#NetworkAccessControl

2024-12-19

Hard week so far. 😓 Fighting with a firewall access rule conversion from Cisco to Check Point. The data is stored in a SQL database from which Cisco access rules are generated. Got the appropriate data now in a CSV file per firewall context (virtual firewall). Now the very hard work will start to convert into Check Point Management API usable data with Python.

#Cisco #CheckPoint #Firewall #NetworkAccessControl #Python

2024-12-17

@jos1264

Nice article! Can‘t agree more on all of them amd seen many of them in the wild:

📄 Default configurations of software and applications

⛔️ Improper separation of user/administrator privilege

🔎 Insufficient internal network monitoring

⚠️ Lack of network segmentation

🔄 Poor patch management

🔀 Bypass of system access controls

📱 Weak or misconfigured MFA methods

🎣 Lack of phishing-resistant MFA

🚫 Insufficient access control lists on network shares and services

🧼 Poor credential hygiene

👨🏼‍💻 Unrestricted Code Execution

#cybersecurity #NetworkAccessControl #patchmanagement #PrincipleOfLeastPriviledge #mfa #phishing #networksegmentation #networkmonitoring #hardening #codeexecution

2021-06-30

Preventing Criminals from Using Cloud Applications to Inject Chaos Into Work Environments - In 2020, cyber criminals used cloud applications, the cover of a pandemic, and a ... feedproxy.google.com/~r/securi #networkaccesscontrol #applicationsecurity #threatintelligence #identityandaccess #cloudsecurity #emailsecurity #datasecurity #remoteaccess #articles #ddos

heise online (inoffiziell)heiseonline@squeet.me
2020-10-12
Eine Marktstudie zeigt: Viele mittelständische Unternehmen sind weitgehend wehrlos gegenüber Angriffen auf ihr Netz.
Netzwerksicherheit? Fehlanzeige!
2019-09-25

Path To Threat Hunting Through Great Network Data – Brian Dye – ESW #155 - Path To Threat Hunting Through Great Network Data
The post Path To Threat Hunting Through Great Netw... more: feedproxy.google.com/~r/securi #enterprisesecurityweekly #networkaccesscontrol #networksecurity #vulnerabilities #ethicalhacking #threathunting #accesscontrol #ethicalhacker #threathunting #mattalderman #interview #briandye #exploits #hacking #jeffman #threats #nac

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst