Network Security 15/February/2024 What is DoS? How to defend yourself? Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks represent a constant threat to global enterprises, with alarming numbers of incidents. In addition to the direct losses caused by the interruption of services, companies face a new form of attack: Ransom DDoS (RDDoS), where attackers demand payment to cease attacks
Network Security 15/June/2023 The importance of a good configuration of IPv6 rules in the firewall The importance of a good IPv6 firewall rule configuration is related to the need to protect an organization's network against potential vulnerabilities and attacks that may exploit the specific characteristics of the IPv6 protocol
Network Security 01/June/2023 Configuring SSH Certificate-Based Authentication Authentication via SSH certificates improves security and offers flexibility and scalability. While its implementation can be complex and not supported by all SSH clients, it is considered an improvement over key or password authentication
Network Security 15/February/2024 What is DoS? How to defend yourself? Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks represent a constant threat to global enterprises, with alarming numbers of incidents. In addition to the direct losses caused by the interruption of services, companies face a new form of attack: Ransom DDoS (RDDoS), where attackers demand payment to cease attacks
Network Security 15/June/2023 The importance of a good configuration of IPv6 rules in the firewall The importance of a good IPv6 firewall rule configuration is related to the need to protect an organization's network against potential vulnerabilities and attacks that may exploit the specific characteristics of the IPv6 protocol
Network Security 01/June/2023 Configuring SSH Certificate-Based Authentication Authentication via SSH certificates improves security and offers flexibility and scalability. While its implementation can be complex and not supported by all SSH clients, it is considered an improvement over key or password authentication