Kerry CorderoKISS IT Design Principle - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact
  • See all results
Home
Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Security

Security

Safeguarding Internal Networks from the DMZ

Imagine this common scenario: you are a network administrator, and you are tasked with creating a secure yet accessible environment...
Read More
Security

Migration Plan – Cisco Nexus SVIs to Palo Alto Firewalls

Step 1: Network Audit Begin with a thorough network audit. Document all VLANs and associated Switch Virtual Interfaces (SVIs) currently...
Read More
Security

Palo Alto – URL Filtering

URL Filtering, an essential component of Palo Alto firewalls, provides granular control over web access by categorizing URLs according to...
Read More
Security

Unraveling The Tactics of Storm-1359: An In-depth Look Into Sophisticated L7 DDoS Attacks

In recent times, the cybersecurity landscape has become more challenging than ever. Microsoft grappled with a series of Distributed Denial...
Read More
Security

CyberArk – Push and Pull Methods

The “push” and “pull” methods in CyberArk are primarily used for managing service accounts. However, they are not exclusive to...
Read More
Routing & SwitchingSecurity

Understanding PAC Files

PAC files, short for Proxy Auto-Configuration files, are critical in dictating how web traffic is directed through or around proxy...
Read More
Security

VLANs and Network Security: A Comprehensive Examination

VLANs are a common way to segment network traffic. While they can provide a degree of security by segregating traffic,...
Read More
Routing & SwitchingSecurity

DDOS L3, L4, & L7 Attacks: Understanding and Mitigating Threats

Network security remains a top priority for organizations worldwide, with threats manifesting across different layers of network architecture. Understanding the...
Read More
Security

CyberArk – applicationHost.config vs web.config

Both `applicationHost.config` and `web.config` can be used when managing IIS applications with CyberArk, and the choice between the two generally...
Read More
Security

Sonatype – Keeping Open Source Secure

Sonatype Nexus Lifecycle is a part of the Sonatype Nexus platform, a suite of tools designed to help automate open-source...
Read More
Load More

Categories

  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) API AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 F5-LTM HTTP(S) IP Addressing and Subnetting macOS Microsoft IIS Microsoft SQL Microsoft Windows OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare
© 2025 cordero.me • All Rights Reserved
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact

Categories

  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) API AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 F5-LTM HTTP(S) IP Addressing and Subnetting macOS Microsoft IIS Microsoft SQL Microsoft Windows OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows F5 Cisco
See all results