Latest Posts

Gee Whiz Kids!

Gee Whiz Kids!

The value of a security scanning product can’t be “look how many things we flagged”. It needs to be “look at all the relevant things we flagged”. There are enough real issues without unnecessary false positives.

read more
Cisco owes me a sandwich!

Cisco owes me a sandwich!

The folks at Futuriom put up a piece with suggestions for Cisco as it struggles with who it was and who it wants to be. In that vein here is an anecdote from the early days of Cohesive Networks.

read more
Migrating to IPv6 – Managing the Madness (Pt. 1)

Migrating to IPv6 – Managing the Madness (Pt. 1)

As enterprises transition to IPv6, managing naming conventions becomes crucial. Devices require unique names for DNS and monitoring purposes. We’ll explore taxonomies for naming devices in production environments, including examples of technical, organizational, and asset management schemes. Stay tuned for Part 2: implementing IPv6 in your organization.

read more
ZTNA: Is it really the end of VPNs?

ZTNA: Is it really the end of VPNs?

While the Zero Trust Network Architecture (ZTNA) movement has been hailed as a game-changer for network security with many calling it the end of VPN. This blog post argues a combined approach that incorporates multiple security layers is key to securing the enterprise.

read more
Moving to IPv6 – herein lies madness (Part 2)

Moving to IPv6 – herein lies madness (Part 2)

For the enterprise, IPv6 is upon us. Here is how your network and application administrators can adapt. The are two Internets now. The IPv6 Internet is not related to the IPv4 Internet as you have configured it inside, outside, or at the edge of your Enterprise. IPv6 is not the next version of the Internet protocol; it is the next Internet.

read more