Category: Tech Topics

Virtual Reality for Education

The education delivery mechanism is a constantly changing landscape and lately we are seeing more and more of virtual reality-based education and training. And it makes perfect sense. If you can show a third grader the surface of the moon, Saturn’s rings, and Mars’ moon, why would you want them to learn the same thing by reading about it? It’s a faster & better experience, can be interactive, and most importantly it’s a fun way to learn.

SASE Architecture

In 2019, Gartner published a report called “The Future of Network Security is in the Cloud”. In this report, Gartner introduced the Secure Access Service Edge (SASE) concept. The SASE concept includes an even wider set of security functionality than a SIG, and it includes the convergence of networking functionality as well. A SASE solution can secure the cloud, data center, and branch network edges and deliver a secure SD-WAN fabric across disparate connections.

Protect Your Network with Multi-Factor Authentication

90% of customers that I encounter today still use their LOCAL, RADIUS, or TACACS enabled username and password to protect their critical network infrastructure. What we’ll see in the remainder of this article is how easy it is to deploy Multi-Factor Authentication (MFA) to your existing infrastructure to protect your network devices.

Wireless Security: Threats, Origins, & Modern Solutions

Wireless security is key to any successful wireless network operation. There are many vulnerabilities that can exploit wireless networks for reconnaissance, compromise, degrade, or disable wireless access all together. Examples include Airsnarf attacks, rogue Access Points, honeypot & honeypotter tools, and Denial-of-Service (DoS) attacks like beacon flood, deauth flood, and some of the recent ones such as KRACK and FRAG attacks. See the Resources section for a detailed list of common attacks & signatures.