Ronald Bartelshubandspoke.amastelek.com·Jan 17, 2025🧱🔥The Hidden Risk of Internet-Facing Firewall Management Interfaces🧨Firewalls are a cornerstone of modern business security, protecting networks from malicious threats and unauthorised access. However, when the management interfaces of firewalls such as Fortinet and Palo Alto are exposed to public Internet links, the...8 likesFirewalls
Ronald Bartelshubandspoke.amastelek.com·Jan 14, 2025🔥The Firewall Kernel Conundrum | A Decades-Old Vulnerability Hidden in Plain Sight🧱In the world of cybersecurity, firewalls are often heralded as the gatekeepers of network security. Yet, beneath their glossy marketing sheen lies a sobering truth: the very foundation of most commercial firewalls, their kernel, is a cobbled-together...3 likesFirewalls
Adesh Patilnetwork-shield.hashnode.dev·Jan 13, 2025Behind the Firewall: Unveiling the Basics of Network ProtectionWhen it comes to securing a Linux-based system, one of the key components that helps defend against unauthorized access is the firewall. In this blog, we’ll explore both the basics and advanced concepts of Linux firewalls to help you better understan...1 likeLinux
Ronald Bartelshubandspoke.amastelek.com·Jan 12, 2025🪖The Scam of SSL Inspection in Firewalls | A Band-Aid on a Bullet Wound 🩹SSL inspection, once heralded as the answer to encrypted threats, has become a costly, cumbersome, and ineffective patchwork solution that fails to address the core issues plaguing modern cybersecurity. Let's unravel the truth about SSL inspection, i...9 likes·37 readsSSL Inspection
Gabriel Gonzalezbeyondbaremetal.hashnode.dev·Dec 28, 2024Setting up the network for the Main OfficeIt’s time to set up the network for our main branch. Due to some limitations, the environment will be as follows: Firewall: Fortigate VM 7.6.1 (Evaluation license) Switching: There won’t be switches, we will use VMware workstation vNETs Virtualizatio...Beyond Bare Metal: Building an Enterprise Infrastructure from the Ground Upnetworking
Ronald Bartelshubandspoke.amastelek.com·Dec 26, 2024👻The Myth of the Perfect Firewall | Why Blind Faith in Perimeter Security is Dangerous 🧟♀️For many businesses, the firewall has become the ultimate security talisman. Once installed, it is often treated as a set-it-and-forget-it solution that will magically keep out the bad actors while allowing legitimate traffic through. This blind fait...5 likesDefense in Depth
Ronald Bartelshubandspoke.amastelek.com·Dec 26, 2024⛄The Abominable Firewall | A Common Threat Born of Neglect 🥶Firewalls are often regarded as the first line of defence in cybersecurity, serving as gatekeepers in a castle-and-moat architecture. However, far too many businesses unwittingly deploy what we’ll call “The Abominable Firewall.” Unlike its mythical n...3 likes·32 readsFirewallscybersecurity
Ronald Bartelshubandspoke.amastelek.com·Dec 24, 2024⚙️The Blind Spot in Business Cybersecurity | A Lack of Network Visibility 🤓In the modern business environment, cybersecurity threats are growing more sophisticated, with attackers exploiting any gaps in a company’s defences. While many organisations believe they are protected by deploying firewalls and monitoring traffic ru...3 likescybersecurity
Ronald Bartelshubandspoke.amastelek.com·Dec 19, 2024🧱🔥Simplifying Vulnerability Scanning Across Multiple DMZs on a Fortinet Firewall🚒In today’s complex network environments, businesses often use multiple DMZs to isolate different public-facing services for enhanced security. However, running vulnerability scans across these DMZs can become challenging, particularly when managing a...7 likesVulnerbility Scanning
Ronald Bartelshubandspoke.amastelek.com·Dec 17, 2024🔥Enhancing Network Efficiency & Security with Fusion's SD-WAN Elastic IP & CPE NAT Functionality🧯Modern businesses demand simplified, efficient, and secure network architectures. With SD-WAN gaining traction as the go-to solution for cloud connectivity and multi-site networks, managing IP addresses effectively has become critical—especially as p...1 likeElastic IP address