Whenever something awful happens in the world, both the good and the bad come to the surface: bad guys doing bad things like we saw in Boston last week, and good guys rushing to random people’s aid in the wake of the explosions.
FortiGate Cookbook – BYOD Scheduling (5.0)
In this video, you’re going to learn how to configure a scheduling policy to limit BYOD users and their devices’ access to the internet. Portable wireless de…
O-TTPS and You
At FortiGuard, we take our duty to protect our customers from threats, malware, zero-day exploits and other forms of cyberattacks very seriously.
APTs: One Layer Is Not Enough
One in five security professionals recently surveyed by ISACA say its organization has experienced an advanced persistent threat (APT) attack.
Email, Privacy and You… a Look Inside SB 467
For geeks like me, 1986 was a great year… IBM unveiled their “PC Convertible laptop”, the “first MS-DOS virus, Brain,” was released, and the “Electronic Communications Privacy Act of 1986 (ECPA)” was enacted. And, why is this so important? Because 27 years later, laptops, computer viruses and this piece of legislation all impact just about everyone in one way or another.
FortiGate Cookbook – Protecting a Web Server with DMZ
In this video, you’re going to learn how to configure a DMZ network to protect a public web server from unauthorized access. A DMZ Network (from the term ‘de…
Android malware gets phish-y
Last week the security world was abuzz with news of a new attack vector for mobile attacks.
UTM 9.006 Up2Date Released
Up2Date 9.006 is now available. In this update we have included a number of fixes and improvements.
06 – Power To Control Full Version
Terry Devine-King-Solar Storm.
Security 101: Two-Factor Authentication
Time and time again, the old methods of identifying who you are have fallen prey to various attacks and breaches. Simply having a login name and a password, even a strong password – one that doesn’t contain words from the dictionary, and consists of upper case letters, lower case letters, numbers, and special symbols like exclamation points, ampersands or other non-alphanumeric characters – is often no longer strong enough to prevent a breach. You could have an incredibly strong passwo…