Securing IoT and OT Devices with NAC
Networks have evolved significantly over time. They were once simply used to connect computers via switches (Layer 2). As the need arose for these computers to communicate across different networks, routers were introduced. To protect these systems from network-based threats, firewalls soon followed. As networks expanded to support more than just computers, securing IoT and […]
In Firewalls we Trust? – Part 2
What is defense in depth? In the previous article, I defined it as an approach to protection that involves layering a series of defense mechanisms to safeguard valuable data and information. Consider a factory setting: would the factory, receptionist, or factory workers allow anyone to walk in and roam freely? No, they wouldn’t, for reasons […]