top of page
Blog: Blog2
Search
Reaper
Feb 22, 20221 min read
Script to automate (offline) firewall upgrades
The following script was created by o5e and since it addresses an issue encountered by many I thought I'd share it here (with permission...
648 views0 comments

Reaper
Jun 21, 20214 min read
Injecting MFA into any application
Some legacy applications may have weak security, or the adoption of the Zero Trust model may require security to be buttoned up on...
885 views0 comments

Reaper
Nov 14, 20203 min read
Make life easier with Application Filters
One of the harder tasks while maintaining a structured security rulebase, is determining which applications should or should not be...
1,706 views0 comments

Reaper
Oct 1, 20201 min read
What does "Require Tag/Description on policies" do to existing rules?
What does "Require Tag/Description on policies" do to existing rules?
205 views2 comments


Reaper
Jul 18, 20201 min read
Mark your calendars!
August 7 (or September 9 on Amazon) I'm actually launching a book! I've been thinking about writing a book for many years but never...
365 views0 comments
Reaper
Jun 29, 20201 min read
If you're using SAML, upgrade now!
Palo Alto just released a security advisory warning that there is a severe vulnerability in SAML implementations. The premise is that if...
121 views2 comments


Reaper
May 16, 20201 min read
What can make your visit even better?
We've been up for a few days now and we've already had quite a few visitors and a handful of new members, so let me first say: welcome to...
84 views0 comments
bottom of page