the last blog post we worked on the TCP ports on this system.  From the output of the netstat program, we figured out how to convert those lines into firewall rules. We left UDP for last, not because it falls that…

Read More

Building a Firewall: Part 3

If you were given a computer and asked to build a firewall for it, how would you find the services and ports in the first place? To recap, in part 1 we covered what a firewall is and how it works with…

Read More

Building a firewall for the first time: Part 2

If you haven’t read part 1 of this series, now would be a good time to go back and read it.  In the previous blog we came up with a basic firewall design.  Now we’ll make that into a usable firewall and…

Read More