Skip to main content

Posts

Featured

Control Access| Whitelist vs Blacklist

 As the cyberattack are becoming more and more sophisticated is harder and harder to keep up with the attack response. One of the most important ways to do it is by placing restrictions on what can or cannot access the network. One of the most effective ways to doing is by listing entities on the Firewall. Ether whitelisting which is a list of what is allow on the network, or black listing which is what is not allow. Let's see it a bit more in detail and compare a bit both.   Whitelist:   The whitelisting approach defines which access should be permitting according to a predefine list and it blocks anything else. It is based on the principle of zero trust , which means that by default it blocks everything unless it is proven to be acceptable. A good example of whitelisting is a firewalls just allowing certain IP addresses to access into a network.  Because Whitelisting denies by default any item that is not in the list, it is considered the stricter approach to access control. Mean

Latest posts

Data Breach | Resilence

Data Backup | The importance of a Backup Strategy

Third Party Firewall | installation GlassWIre

Magage your resources | Control Access

Protect your network | Intrusion Detection System(IDS)

Is your PC really protected? | Get the best from your Firewall

Keep your privacy and information online safe | Encryption

Keep your privacy and information online safe | Passwords

Facebook Hacked! | 553 million of Facebook users' personal data leaked on Hacker forum

Data Breach! Do we need to be cautious?

heitch@lab:~$ whoami