<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Best Practices in Network Security</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Best Practices in Network Security</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/best-practices-in-network-security/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 08 May 2023 00:00:00 -0400</lastBuildDate><item><title>Process and Technical Vulnerabilities: 6 Key Takeaways from a Chemical Plant Disaster</title><link>https://www.sei.cmu.edu/blog/process-and-technical-vulnerabilities-6-key-takeaways-from-a-chemical-plant-disaster/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Weak processes can be as risky as technical vulnerabilities. This post describes how both of them worsened a cyber attack on a chemical plant.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Daniel Kambic</dc:creator><pubDate>Mon, 08 May 2023 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/process-and-technical-vulnerabilities-6-key-takeaways-from-a-chemical-plant-disaster/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Risk and Resilience Management</category><category>Operational Resilience</category><category>Resilience Management Model (RMM)</category><category>Cybersecurity</category><category>Cybersecurity Controls</category><category>Enterprise Risk and Resilience Management</category><category>Best Practices in Network Security</category><category>Critical Infrastructure Protection</category></item><item><title>DNS Over HTTPS: 3 Strategies for Enterprise Security Monitoring</title><link>https://www.sei.cmu.edu/blog/dns-over-https-3-strategies-for-enterprise-security-monitoring/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>DNS over HTTPS (DoH) can impair enterprise network visibility and security by bypassing traditional DNS monitoring and protections. In this post, I'll provide enterprise defenders three strategies for security monitoring of DoH.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Sean Hutchison</dc:creator><pubDate>Mon, 09 Aug 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/dns-over-https-3-strategies-for-enterprise-security-monitoring/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Traffic Analysis </category><category>Cybersecurity Engineering</category><category>Cybersecurity</category><category>Best Practices in Network Security</category></item><item><title>Pandemic Home Security for Your Enterprise</title><link>https://www.sei.cmu.edu/blog/pandemic-home-security-for-your-enterprise/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The COVID-19 pandemic has greatly increased remote work among enterprise employees. Home-network environments are not professionally managed, so they are an appealing target for attackers. In this post, we advise how to mitigate these risks to regain a security footing.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Phil Groce, Harry Caskey</dc:creator><pubDate>Mon, 25 Jan 2021 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/pandemic-home-security-for-your-enterprise/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Best Practices in Network Security</category></item><item><title>Remote Work: Vulnerabilities and Threats to the Enterprise</title><link>https://www.sei.cmu.edu/blog/remote-work-vulnerabilities-and-threats-to-the-enterprise/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>How has this change in the way we work altered our security posture? How has it changed our attack surface, and what should we be doing to defend it? In this blog post, I explore the answers to these questions.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Phil Groce</dc:creator><pubDate>Mon, 18 Jan 2021 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/remote-work-vulnerabilities-and-threats-to-the-enterprise/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Best Practices in Network Security</category></item><item><title>Cat and Mouse in the Age of .NET</title><link>https://www.sei.cmu.edu/blog/cat-and-mouse-age-net/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post explores evolving .NET threat landscape with challenges faced by red and blue teams and suggests ways to stay ahead of attackers.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Brandon Marzik</dc:creator><pubDate>Thu, 19 Nov 2020 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/cat-and-mouse-age-net/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>CERT/CC</category><category>Cybersecurity</category><category>Best Practices in Network Security</category></item><item><title>How to Protect Your High Value Assets</title><link>https://www.sei.cmu.edu/blog/how-to-protect-your-high-value-assets/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post will outline the background of the federal High Value Asset (HVA) Program, explain the resources available to guide the securing of high value assets, and discuss ways to apply these resources to your own assets.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Brian Benestelli, Emily Shawgo</dc:creator><pubDate>Mon, 26 Oct 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/how-to-protect-your-high-value-assets/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cybersecurity</category><category>Best Practices in Network Security</category></item><item><title>Network Segmentation: Concepts and Practices</title><link>https://www.sei.cmu.edu/blog/network-segmentation-concepts-and-practices/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In this blog post, we review the basics of network segmentation and describe how organizations should implement it as an ongoing process.