Assume that you’ve been hacked…

That’s the title of this recent Forbes.com article. Many, especially management, would ask “where is the hard evidence that our company is hacked? Why should I implement all this security if I’m not being hacked?”. The problem with today’s security landscape is that such hard evidence is difficult to provide before actual security systems are … Continue reading Assume that you’ve been hacked…

Cisco Flexible Packet Matching

While reading for my CCNA security exam I ran across an interesting link from cisco (You have to admit, if you dig deep enough some of cisco’s documentation is excellent) http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6723/prod_white_paper0900aecd80633b0a.pdf It describes their Flexible Packet Matching (FPM) engine, available on certain routers and switches. To me this seems a fancy way of saying that … Continue reading Cisco Flexible Packet Matching