What is a Human Firewall?
Human Firewalls are comprised of a group of people from your organization with a mission to detect scams such as ransomware or phishing attacks that sometimes bypass your computer security systems. These attacks need a...
Human Firewalls are comprised of a group of people from your organization with a mission to detect scams such as ransomware or phishing attacks that sometimes bypass your computer security systems. These attacks need a...
Port forwarding is a critical feature of any network firewall. The ability to provide a service to the Internet requires being able to forward ports from one interface of a firewall to another interface. Sometimes these services are on dedicated IP...
Back in 2017, I wrote about the pitfalls of Amazon Web Services' EC2 "t2" instance types, borne out of our own experience…since then they offered an "unlimited" option (to avoid the performance impacts but with an added cost) as well as new "t3"...
Facebook is frequently in the press, sometimes with data leaks and last October a possible $1.6 billion fine for violating GDPR compliance after a recent data breach. From an IT Engineering perspective, they have done some amazing things, which I’ll...
I've been working on Unix systems in one form or another for, um, let's just say three decades or so. When it was new to me, not a day went by when I didn't learn something I hadn't seen before. Often, I would learn several new things in a day. Now...
©2024