DNS name servers are usually split into two categories:...
Below is a great diagram showing security involvement within a company at the top. Please check out the post because...
Another fun topic, asymmetric routing. One thing to keep in mind when it comes to Palo Alto firewalls is that...
“The CPGs are a prioritized subset of IT and operational technology (OT) cybersecurity practices that critical infrastructure owners and operators...
Both `applicationHost.config` and `web.config` can be used when managing IIS applications with CyberArk, and the choice between the two generally...
Best Practices for Palo Alto Content Updates 1. Understanding Content Updates: • Content updates provide new application and threat signatures....
The first TCP Handshake will be allowed if you are using destination TCP/UDP port-based rules with APP-ID. The Palo will...