avatarTeri Radichel

Summary

This context provides a collection of articles and resources on network security by Teri Radichel, focusing on various topics such as AWS security, cloud security architecture, and jobs in cybersecurity.

Abstract

The context presents a list of articles written by Teri Radichel, covering various aspects of network security. The articles discuss topics like the importance of network traffic in cybersecurity, network requirements vendors should provide, IDS and IPS in the cloud, Google Chrome DNS security bypass, and tips for improving home network security. Additionally, the articles offer insights into configuring PFSense and Netgate devices, understanding network logs, and mapping network attack paths. The context also includes resources on CDN security, QUIC and DNS over HTTPS, and network security devices' limitations in inspecting encrypted payloads.

Opinions

  • Teri Radichel emphasizes the importance of understanding network traffic in cybersecurity and the need for vendors to provide necessary network requirements.
  • The articles highlight the significance of IDS and IPS in the cloud and discuss Google Chrome's DNS security bypass, suggesting potential security risks.
  • The author provides practical tips for improving home network security, such as evaluating printer security features, limiting attack vectors, and reducing the blast radius of a printer compromise.
  • The context includes resources on configuring PFSense and Netgate devices, understanding network logs, and mapping network attack paths, offering valuable insights for network security professionals.
  • The articles discuss CDN security, QUIC and DNS over HTTPS, and limitations of network security devices in inspecting encrypted payloads, emphasizing the need for a comprehensive approach to network security.

Network Security

Blog posts, papers, and articles on Network Security by Teri Radichel

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

⚙️ Check out my series on Automating Cybersecurity Metrics. The Code.

🔒 Related Stories: AWS Security | Cloud Security Architecture

💻 Free Content on Jobs in Cybersecurity | ✉️ Sign up for the Email List

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Here are some of my posts on Network Security for those who are trying to improve the security of clouds, home networks, and offices.

The network requirements vendors should provide but most of the time they do not — ask for it so they improve.

IDS and IPS in the Cloud

Google Chrome DNS security bypass

Trying to set up a home network? Check out these posts:

Posts about PFSense and Netgate configuration.

Networking Basics — hexadecimal to binary to decimal, deciphering network packet headers, etc.

There are a number of network security and configuration posts in this series on automating cybersecurity metrics. I’m currently working through issues on AWS and have explained how to completely automate and deploy various network components. There’s an associated GitHub repository where you can download the code.

Fixing the GitHub prefix list when the API returns different results:

Some network issues may cause your AWS CLI to be out of date, among other things.

A vulnerability was announced that involves SSH and RSA. I addressed that vulnerability in these three posts.

You can find some other network related security posts here:

I also wrote this white paper: Packet Capture on AWS — before any cloud providers enabled or allowed packet capture. Azure was the first to introduce a solution followed by AWS and then GCP.

Follow for updates.

Teri Radichel | © 2nd Sight Lab 2022

About Teri Radichel:
~~~~~~~~~~~~~~~~~~~~
⭐️ Author: Cybersecurity Books
⭐️ Presentations: Presentations by Teri Radichel
⭐️ Recognition: SANS Award, AWS Security Hero, IANS Faculty
⭐️ Certifications: SANS ~ GSE 240
⭐️ Education: BA Business, Master of Software Engineering, Master of Infosec
⭐️ Company: Penetration Tests, Assessments, Phone Consulting ~ 2nd Sight Lab
Need Help With Cybersecurity, Cloud, or Application Security?
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
🔒 Request a penetration test or security assessment
🔒 Schedule a consulting call
🔒 Cybersecurity Speaker for Presentation
Follow for more stories like this:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 
❤️ Sign Up my Medium Email List
❤️ Twitter: @teriradichel
❤️ LinkedIn: https://www.linkedin.com/in/teriradichel
❤️ Mastodon: @teriradichel@infosec.exchange
❤️ Facebook: 2nd Sight Lab
❤️ YouTube: @2ndsightlab
Cybersecurity
Network Security
Networking
Home Network
Topics
Recommended from ReadMedium