Cyber Defense Advisors

Network Security

Blog posts, papers, and articles on Network Security by Teri Radichel

I’ve been writing about cloud security metrics automation in my latest series, but now I have to prepare for a cloud security class. I am teaching virtually now though I haven’t updated the website in a while. As always whatever is paying the bills takes precedence. Related to that I decided to update some of my networking and was trying to figure out where I left off in another series on home and small business network security.

When trying to find those posts, I decided to get my network blog posts together all in one place. I’ve written over 400 blog posts to date and not easy to find what I’m looking for. Maybe these will get more organized later but at least I can find where I left off. If you missed any of my prior posts on network security — check these out.

Cloud Security ~ Why Use a VPN?IoT Security ~ AWS 1-Click ButtonsHow a just-in-time VPN access might have helped in the case of the APT10 attacksHow network traffic got me into cybersecurityExponential increases in cyber risk from Internet exposureHigh-risk ports: The chink in your network armorDisabling IPv6 on a MacCDN Security WishlistQUIC and DNS over HTTPSAmazon DocumentDB Network Access — Why the VPC?Mapping Network Attack PathsSASE: Secure Access Service EdgeEasy DNS Change To Prevent AttacksScanners lead to scammersWhat is Packet Sniffing?SolarWinds Hack: RetrospectiveHome Network WiringZero Trust for Software UpdatesApple Macintosh Network TrafficOne Rule To Identify Network NoiseThe Network Logs You Might Not Need (GASP!)The Network Logs You NeedConcatenating IP Ranges And Other Firewall Rule Trickslog4j: The AftermathWatching the Network WatchersConsidering Where to Buy Network DevicesPFSense in Front of a UDM. Why?Domain Names Used by DevicesUbiquiti Dream Machine Pro ~ First ImpressionsHost-based Firewall to Validate Network FirewallAssessing Supply Chains ~ The PeoplePFSense in Front of a UDM. Why?

There are a number of network security and configuration posts in this series on automating cybersecurity metrics. I’m currently working through issues on AWS and have explained how to completely automate and deploy various network components. There’s an associated GitHub repository where you can download the code.

Automating Cybersecurity Metrics (ACM)

You can find some other network related security posts here:

Teri Radichel, Author at Secplicity – Security SimplifiedIndicators of RDP Brute Force Attacks – Secplicity – Security SimplifiedWhere in The World Is That Network Traffic Coming From? – Secplicity – Security SimplifiedPacket Capture on AWS ~ New Solutions to Old Problems – Secplicity – Security SimplifiedUsing Firewall Policies to Auto-Block Rogue Hosts on External Networks – Secplicity – Security SimplifiedAuto-Blocking Suspicious Hosts Found in Traffic Logs – Secplicity – Security SimplifiedHow to Automate Deployment of a WatchGuard Firebox Cloud on AWS – Secplicity – Security Simplified

I also wrote this white paper: Packet Capture on AWS — before any cloud providers enabled or allowed packet capture. Azure was the first to introduce a solution followed by AWS and then GCP.

https://medium.com/media/e798853f6bde5fdc1d44df0063cb14d9/href

Follow for updates.

Teri Radichel

If you liked this story please clap and follow:

******************************************************************

Medium: Teri Radichel or Email List: Teri Radichel
Twitter: @teriradichel or @2ndSightLab
Requests services via LinkedIn: Teri Radichel or IANS Research

******************************************************************

© 2nd Sight Lab 2022

____________________________________________

Author:

Cybersecurity for Executives in the Age of Cloud on Amazon

Need Cloud Security Training? 2nd Sight Lab Cloud Security Training

Is your cloud secure? Hire 2nd Sight Lab for a penetration test or security assessment.

Have a Cybersecurity or Cloud Security Question? Ask Teri Radichel by scheduling a call with IANS Research.

Cybersecurity & Cloud Security Resources by Teri Radichel: Cybersecurity and Cloud security classes, articles, white papers, presentations, and podcasts

Network Security was originally published in Cloud Security on Medium, where people are continuing the conversation by highlighting and responding to this story.