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Daniel Kambic, Jason Fricke</dc:creator><pubDate>Mon, 19 Oct 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/network-segmentation-concepts-and-practices/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Best Practices in Network Security</category></item><item><title>Anti-Phishing Training: Is It Working? Is It Worth It?</title><link>https://www.sei.cmu.edu/blog/anti-phishing-training-is-it-working-is-it-worth-it/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Phishing attacks target human, rather than technical, vulnerabilities. Some organizations, companies, government agencies, educational institutions, and individuals put on blinders....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Petock</dc:creator><pubDate>Thu, 23 Jan 2020 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/anti-phishing-training-is-it-working-is-it-worth-it/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Insider Threat</category><category>Best Practices in Network Security</category></item><item><title>Could Blockchain Improve the Cybersecurity of Supply Chains?</title><link>https://www.sei.cmu.edu/blog/could-blockchain-improve-the-cybersecurity-of-supply-chains/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>A September 2018 report to the President, Assessing and Strengthening the Manufacturing and Defense Industrial Base and Supply Chain Resiliency of the United States, raised concerns about cybersecurity....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eliezer Kanal</dc:creator><pubDate>Mon, 04 Nov 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/could-blockchain-improve-the-cybersecurity-of-supply-chains/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Blockchain</category><category>Cybersecurity</category><category>Best Practices in Network Security</category></item><item><title>Mapping Cyber Hygiene to the NIST Cybersecurity Framework</title><link>https://www.sei.cmu.edu/blog/mapping-cyber-hygiene-to-the-nist-cybersecurity-framework/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In honor of Cybersecurity Awareness Month, I decided to put fingers to keys and share some basic practices that every organization should consider for their cyber hygiene initiatives....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Matthew Trevors</dc:creator><pubDate>Wed, 30 Oct 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/mapping-cyber-hygiene-to-the-nist-cybersecurity-framework/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Mission Assurance</category><category>Best Practices</category><category>Best Practices in Network Security</category></item><item><title>Managing the Risks of Ransomware</title><link>https://www.sei.cmu.edu/blog/managing-the-risks-of-ransomware/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Ransomware poses a growing threat to both businesses and government agencies. Though no strategy can fully eliminate these risks, this post provides recommendations....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David Tobar, Jason Fricke</dc:creator><pubDate>Fri, 11 Oct 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/managing-the-risks-of-ransomware/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Cyber Missions</category><category>Best Practices in Network Security</category><category>Situational Awareness</category></item><item><title>7 Guidelines for Being a TRUSTED Penetration Tester</title><link>https://www.sei.cmu.edu/blog/7-guidelines-for-being-a-trusted-penetration-tester/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The best way to learn is by doing. But when it comes to penetration testing, learners risk legal implications and bad habits if they don't follow ethical, safe procedures....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Karen Miller</dc:creator><pubDate>Tue, 17 Sep 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/7-guidelines-for-being-a-trusted-penetration-tester/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Best Practices in Network Security</category></item><item><title>Six Free Tools for Creating a Cyber Simulator</title><link>https://www.sei.cmu.edu/blog/six-free-tools-for-creating-a-cyber-simulator/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>It can be hard for developers of cybersecurity training to create realistic simulations and training exercises when trainees are operating in closed (often classified) environments with no ability to connect to the Internet....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Joseph Mayes</dc:creator><pubDate>Mon, 15 Apr 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/six-free-tools-for-creating-a-cyber-simulator/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cybersecurity</category><category>Cyber Missions</category><category>Best Practices in Network Security</category></item><item><title>Business Email Compromise: Operation Wire Wire and New Attack Vectors</title><link>https://www.sei.cmu.edu/blog/business-email-compromise-operation-wire-wire-and-new-attack-vectors/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In June 2018, Federal authorities announced a significant coordinated effort to disrupt business email compromise (BEC) schemes that are designed to intercept and hijack wire transfers from businesses and individuals....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Anne Connell</dc:creator><pubDate>Mon, 08 Apr 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/business-email-compromise-operation-wire-wire-and-new-attack-vectors/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Malware</category><category>Cyber Missions</category><category>Best Practices in Network Security</category><category>Social Engineering</category></item><item><title>How to Use Static Analysis to Enforce SEI CERT Coding Standards for IoT Applications</title><link>https://www.sei.cmu.edu/blog/how-to-use-static-analysis-to-enforce-sei-cert-coding-standards-for-iot-applications/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The Jeep hack, methods to hack ATMs, and even hacks to a casino's fish tank provide stark evidence of the risks associated with the Internet of Things (IoT)....