Kerry CorderoKISS Design - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Links
Home
Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Security

Security

Cross-Sector Cybersecurity Performance Goals Checklist

“The CPGs are a prioritized subset of IT and operational technology (OT) cybersecurity practices that critical infrastructure owners and operators...
Read More
Security

Okta HealthInsight Tasks and Recommendations

HealthInsight provides the following security tasks to improve security for an org. Security Task Why is this recommended? Security Impact...
Read More
CloudRouting & SwitchingSecurity

Akamai Prolexic Routed DDOS Protection

So what is Akamai prolexic routed DDOS protection? Prolexic Routed is a simple and effective approach for businesses to secure...
Read More
Security

Palo Alto How and When APP-ID Works

The first TCP Handshake will be allowed if you are using destination TCP/UDP port-based rules with APP-ID. The Palo will...
Read More
Security

High Level Security Involvement at the Top

Below is a great diagram showing security involvement within a company at the top. Please check out the post because...
Read More
CloudSecurityServers

SAML

I hope this post help clarify how SAML works. SAML is everywhere nowadays, which means it’s used a lot for...
Read More
Security

Palo Alto Global Protect Client Software Not Upgrading

If you are trying to upgrade your Palo Alto GlobalProtect APP and notice it’s not getting upgraded, a good place...
Read More
Routing & SwitchingSecurity

VLANs and Access Control

I’m writing this post because I’ve been in many environments where a VLAN is brought up as if it’s securing...
Read More
SecurityServers

Microsoft Recommended Block Rules

From Microsoft:...
Read More
CloudCodeData CenterLaptops & DesktopsLoad BalancingRouting & SwitchingSecurityServersVOIPWireless

IT – COST CAPEX OPEX TCO

COST: The cost is frequently a significant restriction in projects when it comes to network architecture. If we look at...
Read More
Load More

Categories

  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

AWS Azure Best Practices BGP Certificates CISA Cisco Cisco ACI Cisco ACS Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack Cisco Wireless DDOS Design DNS EIGRP F5 HP IP Sla Kali Logging macOS Microsoft IIS Microsoft Windows Netflow Okta OSPF Packet Capture Palo Alto Palo Alto CLI PDF Ports PowerShell QOS snmp Splunk SSL Structured Cabling Troubleshooting VMWare
Copyright © 2022 Kerry Cordero
  • Home
  • About
  • Disclaimer
  • Links

Categories

  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

AWS Azure Best Practices BGP Certificates CISA Cisco Cisco ACI Cisco ACS Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack Cisco Wireless DDOS Design DNS EIGRP F5 HP IP Sla Kali Logging macOS Microsoft IIS Microsoft Windows Netflow Okta OSPF Packet Capture Palo Alto Palo Alto CLI PDF Ports PowerShell QOS snmp Splunk SSL Structured Cabling Troubleshooting VMWare
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows Cisco ASA PDF
See all results