The Evolving Security Paradigm, Part 2

This post is part 2 of a two-part series that addresses the rapid changes in security paradigms. The change to security not only affects operation, it increases the level of complexity in security designs. The following post discusses the history of security paradigms and the challenges that arise from their change. Firewall Designs & the Read More → The post The Evolving Security Paradigm, Part 2 appeared first on Acunetix.
Read more

The Evolving Security Paradigm, Part 1 – History of Firewalls

This post is part 1 of a two-part series that addresses the rapid changes in security paradigms. Driven by the need to satisfy new requirements and keep pace with the digital world greatly impacts the level of security. The following post introduces the history of firewalling and security paradigms. Introduction Internet Protocol (IP) networks provide Read More → The post The Evolving Security Paradigm, Part 1 – History of Firewalls appeared first on Acunetix.
Read more

Changes to Network Architectures & The Security Tools required, Part 2

Part one in this two part series looked at the evolution of a network architecture and how it affects security. Here we will take a deeper look at the security tools needed to deal with these changes. The Firewall is not enough Firewalls in three-tier or leaf and spine designs are not lacking features; this Read More → The post Changes to Network Architectures & The Security Tools required, Part 2 appeared first on Acunetix.
Read more

Evolution of the Network Architecture & How It has Affected Security, Part 1

The History of Network Architecture The goal of any network and its underlying infrastructure is simple. It is to securely transport the end user’s traffic to support an application of some kind without any packet drops which may trigger application performance problems. Here a key point to consider is that the metrics engaged to achieve Read More → The post Evolution of the Network Architecture & How It has Affected Security, Part 1 appeared first on Acunetix.
Read more

Online Security: Application Security Testing – Part 2

Part 1 in this series looked at Online Security and the flawed protocols it lays upon. Online Security is complex and its underlying fabric was built without security in mind. Here we shall be exploring aspects of Application Security Testing. We live in a world of complicated application architecture compound with poor visibility leaving the Read More → The post Online Security: Application Security Testing – Part 2 appeared first on Acunetix.
Read more

Online Security: The Underlying Infrastructure – Part 1

Technology Revolutionized A plethora of valuable solutions now run on web-based applications. One could argue that web applications are the forefront of the world. More importantly, we must equip them with appropriate online security tools to barricade against the rising web vulnerabilities. With the right tool set at hand, any web site can shock-absorb known Read More → The post Online Security: The Underlying Infrastructure – Part 1 appeared first on Acunetix.
Read more