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David Svoboda</dc:creator><pubDate>Mon, 01 Apr 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/how-to-use-static-analysis-to-enforce-sei-cert-coding-standards-for-iot-applications/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security-Related Requirements</category><category>Secure Coding</category><category>Cyber Risk and Resilience Management</category><category>Static Analysis</category><category>Cybersecurity</category><category>Secure Development</category><category>Cyber Missions</category><category>Best Practices in Network Security</category></item><item><title>Evaluating Threat-Modeling Methods for Cyber-Physical Systems</title><link>https://www.sei.cmu.edu/blog/evaluating-threat-modeling-methods-for-cyber-physical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Addressing cybersecurity for a complex system, especially for a cyber-physical system of systems (CPSoS), requires a strategic approach during the entire lifecycle of the system....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nataliya Shevchenko</dc:creator><pubDate>Mon, 04 Feb 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/evaluating-threat-modeling-methods-for-cyber-physical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security-Related Requirements</category><category>OCTAVE</category><category>Cyber Risk and Resilience Management</category><category>Network Situational Awareness</category><category>Enterprise Risk and Resilience Management</category><category>Cyber Missions</category><category>Threat Modeling </category><category>Best Practices in Network Security</category><category>Risk</category><category>Cyber-Physical Systems</category><category>Critical Infrastructure Protection</category></item><item><title>Threat Modeling: 12 Available Methods</title><link>https://www.sei.cmu.edu/blog/threat-modeling-12-available-methods/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Almost all software systems today face a variety of threats, and the number of threats grows as technology changes....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nataliya Shevchenko</dc:creator><pubDate>Mon, 03 Dec 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/threat-modeling-12-available-methods/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security-Related Requirements</category><category>OCTAVE</category><category>Cyber Risk and Resilience Management</category><category>Network Situational Awareness</category><category>Enterprise Risk and Resilience Management</category><category>Cyber Missions</category><category>Threat Modeling </category><category>Best Practices in Network Security</category><category>Risk</category><category>Cyber-Physical Systems</category><category>Critical Infrastructure Protection</category></item><item><title>IPV6 Adoption:  Is your ISP ready to support IPv6?</title><link>https://www.sei.cmu.edu/blog/ipv6-adoption-is-your-isp-ready-to-support-ipv6/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post examines best practices for transitioning to IPv6 and presents points to help determine if your current ISP can support IPv6 ambitions.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Joseph Mayes</dc:creator><pubDate>Mon, 22 Oct 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/ipv6-adoption-is-your-isp-ready-to-support-ipv6/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>IPV6</category><category>Cyber Missions</category><category>Best Practices in Network Security</category></item><item><title>Best Practices in Network Traffic Analysis: Three Perspectives</title><link>https://www.sei.cmu.edu/blog/best-practices-in-network-traffic-analysis-three-perspectives/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In July of this year, a major overseas shipping company had its U.S. operations disrupted by a ransomware attack, one of the latest attacks to disrupt the daily operation of a major, multi-national organization....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Angela Horneman, Timothy Shimeall, Timur Snoke</dc:creator><pubDate>Mon, 08 Oct 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/best-practices-in-network-traffic-analysis-three-perspectives/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Human-Machine Interactions</category><category>Cyber Missions</category><category>Best Practices in Network Security</category></item><item><title>Cybersecurity Architecture, Part 2: System Boundary and Boundary Protection</title><link>https://www.sei.cmu.edu/blog/cybersecurity-architecture-part-2-system-boundary-and-boundary-protection/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In Cybersecurity Architecture, Part 1: Cyber Resilience and Critical Service, we talked about the importance of identifying and prioritizing critical or high-value services and the assets and data that support them....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jason Fricke, Andrew Hoover</dc:creator><pubDate>Thu, 06 Sep 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/cybersecurity-architecture-part-2-system-boundary-and-boundary-protection/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Insider Threat</category><category>Best Practices in Network Security</category><category>Cybersecurity Controls</category></item></channel></rss>