Source:https://docs.microsoft.com/en-us/security/cybersecurity-reference-architecture/mcra...
JoinedMay 2, 2023
Articles673
20+ years of experience and proven performance in large scale enterprise network infrastructure architecture, design, implementation, migration, security, operation, troubleshooting, leading/managing teams, and budgets. I have a BS in Cybersecurity and a Master's from the University of Florida.
Who’s responsible for tagging and identifying servers and ports in a large-scale network migration? It’s a common point of debate,...
The Software Development Life Cycle (SDLC) is a framework defining tasks performed at each step in the software development process....
Scenario: We have a subnet configured in the “Allowed prefixes,” a /16. You can’t change the size of a subnet...
CERT released a great tool to detect vulnerable Log4j applications. Source: https://github.com/CERTCC/CVE-2021-44228_scanner...
SEC-NET = Secure Network LESS-NET = The Less Secure Network When it comes to setting up domain trusts between networks...
LLDP and CDP are both network discovery protocols, but they have some key differences: 1. Standardization and Vendor-Neutrality: LLDP is...
When configuring health monitors for a web application, targeting the appropriate HTTP status codes is crucial to ensure that the...
Log4j is a serious issue we have today. Probably one of the most serious vulnerabilities of my time. It’s so...