For a long time, IPSec was the only standard for IP encryption. In the meantime, there are established alternatives such as WireGuard. Other de facto…

Read more

What is evaluated by FIPS, what is evaluated by Common Criteria, what is evaluated by NIAP, and what does a Security Assessment provide? What is a…

Read more

Technical vulnerability management is an important element of risk management in IT. It is part of the controls in Annex A of ISO 27001. However,…

Read more

VXLAN and EVPN are technologies that are gaining traction. However, few people know exactly what they offer, where their use effectively brings…

Read more

Automation can increase efficiency and reduce the number of random errors. However, not everything is as simple as it seems at first glance. How best…

Read more

A Q&A session with Ivan Pepelnjak.

Read more

(Almost) everything today is software-defined, at least in the vendors' marketing materials. And everyone understands something different about it.…

Read more

If you believe the vendors' advertising claims, all the problems relating to cloud - whether private, public or hybrid - have long been solved. What…

Read more

Data centers are in the midst of a paradigm shift. The goal is cost savings, increased efficiency and operational flexibility. However, without…

Read more