{"id":1824,"date":"2026-04-02T08:30:00","date_gmt":"2026-04-02T13:30:00","guid":{"rendered":"https:\/\/packitforwarding.com\/?p=1824"},"modified":"2026-03-31T21:13:26","modified_gmt":"2026-04-01T02:13:26","slug":"but-it-works-in-the-lab","status":"publish","type":"post","link":"https:\/\/packitforwarding.com\/index.php\/2026\/04\/02\/but-it-works-in-the-lab\/","title":{"rendered":"But It Works in the Lab!"},"content":{"rendered":"\n<p>This post\/rant is a long time coming. Although it seems recently I&#8217;ve been running into the problem more and more often. I get a request from a customer to allowlist a new SaaS application that someone has purchased.<\/p>\n\n\n\n<p>The first struggle is usually getting any kind of documentation from the vendor as to what is needed for the software to run. It&#8217;s amazing how many vendors don&#8217;t have a simple network\/firewall requirements document for their application. Assuming they have one, the fun is still to come.<\/p>\n\n\n\n<p>So you finally have the document and start to review it. And there it is! Right in the first list of domains that need to be allowed unrestricted&#8230; *.s3.amazonaws.com. Or maybe it&#8217;s not that bad, maybe it&#8217;s *.digitalocean.com. Unfortunately, both are real-world examples I&#8217;ve seen just this year. Really though, I shouldn&#8217;t complain; at least with domains, I don&#8217;t have to allowlist wide swaths of shared IP address space. I&#8217;ve also recently seen SaaS requirements that include allowing all traffic to 3.0.0.0\/8. <\/p>\n\n\n\n<p>I think the root of the problem is two fold. First, no one is documenting their architecture well enough to create these documents. Secondly, developers have become used to microservice sprawl. During development they just make it work with whatever IP or DNS entries the cloud provider creates. It works in their testing where they have unfettered access to everything. By the time the application is put into production, there is a spiderweb of dependencies that may even span multiple cloud providers. What I would like to propose is that developers work to understand DNS and use it to simplify. <\/p>\n\n\n\n<p>Instead of l1d81ka.azureservices.net and myapp.s3.amazonaws.com, create CNAMES! These aliases are easy to setup and allow for some semblance of self-documentation if they&#8217;re named reasonably. Imagine a world where fancyappname.ai has CNAMEs like webfrontend.fancyappname.ai, microservice1.fancyappname.ai, logserv.fancyappname.ai, etc. This would be great for us in security because then we only have to worry about allowlisting a specific set of FQDNs. We won&#8217;t care what the IP addresses are and as such the SaaS vendor can flex their application to other IPs or clouds as needed without disruption.<\/p>\n\n\n\n<p>Now that I&#8217;m dreaming, let&#8217;s take it another step. I have seen a select few SaaS vendors (outside of the big guys like Microsoft) providing either a REST API or a extended dynamic list service that is constantly updated with their FQDNs or IP addresses. This can then be used as an object in most firewalls. The nice part about this is that the SaaS vendor can add or subtract things as needed without a scramble by customers.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Final Thoughts<\/h3>\n\n\n\n<p>The bottom line for me is that developers and SaaS vendors need to start thinking about the security implications of their application architecture. While most are securing their applications now, they&#8217;re not thinking about the security concerns of their customers. Perhaps they should consider having security professionals setup secure firewalled environments or even a ZTNA agent on the developers&#8217; network(s) so they know the headache. Unfortunately, I see more and more that developers are treated as &#8220;special&#8221; and have a lot of security controls removed because &#8220;they have to have it that way&#8221;. Security must become second nature.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Software developers and security engineers are often at odds. This needs to stop and I have some suggestions.<\/p>\n","protected":false},"author":1,"featured_media":1827,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[137,8],"tags":[89,138,392],"class_list":["post-1824","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-rant","tag-blog","tag-cybersecurity","tag-rant"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>But It Works in the Lab! -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/packitforwarding.com\/index.php\/2026\/04\/02\/but-it-works-in-the-lab\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"But It Works in the Lab! -\" \/>\n<meta property=\"og:description\" content=\"Software developers and security engineers are often at odds. This needs to stop and I have some suggestions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/packitforwarding.com\/index.php\/2026\/04\/02\/but-it-works-in-the-lab\/\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/packitforwarding\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/packitforwarding\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-02T13:30:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/03\/image.png?fit=1024%2C768&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ben Story\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/www.twitter.com\/ntwrk80\" \/>\n<meta name=\"twitter:site\" content=\"@ntwrk80\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ben Story\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2026\\\/04\\\/02\\\/but-it-works-in-the-lab\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2026\\\/04\\\/02\\\/but-it-works-in-the-lab\\\/\"},\"author\":{\"name\":\"Ben Story\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\"},\"headline\":\"But It Works in the Lab!