info@punkinnovation.com 571-572-2160
TLS SAN v3 openssl

Create Your Own Self-Signed Trusted TLS SAN Certificates

Encryption is critical to safeguarding credentials and communication for client/server applications that use exposed service ports for functions such as APIs. Even in a Dev/Test environment, it’s advisable to protect these endpoints with encryption. Purchasing […]

Learn More

Enabling Windows Advanced Audit Logging

In the world of IT security, it is rarely advisable to use default settings for critical services, application and operating systems. Each use case should be evaluated for default settings and modify them accordingly to […]

Learn More

Limit the Exposure of Your ELK Stack Superuser Credentials

Issue Overview The Elastic Stack X-Pack module combines RBAC defined within Elasticsearch to provide authentication and authorization to the Kibana GUI for visualizing data. The relationship between the two products leads to a chicken/egg scenario […]

Learn More

Security for Southbound SDN Protocols: How Vulnerable is OpenFlow?

The traditional IP network is hard to manage and typically consists of a complex hierarchy of interconnected devices. Each individual device needs to be uniquely configured and separately managed, and is often times tied to […]

Learn More

Do You Really Need a Cybersecurity Risk Assessment?

A cyber breach means loss of revenue, not to mention credibility and private data. Mitigate risk and protect valuable data with a top-level evaluation of your company’s security risks. “Do we really need a formal […]

Learn More

What You Need to Know About Identifying, Managing & Preventing VM Sprawl

Learn how these “infrastructure vampires” can be negatively affecting your business – and what you can do to avoid it in the future. The term “VM sprawl” refers to the uncontrolled growth of virtual machines […]

Learn More

4 Questions to Consider for Cloud Deployment

Make a solid plan for the technical impacts of cloud-based enterprise systems. The cloud offers several strategic benefits, such as providing online access from anywhere, increasing infrastructure efficiency and allowing for very rapid changes. However, […]

Learn More

Packet Capture with SourceFire IDS/IPS

The SourceFire IDS/IPS 3D sensors have packet capturing capabilities that may not be as well documented as users might like. The ability to capture packets at the perimeter of your network can give valuable insight […]

Learn More

Top 6 Network Function Virtualization (NFV) Benefits for Enterprise Data Centers

NFV adds value and flexibility while reducing physical space and costs for data centers. Cloud adaptation and spending priorities continue to press enterprise data centers toward rethinking the viability of a traditional IT hardware-based model […]

Learn More

Detecting the SSH bug in your Arista Device

Symptoms: SSH connections to the IP address of the Management1 interface are immediately refused. Sometime the refusal can be due to the VTY connection count being maximized. After all, VTY 0 to 4 is only […]

Learn More
Wildcard SSL