Category: InfoSec

Route Origin Validation

Route Origin Validation is a security process used in internet routing to check if the organisation announcing a particular block of IP addresses is authorised to do so. It helps prevent accidental or malicious rerouting of data by verifying the legitimacy of route announcements. This process relies on a system where network owners register which…

DNSSEC Implementation

DNSSEC, or Domain Name System Security Extensions, is a set of security protocols added to the Domain Name System to protect users from certain types of cyber attacks. It works by digitally signing DNS data so that computers can verify it has not been tampered with during transmission. Implementing DNSSEC involves enabling these digital signatures…

VPN Split Tunneling

VPN split tunnelling is a feature that lets you choose which internet traffic goes through your VPN connection and which uses your regular internet. Instead of sending all data through the secure VPN, you can decide that only specific apps or websites use the VPN, while the rest connect directly. This helps balance privacy with…

Attribute-Based Access Control (ABAC)

Attribute-Based Access Control (ABAC) is a way of managing who can access information or resources based on specific characteristics, called attributes. These attributes can relate to the user, the resource, the action being taken, or the context, such as time or location. ABAC enables flexible and precise access rules that go beyond simple roles or…

Privileged Access Management

Privileged Access Management, or PAM, is a set of tools and practices used by organisations to control and monitor who can access important systems and sensitive information. It ensures that only authorised individuals have elevated permissions to perform critical tasks, such as changing system settings or accessing confidential data. By managing these special permissions, businesses…