Ronald Bartelshubandspoke.amastelek.com·Sep 24, 2024🥊The Misleading Narrative of "Secure" SD-WAN provided by using Firewalls🤼I want to address a growing concern within our industry: the pervasive and misleading claim that SD-WAN solutions are inherently "secure" simply because they include a firewall. This is yet another example of Silicon Valley's questionable marketing t...Discussppt
Ronald Bartelshubandspoke.amastelek.com·Sep 20, 2024🧱Debunking the Firewall Vendor Myth | SD-WAN is Not Just "Branch Networking with IPSEC"🐢In recent years, a growing number of firewall vendors, particularly from Silicon Valley, have tried to rebrand their traditional products as SD-WAN solutions. They often advertise their offerings as being the perfect branch networking tool, wrapped i...Discussipsec
Ronald Bartelshubandspoke.amastelek.com·Sep 19, 2024💔Breaking the Misrepresentation | Netfilter as a Powerful On-Prem Firewall Solution💪There’s a common misconception in the IT and security industry that next-generation firewalls (NGFWs) from Silicon Valley vendors are the only viable option for securing on-premise environments. With big-budget marketing campaigns and flashy feature ...DiscussFirewalls
Ronald Bartelshubandspoke.amastelek.com·Sep 17, 2024🔐Designing a Secure Network | Moving Beyond Obscurity & Default Firewalls🔑When it comes to securing a network, one of the most common mistakes is believing that security by obscurity—the idea that hiding the workings of your network is an effective defense—is a sufficient strategy. Many firewalls are deployed using default...DiscussSecure Network
Ronald Bartelshubandspoke.amastelek.com·Sep 7, 2024🥷The Misguided View of Firewalls | How Cybersecurity Professionals Are Failing One of Their Key Defenses♨️In today's landscape of increasingly complex cyber threats, one fundamental tool is often overlooked, misunderstood, or outright maligned by many cybersecurity professionals: the firewall. Despite being one of the oldest and most essential components...DiscussFirewalls
Ronald Bartelshubandspoke.amastelek.com·Sep 6, 2024🍍Why Managed Service Providers Misconfigure Firewalls | A Critical Flaw in Security Design🍌In the realm of cybersecurity, there is one glaring oversight that seems to be increasingly prevalent among Managed Service Providers (MSPs): configuring customer firewalls using the WAN interface without the implementation of a separate management p...DiscussFirewalls
Cyberpashtocyberpashto.hashnode.dev·Sep 5, 2024Firewalls, Proxy Servers, Honeypots, and VPNsIn this article, we delve into the functionalities and importance of Firewalls, Proxy Servers, Honeypots, and VPNs in today’s digital age. By understanding these cybersecurity tools and implementing them effectively, individuals and organizations can...DiscussFirewalls, Proxy Servers, Honeypots, and VPNs
Ronald Bartelshubandspoke.amastelek.com·Aug 25, 2024🔬Beyond Site-to-Site VPNs | The True Power of SD-WAN 👨🔬In the world of network management, the need for flexibility, reliability, and efficiency has never been greater. As businesses grow and adopt multiple ISP lines or IPsec tunnels, the legacy networking architecture—relying on routers and firewalls—qu...DiscussFirewallsFirewalls
Ronald Bartelshubandspoke.amastelek.com·Aug 9, 2024🚨The Dangers of Sharing a Single Firewall Instance Across Multiple Business Customers Without Proper Partitioning🤯In the world of cybersecurity, one of the most alarming practices that IT Service Companies can engage in is sharing a single firewall instance across multiple business customers without implementing proper partitioning. This practice not only compro...DiscussFirewalls
Ronald Bartelshubandspoke.amastelek.com·Jul 24, 2024💊EDR | The Placebo Effect in Cybersecurity🚬Endpoint Detection and Response (EDR) solutions are often touted as the ultimate cybersecurity measure, with recommendations from industry analysts like Gartner pushing businesses to adopt these tools. However, the reality is that EDR is not a silver...DiscussRed Pill