Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Networks

What is an SMB Port + Ports 445 and 139 Explained

The Server Message Block Protocol (SMB Protocol) is a client-server communication protocol used for sharing access to files, printers, serial ports, and data on a network. It can also carry transaction protocols for authenticated inter-process communication. In short, the SMB protocol is a way for computers to talk to each other. SMB works through a client-server approach, where a client makes specific requests and the server responds accordingly. This is known as a response-request protocol.

Explain how a Virtual Private Network (VPN) works

Global health events in 2020 have accelerated a trend. Office workers are working from home more frequently. This is great for many reasons. Companies can save money on office space. People are often more productive in the environment they’re most comfortable in, their homes. Rush hour can be mitigated with fewer cars on the road.

Calico Egress Gateway: Universal Firewall Integration for Kubernetes

New applications and workloads are constantly being added to Kubernetes clusters. Those same apps need to securely communicate with resources outside the cluster behind a firewall or other control point. Firewalls require a consistent IP, but routable IPs are a limited resource that can be quickly depleted if applied to every service.

Bad Plugin: It's What's On The Inside That Counts.

Recently we came across an interesting case that demonstrates just how important it is to monitor the behaviour of your network as even simple software components can be deceptive in nature. Our analysts were alerted to suspicious network activity originating from Microsoft Edge running on a Windows 10 machine. The browser in this instance was making a large number of web requests even though the machine was locked and not in use. There was one notable long running connection.

What is MIME in Network Security?

MIME (abbreviation for Multipurpose Internet Mail Extentions) is a worldwide standard introduced in 1991. In this article, we will discuss what it is and why it is important. As the technology introduces new ways to communicate and conduct business, our business operations become much more reliant on the data transfer and the Internet itself.

How important is network compliance for your remote work environment?

With a majority of the workforce now adopting a work-from-home routine, maintaining the normal functioning of your network and ensuring compliance with industry standards is not an easy job. When employees are working remotely, it is especially crucial to ensure network compliance with industry standards and internal policies to secure your network from cybersecurity breaches.

Cybersecurity use cases for better remote workforce management

In the new normal, if your business has chosen remote operations, this might attract malicious actors. Hackers prey on the remote workforce whose vulnerability has increased in multifold ways. While infrastructural concerns, such as working outside the corporate IT network and using home Wi-Fi are inevitable, other issues, including using personal devices and retaining privileges to access more than required business resources add to the magnitude of this vulnerability.

Calico Enterprise 3.0 - Global Network Security Center for Kubernetes

As our enterprise customers build out large, multi-cluster Kubernetes environments, they are encountering an entirely new set of security challenges, requiring solutions that operate at scale and can be deployed both on-premises and across multiple clouds.