\",\"datePublished\":\"2026-04-02T13:30:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2026\\\/04\\\/02\\\/but-it-works-in-the-lab\\\/\"},\"wordCount\":556,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\"},\"image\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2026\\\/04\\\/02\\\/but-it-works-in-the-lab\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/image.png?fit=1024%2C768&ssl=1\",\"keywords\":[\"blog\",\"cybersecurity\",\"Rant\"],\"articleSection\":[\"Cybersecurity\",\"rant\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2026\\\/04\\\/02\\\/but-it-works-in-the-lab\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2026\\\/04\\\/02\\\/but-it-works-in-the-lab\\\/\",\"url\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2026\\\/04\\\/02\\\/but-it-works-in-the-lab\\\/\",\"name\":\"But It Works in the Lab! -\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2026\\\/04\\\/02\\\/but-it-works-in-the-lab\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2026\\\/04\\\/02\\\/but-it-works-in-the-lab\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/image.png?fit=1024%2C768&ssl=1\",\"datePublished\":\"2026-04-02T13:30:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2026\\\/04\\\/02\\\/but-it-works-in-the-lab\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2026\\\/04\\\/02\\\/but-it-works-in-the-lab\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2026\\\/04\\\/02\\\/but-it-works-in-the-lab\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/image.png?fit=1024%2C768&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/image.png?fit=1024%2C768&ssl=1\",\"width\":1024,\"height\":768},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2026\\\/04\\\/02\\\/but-it-works-in-the-lab\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/packitforwarding.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"But It Works in the Lab!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#website\",\"url\":\"https:\\\/\\\/packitforwarding.com\\\/\",\"name\":\"\",\"description\":\"Paying it forward to the next generation of IT.\",\"publisher\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/packitforwarding.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\",\"name\":\"Ben Story\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\",\"width\":489,\"height\":250,\"caption\":\"Ben Story\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\"},\"description\":\"In the course of my career, I have had the pleasure of working in multiple verticals including Education, Logistics and Healthcare. Although I started as a systems administrator (aka server jockey), I am now firmly in the network engineering arena. Currently I am working for a multi-state hospital system.\",\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/packitforwarding\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/benstory\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/www.twitter.com\\\/ntwrk80\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"But It Works in the Lab! -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/packitforwarding.com\/index.php\/2026\/04\/02\/but-it-works-in-the-lab\/","og_locale":"en_US","og_type":"article","og_title":"But It Works in the Lab! -","og_description":"Software developers and security engineers are often at odds. This needs to stop and I have some suggestions.","og_url":"https:\/\/packitforwarding.com\/index.php\/2026\/04\/02\/but-it-works-in-the-lab\/","article_publisher":"https:\/\/www.facebook.com\/packitforwarding","article_author":"https:\/\/www.facebook.com\/packitforwarding","article_published_time":"2026-04-02T13:30:00+00:00","og_image":[{"width":1024,"height":768,"url":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/03\/image.png?fit=1024%2C768&ssl=1","type":"image\/png"}],"author":"Ben Story","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/www.twitter.com\/ntwrk80","twitter_site":"@ntwrk80","twitter_misc":{"Written by":"Ben Story","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/packitforwarding.com\/index.php\/2026\/04\/02\/but-it-works-in-the-lab\/#article","isPartOf":{"@id":"https:\/\/packitforwarding.com\/index.php\/2026\/04\/02\/but-it-works-in-the-lab\/"},"author":{"name":"Ben Story","@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8"},"headline":"But It Works in the