2Cents about Cyber Security

Recent Posts

Luigi Vezzoso's Avatar'

New ICT infrastructure requires new security paradigm

The title of this post may appear trivial but….. I know many security “expert”, coming from the classic security architecture based on physical security, physical perimeter protection (firewalls, IPS/IDS, etc.) which continue to belive that only well defined boundary between security zones (LAN, DMZ, WAN, etc.) can protect your environment. The purpose of this post is to introduce some ideas ab...

The title of this post may appear trivial but….. I know many security “expert”, coming from the classic security architecture based on physical security, physical perimeter protection (firewalls, IPS/IDS, etc.) which continue to belive that only well defined boundary between security zones (LAN, ...

Luigi Vezzoso's Avatar'

EyePyramid: a great lecture from Matteo Flora

In the last days in Italy spreads the news about the Occhionero brother and syster illegal activities against a lot of key people for the national security. They have created a bot for spying the accounts and personal computer of those people. Matteo Flora a very professional security & forensic specialist make a nice video with a lecture of the judicial order. I suggest to take a look...

In the last days in Italy spreads the news about the Occhionero brother and syster illegal activities against a lot of key people for the national security. They have created a bot for spying the accounts and personal computer of those people. Matteo Flora a very professional security & ...

Luigi Vezzoso's Avatar'

Cybrary

A Hacker is recognized by the hungry of knowledge and the continue improvement so in this post I want share with you a good resource for learn the basics of pentesting: the Cybrary community https://www.cybrary.it In this website you can find a lots of CBT (Computer Based Training) realized by good trainers and members of the community. The level is usually basic but is a good starting point...

A Hacker is recognized by the hungry of knowledge and the continue improvement so in this post I want share with you a good resource for learn the basics of pentesting: the Cybrary community https://www.cybrary.it In this website you can find a lots of CBT (Computer Based Training) realized by ...

Luigi Vezzoso's Avatar'

Is the end of the DMZ as we know?

The 2016 was denoted by an increased usage of term as Software Defined Network (SDN), Cloud Architecture, etc….. As a network security guy I always trust to hardware security solution like firewall, IPS, etc. between well defined zones (LAN/TRUST-NETWORK, WAN/UNTRUST-NETWORK, DMZ). So, the first advise to my clients was always to separate those zone introducing a firewall and or an IPS in fr...

The 2016 was denoted by an increased usage of term as Software Defined Network (SDN), Cloud Architecture, etc….. As a network security guy I always trust to hardware security solution like firewall, IPS, etc. between well defined zones (LAN/TRUST-NETWORK, WAN/UNTRUST-NETWORK, DMZ). So, the firs...

Luigi Vezzoso's Avatar'

Migrating to Weebly Platform

Hi All, I have decided to move my personal blog (https://luigivezzoso.wordpress.com/) into the Weebly platform….. I think it require less time to be managed and so I can have more time to update the contents :-) Stay Tuned!! Luigi

Hi All, I have decided to move my personal blog (https://luigivezzoso.wordpress.com/) into the Weebly platform….. I think it require less time to be managed and so I can have more time to update the contents :-) Stay Tuned!! Luigi