Network SecurityCome on Firewall! Grow a cortex!Shel SharmaApril 7, 2014Attempts to block threats based on IP Addresses, port numbers, URLs and content signatures are not unlike making reptilian snap judgments.