Lab!","datePublished":"2026-04-02T13:30:00+00:00","mainEntityOfPage":{"@id":"https:\/\/packitforwarding.com\/index.php\/2026\/04\/02\/but-it-works-in-the-lab\/"},"wordCount":556,"commentCount":0,"publisher":{"@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8"},"image":{"@id":"https:\/\/packitforwarding.com\/index.php\/2026\/04\/02\/but-it-works-in-the-lab\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/03\/image.png?fit=1024%2C768&ssl=1","keywords":["blog","cybersecurity","Rant"],"articleSection":["Cybersecurity","rant"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/packitforwarding.com\/index.php\/2026\/04\/02\/but-it-works-in-the-lab\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/packitforwarding.com\/index.php\/2026\/04\/02\/but-it-works-in-the-lab\/","url":"https:\/\/packitforwarding.com\/index.php\/2026\/04\/02\/but-it-works-in-the-lab\/","name":"But It Works in the Lab! -","isPartOf":{"@id":"https:\/\/packitforwarding.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/packitforwarding.com\/index.php\/2026\/04\/02\/but-it-works-in-the-lab\/#primaryimage"},"image":{"@id":"https:\/\/packitforwarding.com\/index.php\/2026\/04\/02\/but-it-works-in-the-lab\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/03\/image.png?fit=1024%2C768&ssl=1","datePublished":"2026-04-02T13:30:00+00:00","breadcrumb":{"@id":"https:\/\/packitforwarding.com\/index.php\/2026\/04\/02\/but-it-works-in-the-lab\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/packitforwarding.com\/index.php\/2026\/04\/02\/but-it-works-in-the-lab\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/packitforwarding.com\/index.php\/2026\/04\/02\/but-it-works-in-the-lab\/#primaryimage","url":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/03\/image.png?fit=1024%2C768&ssl=1","contentUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/03\/image.png?fit=1024%2C768&ssl=1","width":1024,"height":768},{"@type":"BreadcrumbList","@id":"https:\/\/packitforwarding.com\/index.php\/2026\/04\/02\/but-it-works-in-the-lab\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/packitforwarding.com\/"},{"@type":"ListItem","position":2,"name":"But It Works in the Lab!"}]},{"@type":"WebSite","@id":"https:\/\/packitforwarding.com\/#website","url":"https:\/\/packitforwarding.com\/","name":"","description":"Paying it forward to the next generation of IT.","publisher":{"@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/packitforwarding.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8","name":"Ben Story","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1","url":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1","contentUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1","width":489,"height":250,"caption":"Ben Story"},"logo":{"@id":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1"},"description":"In the course of my career, I have had the pleasure of working in multiple verticals including Education, Logistics and Healthcare. Although I started as a systems administrator (aka server jockey), I am now firmly in the network engineering arena. Currently I am working for a multi-state hospital system.","sameAs":["https:\/\/www.facebook.com\/packitforwarding","https:\/\/www.linkedin.com\/in\/benstory","https:\/\/x.com\/https:\/\/www.twitter.com\/ntwrk80"]}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/03\/image.png?fit=1024%2C768&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pay9MD-tq","jetpack-related-posts":[{"id":906,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/09\/04\/another-week-another-new-debit-card\/","url_meta":{"origin":1824,"position":0},"title":"Another Week, Another New Debit Card","author":"Ben Story","date":"September 4, 2019","format":false,"excerpt":"Today in the mail I saw the all too familiar envelope from my bank's debit card issuer. No, my debit card isn't expired. As usual, it's been involved in yet another credit card processing breach. Again, as usual, my bank doesn't tell me where my card number was compromised. This\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"Credit cards peeking out of a jeans pocket.","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/09\/advertising-back-casual-164571.jpg?fit=640%2C426&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/09\/advertising-back-casual-164571.jpg?fit=640%2C426&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/09\/advertising-back-casual-164571.jpg?fit=640%2C426&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":1410,"url":"https:\/\/packitforwarding.com\/index.php\/2021\/02\/11\/trust-no-one\/","url_meta":{"origin":1824,"position":1},"title":"Trust No One?","author":"Ben Story","date":"February 11, 2021","format":false,"excerpt":"Solarwinds The last few months have been crazy when it comes to cybersecurity. It started with the SolarWinds Orion security breach. The software used by a vast majority of enterprise customers in the world was altered to include a malicious payload. This altered version was then disseminated to the world\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"woman with red light on