For a long time, IPSec was the only standard for IP encryption. In the meantime, there are established alternatives such as WireGuard. Other de facto…
What is evaluated by FIPS, what is evaluated by Common Criteria, what is evaluated by NIAP, and what does a Security Assessment provide? What is a…
Technical vulnerability management is an important element of risk management in IT. It is part of the controls in Annex A of ISO 27001. However,…
VXLAN and EVPN are technologies that are gaining traction. However, few people know exactly what they offer, where their use effectively brings…
Automation can increase efficiency and reduce the number of random errors. However, not everything is as simple as it seems at first glance. How best…
A Q&A session with Ivan Pepelnjak.
(Almost) everything today is software-defined, at least in the vendors' marketing materials. And everyone understands something different about it.…
If you believe the vendors' advertising claims, all the problems relating to cloud - whether private, public or hybrid - have long been solved. What…
Data centers are in the midst of a paradigm shift. The goal is cost savings, increased efficiency and operational flexibility. However, without…
Our website uses cookies to provide you with the best possible online experience. If you continue to use our website, you agree to the use of cookies. You can find more information on our use of cookies in our privacy policy.