Ah, OAuth 2.0. The protocol that promised to end password reuse and save us from the deep, dark, insecure corners of the web. The one we thought would be the antidote to phishing. But guess what?
Continue readingHome LookingPoint Blog
Ah, OAuth 2.0. The protocol that promised to end password reuse and save us from the deep, dark, insecure corners of the web. The one we thought would be the antidote to phishing. But guess what?
Continue readingCisco Secure Access is a cloud-delivered Security Service Edge (SSE) solution built to secure your workforce, no matter where they’re working. Leveraging zero trust principles, it provides seamless and secure access to applications and data across any network. Designed for modern businesses, it streamlines security management while keeping threats...
Last year I wrote a blog about going passwordless (you can check it out here: https://www.lookingpoint.com/blog/passwordless). Now I’m doubling down and telling you that passwords are outdated. They’re reused, guessed, phished, and stolen. Despite password managers and multi-factor authentication (MFA), the underlying security model of passwords is inherently weak.
Continue readingHey there! The Cisco Catalyst 9800 Series Wireless LAN Controllers (WLCs) are pretty awesome, and one cool trick up their sleeve is the Always-On Tracing feature. It’s a total lifesaver for figuring out what’s going wrong in your wireless network. Let’s break it down quick—what it is, how it works, and why you’ll love it!
Continue readingEfficient network management is crucial for scaling and securing modern networks. Cisco Catalyst Center (formerly DNA Center) offers powerful tools for automating the deployment of device configurations using templates, composite templates, and Jinja2 scripting. In this guide, we will walk through creating and deploying templates, including interface configurations, NTP, SNMP, ACLs, and more, for...
Continue readingSometimes it happens, for some reason, you need to move your VMWare hosts to a new subnet. Let’s talk about what you might want to consider and how to make the process as smooth as possible.
Continue readingOSPF is mostly used between a Core switch and downstream OSPF enabled devices like distribution switches, firewalls, etc. If the downstream device is connected via link aggregation to a Nexus vPC pair and vPC peer-gateway is configured, you will encounter OSPF adjacency flaps. This will not be noticed unless the OSPF adjacencies are monitored or debugged, so most engineers are not even aware that...
Continue readingYou know how to whistle, don’t you? Just put your lips together and blow. Well installing WSL is nearly as easy and can up your efficiency and expand your toolset.
Continue readingAre passwords a thing of the past? Well to be honest, no not yet they aren’t, but there seems to be a widespread initiative to cram them into a time capsule, move into the future, and forget about them altogether. From post-it notes to password managers, to any of the other tools or tricks that people use to remember them, passwords are renowned for being a weak...
Continue readingIf you aren’t already using file checksums, why not? It’s a REALLY good idea for any file you download over the internet. It could also be a good idea for a file you may want to ensure stays unchanged on your own network. File checksums are a vital tool for ensuring the integrity and authenticity of files. They serve as digital fingerprints, allowing you to verify whether a file has been tampered...
Continue reading 
            
          Looking Point Inc. 2019