Defense-in-Depth (DiD) and the Technology Blackholes

There are many parts to a Defense-in-Depth security model. I will cover two technologies that should be part of every security model. Firstly, the IP and DNS blackholes provide blocking for known malicious and known threats from outside your network based on their name or network address. Some commercial providers provide this type of service […]