by John Breth | Jan 27, 2021 | IT Engineering, IT Operations, Network Engineering
A few weeks ago, I posted on Twitter about some fundamental commands/configurations that I feel all new network engineers should spend time on learning. As with most things on Twitter, if they get good engagement, I know there is interest for more information. So, I...
by John Breth | Jul 1, 2020 | Cybersecurity, IT Engineering, IT Operations
Today’s topic was requested on Twitter, to talk a little bit about how to build Cisco switchport trunks and specifically how to improve their security configurations. We’re going to take a look at how to configure them, what are some security best practices, and...
by John Breth | Sep 11, 2019 | Cybersecurity, IT Engineering, IT Operations
When it comes to building and securing a network, the most impactful thing that can be done is planning your network design in an efficient and protective manner. Understanding and implementing a segmented and layered architecture will establish a clear precedent for...
by John Breth | Jul 23, 2019 | Cybersecurity, InfoSec, IT Engineering
This is the first of a six-part series discussing five basic network security principles (The Fab Five) that when implemented properly can significantly improve the security posture of any IT environment. The reality is, no matter how simple something is, it...
by John Breth | May 14, 2019 | Cybersecurity, IT Engineering
I like to approach designing networks by starting with a solid foundation from the beginning. In my eyes, this mean utilizing network segmentation to its fullest. Intricate rule sets, host and network based protections, and real time threat detection all have their...