face","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2021\/02\/pexels-photo-5473950.jpeg?fit=800%2C1200&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2021\/02\/pexels-photo-5473950.jpeg?fit=800%2C1200&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2021\/02\/pexels-photo-5473950.jpeg?fit=800%2C1200&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2021\/02\/pexels-photo-5473950.jpeg?fit=800%2C1200&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":1750,"url":"https:\/\/packitforwarding.com\/index.php\/2025\/07\/29\/southwest-airlines-customer-of-size-policy\/","url_meta":{"origin":1824,"position":2},"title":"Southwest Airlines Customer of Size Policy","author":"Ben Story","date":"July 29, 2025","format":false,"excerpt":"This won't be my usual blog post about something in IT. Instead, I want to bring attention to a change that has been announced at Southwest Airlines. Starting on January 27th, 2026, Southwest is changing to assigned seating. With this change, they are changing what had been the best policy\u2026","rel":"","context":"In &quot;rant&quot;","block_context":{"text":"rant","link":"https:\/\/packitforwarding.com\/index.php\/category\/rant\/"},"img":{"alt_text":"empty seats on airplane","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2025\/07\/pexels-photo-19799804.jpeg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2025\/07\/pexels-photo-19799804.jpeg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2025\/07\/pexels-photo-19799804.jpeg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2025\/07\/pexels-photo-19799804.jpeg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2025\/07\/pexels-photo-19799804.jpeg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":463,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/02\/28\/cisco-certified-network-associate-cyberops\/","url_meta":{"origin":1824,"position":3},"title":"Cisco Certified Network Associate &#8211; CyberOps","author":"Ben Story","date":"February 28, 2019","format":false,"excerpt":"Cisco's cybersecurity certification is the CCNA CyberOps. The certification is composed of two exams. The first exam is 210-250 SECFND: Understanding Cisco Cybersecurity Fundamentals. This exam sets the foundation for an engineer to understand the terminology and tools used by a Security Operations Center(SOC) engineer. The second half of the\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":536,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/20\/ccna-cyberops-secfnd-objective-6-3\/","url_meta":{"origin":1824,"position":4},"title":"CCNA CyberOps SECFND Objective 6.3","author":"Ben Story","date":"March 20, 2019","format":false,"excerpt":"Describe these web application attacks: SQL Injection, Command injections, Cross-site scriptingImplementing Cisco Cybersecurity Operations (210-255) SQL Injection SQL Injection attacks use vulnerabilities in applications, generally web based, to inject SQL commands. These commands could reveal data that the application would not normally show an unprivileged users. They can also be\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/06\/abstract-business-code-270348.jpg?fit=1200%2C645&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/06\/abstract-business-code-270348.jpg?fit=1200%2C645&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/06\/abstract-business-code-270348.jpg?fit=1200%2C645&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/06\/abstract-business-code-270348.jpg?fit=1200%2C645&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/06\/abstract-business-code-270348.jpg?fit=1200%2C645&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":752,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/08\/04\/ccna-cyberops-secops-objective-1-6\/","url_meta":{"origin":1824,"position":5},"title":"CCNA CyberOps SECOPS &#8211; Objective 1.6","author":"Ben Story","date":"August 4, 2019","format":false,"excerpt":"Compare and contrast three types of evidence Implementing Cisco Cybersecurity Operations (210-255) Best Evidence Traditionally this term refers to evidence that can be presented in court in its original form. With cybersecurity, most courts will also accept a digital copy if proper procedures are followed. Corroborating Evidence Evidence that supports\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/07\/disc-magnifying-glass-270318.jpg?fit=640%2C480&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/07\/disc-magnifying-glass-270318.jpg?fit=640%2C480&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/07\/disc-magnifying-glass-270318.jpg?fit=640%2C480&ssl=1&resize=525%2C300 1.5x"},"classes":[]}],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/posts\/1824","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/comments?post=1824"}],"version-history":[{"count":1,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/posts\/1824\/revisions"}],"predecessor-version":[{"id":1828,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/posts\/1824\/revisions\/1828"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/media\/1827"}],"wp:attachment":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/media?parent=1824"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/categories?post=1824"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/tags?post=1824"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}