Fred Avolio publishes a monthly e-column
dealing with current issues in the area of internetwork security. (To receive
monthly columns by e-mail, send e-mail from
here.)
He is a member of the advisory board of
LURHQ Corporation,
a managed security solutions provider, and writes for their customer newletter,
On the Radar.
He used to be a member of
WatchGuard Technologies, Inc.’s
LiveSecurity Advisory Council, and wrote columns
for their LiveSecurity Service. We republish them with WatchGuard’s
permission.
Smart Scanning.
From LURHQ’s On the RadarVolume 7.
Implementing an effective, continuous scanning program …
When the Worst Happens.
From LURHQ’s On the RadarVolume 2,
what to do when you’ve been
rooted.
Preparing for the Worst.
From LURHQ’s On the RadarVolume 1,
“… the main steps needed to put together an Incident Response Plan (IRP)
and a Computer Security Incident Response Team (CSIRT).”
Protecting the Home Office.
These seven “musts” will help extend protection to home users and road warriors.
The November 2003 “Just the Basics” column. (The last one! A collector’s item!!)
Debunking the Firewall Hype. “Application intelligence” is the latest buzz, but is it really new?
The September 2003 “Just the Basics” column.
The Firewall Physical, my
“Just the Basics” column, in the July 2003 Information Security Magazine
asks “How do you know if your firewall is ‘healthy’?”
Preparing for the Worst, a column Fred wrote for On the Radar.
Just the Basics, May 2003 in Information Security Magazine is entitled
“A Firewall for All Occasions,” kicking around which type might be just fine for your situation
(dogma not-withstanding).
My March Information Security Magazine“Just the Basics” column is entitled “Practical Patching,”
six steps to help decide when you must patch, and when it’s okay to wait.
Practical
Firewalling.
The virtual network perimeter has changed the rules of the game
for firewalls –and that means changing our tactics.
Using Your Firebox’s Optional Interface.
The title refers to the WatchGuard Firebox Firewall, but this
column is applicable to anyone who has or is thinking about setting up
a DMZ.
“Simmering Security”.
January 2002 “Just the Basics” column in Information
Security Magazine. Cutting through security clutter.
Your New Firebox:
Day 8
. Though the title is WatchGuard-centric, this
column deals with what every new firewall administrator should
do on the 8th day.
Introduction to WatchGuard’s SMTP Proxy.
Even if you don’t have a Firebox, you’ll learn why you really want an application
gateway (proxy) dealing with this stuff.
Secrets
of Security Policy Development Revealed!
At the risk of hurting my consulting business,
I reveal secrets heretofore known only to the “Arch Mages” of
Internet Security. (Please don’t tell.)
Before You Pull the Plug
. NetSec Letter #12, 13 September 2001. I wrote
this as a follow-on to my friend David Strom’s
Web Informant #258
, which discusses the human side of down-sizing.
In this, I look at this problem from a computer and network security
angle, and suggest some safeguards.
Foundations:
Cryptography 101
. Data and information residing on computers
and flowing over telephone and network connections are vulnerable
to theft, modification, and forgery. This article, aimed at
the neophyte, looks at a technique used to secure transmissions
over a network or to protect data files as they reside on a computer.
The technique is called cryptography .
When
Access Control Goes Bad
. NetSec Letter #10, 14 July 2001. Access control
and the May 2001 reported trade secret theft at Lucent Technologies.
PKI Qs and As
. As a follow-on to my June 2001 tutorial on
PKI for searchSecurity, I answered some leftover questions.
After the Storm
. A column I wrote for
Camelot’s
newsletter on the subject of cleaning up after
an inside attack. I use the
trade secret theft at Lucent Technologies
as a starting point.
Defense
in Depth
A WatchGuard column discussing what defense
in depth means and ways to achieve it.
Other
Solutions For Secure E-mail
. A look at an alternative product, A-Lock,
along with pointers to some other reviews of other products.
We’re just too tired of waiting for PKI, and PGP still causes grown
men to cry.
Remote
E-mail Access
. A searchSecurity.com column discussing various
ways to allow remote access to corporate e-mail for the telecommuter
and the road-warrior.