Zero Trust Security

VPN virtual private network conncetion concept. Lan cable and a router with different flags.

What is the Zero Trust security model? The zero trust security model is a security strategy that assumes “there is no trust”. It requires the use of multiple layers of protection and defense. The goal is to reduce the number of points at which an attacker can enter a system and also reduce the amount … Read more

Zero-Day Exploit

What is a zero-day?
Zero-day is a term that means the time from when a vulnerability is discovered to the time when it is exploited.

A zero-day exploit occurs when an attacker exploits a vulnerability that has not been patched by the software vendor. The time period between discovery and exploitation is known as the ‘zero day’ window.

Cisco Identity Services Engine (ISE)

Know and control (ISE) Cisco ISE is a unified security platform that provides identity-aware network security. ISE provides a centralized management system for Cisco’s wired and wireless networking devices, as well as a single pane of glass for managing the entire network. ISE comes with an extensive set of features that help make it easier … Read more

IPSec VPN Tunnel Creation

IPSec VPN Tunnel Creation What is IPSec? IPsec (Internet Protocol, secure) is a group of protocols that are used together to set up encrypted connections between devices. How does IPsec work? IPsec connections include the following steps: Key exchange Keys are necessary for encryption; a key is a string of random characters that can be … Read more