Traffic shaping using PfSense in bridged mode

Scenario: We needed an in-line, transparent traffic shaping solution. The solution we chose was pfsense due to it's easy to use UI and effective QoS. The PfSense had to be placed in bridge mode, on a link that was carrying tagged traffic. It is important that the PfSense did not touch the vlan tagging, it … Continue reading Traffic shaping using PfSense in bridged mode

Assume that you’ve been hacked…

That’s the title of this recent Forbes.com article. Many, especially management, would ask “where is the hard evidence that our company is hacked? Why should I implement all this security if I’m not being hacked?”. The problem with today’s security landscape is that such hard evidence is difficult to provide before actual security systems are … Continue reading Assume that you’ve been hacked…