QuickTip: Howto secure your Mikrotik/RouterOS Router and specially Winbox

I didn’t post anything about the multiple security problems in the Mikrotik Winbox API, as I thought that whoever is leaving the management of a router open to the Internet should not configure routers at all. Of course it is common sense to open the management interface only on internal network interfaces and to source […]

The post QuickTip: Howto secure your Mikrotik/RouterOS Router and specially Winbox first appeared on Robert Penz Blog.

October 6, 2018
Read More >>

New World, New Rules: Securing the Future State

I published an article today on the Oracle Cloud Security blog that takes a look at how approaches to information security must adapt to address the needs of the future state (of IT). For some organizations, it’s really the current state. But, I like t…

January 30, 2018
Read More >>

Hyperbole in Breach Reporting

While reading the news this morning about yet another successful data breach, I couldn’t help but wonder if the hyperbole used in reporting about data breaches is stifling our ability to educate key stakeholders on what they really need to know.

Today…

September 25, 2017
Read More >>

Virtual Directory as Database Security

I’ve written plenty of posts about the various use-cases for virtual directory technology over the years. But, I came across another today that I thought was pretty interesting.

Think about enterprise security from the viewpoint of the CISO. There are…

January 30, 2013
Read More >>