HackDig : Dig high-quality web security articles for hacker

Understanding the Evolution of Network Security

Network security has been around almost as long as we’ve had networks, and it is easy to trace the various elements of network security to the components of networking that they try to mitigate. Over the past 30-35 years or so, the expansion of networking, especially the increased reliance on the Internet both as an avenue for commerce and as the corporate b
Publish At:2017-03-30 14:10 | Read:811 | Comments:0 | Tags:Featured Articles IT Security and Data Protection DMZ networ

To Control Something

Some years ago I discussed the meaning of the term “control” in this post, but at the time I was mainly referring to the noun “control”. Given I’ll extensively use the term “control” as a verb in the next parts of “the DMZ series” and some upcoming talks I reflected a bit on its meaning (as a verb). In th
Publish At:2016-09-10 18:35 | Read:572 | Comments:0 | Tags:Uncategorized DMZ

Considerations on DMZ Design in 2016, Part 2: A Quick Digression on Reverse Proxies

This is the second part of a series with considerations on DMZ networks in 2016 (part 1 can be found here). Beforehand I had planned to cover classification & segmentation approaches in this one, but after my little rant on how “the business” might approach & think about reverse proxies in the first part, I felt tempted to elaborate a bit
Publish At:2016-09-09 06:05 | Read:666 | Comments:0 | Tags:Uncategorized DMZ

Considerations on DMZ Design in 2016, Part 1

I’m currently involved in a “DMZ Redesign” effort in a sufficiently large enterprise (800+ hosts in “the DMZ”) and I thought this might be an opportunity to reflect on some aspects of “DMZ networks” in a series of posts. Some of you already know that, at ERNW, we have a tendency to discuss stuff starting with some f
Publish At:2016-08-27 07:30 | Read:1031 | Comments:0 | Tags:Uncategorized Design DMZ


Share high-quality web security related articles with you:)


Tag Cloud