Hi Team,

One of the key tools that worked during WannaCry was Exploitable Port Filtering 
in the Operator’s networks. Two articles are just posted to help those 
Operators/ISPs/Carriers who have not yet deployed this type of filtering:

What are you doing to prepare for the next “scanning malware?”
https://www.linkedin.com/pulse/what-you-doing-prepare-next-scanning-malware-internet-barry-greene

Filtering Exploitable Ports and Minimizing Risk to and from Your Customers
http://www.senki.org/exploitable-port-filtering/

The later article will be updated over the next month. I’m working with a 
variety of operators to get their deployment experience documented. Please 
e-mail me if you have questions, comments, or suggestions. I would also welcome 
insight from anyone on MENOG who have deployed Exploitable Port Filtering in 
their networks.

Barry

Attachment: signature.asc
Description: Message signed with OpenPGP

_______________________________________________
Menog mailing list
[email protected]
http://lists.menog.org/mailman/listinfo/menog

Reply via email to