Below is a great diagram showing security involvement within a company at the top. Please check out the post because...
JoinedMay 2, 2023
Articles647
20+ years of experience and proven performance in large scale enterprise network infrastructure architecture, design, implementation, migration, security, operation, troubleshooting, leading/managing teams, and budgets. I have a BS in Cybersecurity and a Master's from the University of Florida.
I’m hoping to post some examples in the near future but below is how you manipulate the traffic flow with...
Source:https://docs.microsoft.com/en-us/security/cybersecurity-reference-architecture/mcra...
Who’s responsible for tagging and identifying servers and ports in a large-scale network migration? It’s a common point of debate,...
The Software Development Life Cycle (SDLC) is a framework defining tasks performed at each step in the software development process....
Cost consideration is an essential aspect when designing and implementing network architecture. Here, we delve into the three primary components...
These are great to know no matter what, especially with what’s going on with what LAPSUS is showing us with...
SEC-NET = Secure Network LESS-NET = The Less Secure Network When it comes to setting up domain trusts between networks...
LLDP and CDP are both network discovery protocols, but they have some key differences: 1. Standardization and Vendor-Neutrality: LLDP is...