Cyber Chief Magazine: Strategies for protecting your data in the cloud Download Now
1 October, 2019 | Jeff Melnick

Basics of Cisco Router Configuration

To start up a new Cisco LAN switch, all you have to do is plug in the Ethernet cables and power on the switch. However, you need to perform some basic Cisco router configuration before the basic router will start routing packets. In particular, the router needs to be told what interfaces (and which...
21 February, 2019 | Jeff Melnick

Why Native Network Device Auditing Is Not Enough

In one of my previous blog posts, I shared the top issues that network device auditing can help you solve. Among them are controlling device configuration, detecting unauthorized actions and thwarting scanning threats. In short, I argue that to keep your network infrastructure secure and ensure...
29 January, 2019 | Jeff Melnick

Why Monitoring of Network Devices Is Critical for Network Security

A secure network infrastructure is critical for organizations, and that requires keeping close track of what’s going on with routers, switches and other network devices. You need to be able to quickly detect and investigate threats to your perimeter security, such as unauthorized changes to...
22 January, 2019 | Jeff Melnick

Network Security Devices You Need to Know About

Using the proper devices and solutions can help you defend your network. Here are the most common types of network security devices that can help you secure your network against external attacks: Firewall A firewall device is one of the first lines of defense in a network because it isolates one...
Show more articles