In this video, you’re going to learn how to use virtual IPs to configure port forwarding on a FortiGate unit.
The Honeywords Solution
It’s rare that a week goes by without headlines of data breaches or malware attacks – or the introduction of a solution to stop them in their tracks. The latter is increasingly important, thanks to a rash of exploits on LivingSocial, eHarmony, Sony and Evernote – all part of a long, growing list of high-profile targets. The latest, greatest remedy is what researchers at MIT and RSA have dubbed “honeywords” – a new way to deter hackers from leveraging data…
Tufin Talks ‘Magic’ in Network Security Abstraction
There’s no shortage of reports on the latest network security breaches. Each incident holds its own valuable security lesson but it’s beneficial to recognize the incremental successes paving the way to progress. That’s exactly what Reuven Harrison of Fortinet’s solution partner Tufin did in a blog published last week.
11MB for a simple conference program application?
As I was following the tweets of IEEE S&P, one of the top academic conferences on security, I saw they had created a special application for the people attending the conferences, with the agenda, paper abstracts and a few news. Figure 1. IEEE Security & Privacy Android application Curious, I downloaded the application for Android (air.org.computer.confprog.sp.apk) and ran it through my automated analysis scripts.
How to setup SSL VPN (Web & Tunnel mode) for remote access
This video shows how to setup SSL VPN on both FortiGate (v5.0.2) and client side so that user’s can access work/local network remotely. This video includes c…
What’s Next in Next-Gen Firewalls and Testing (3 Minute Video)
Advanced Targeted Attacks. Botnets
FortiGate Cookbook – IPsec VPN
In this video, you’re going to learn how to configure a secure IPsec VPN connection between two locations. With a FortiGate at each location, properly config…
Cutting Wires, Costs: A Look at Creating Wireless Efficiencies
Wireless network infrastructure – for anyone in business, it’s a necessary evil and, perhaps ironically, one that isn’t short on infrastructure. You need a controller and wireless routers or access points – lots of them – enabling wireless networks to join an existing wired network. You’ll have to invest in a site planner/survey tool, or risk incorrectly guessing where the APs should go
App Security Wins Move at Snail’s Pace
Of 200 enterprise security professionals recently surveyed by Enterprise Strategy Group, 79 percent report Web application security attacks in the past year. In a late April Network World blog on the topic, Jon Oltsik, a principal analyst at ESG, said the study also found thieves attacked Web application features and functions such as application authentication, configuration management, application authorization and session management. Oltsik says the good news is that there’s more em…
Patch Tuesday On the Way!
Another Patch Tuesday is upon us, and both Microsoft and Adobe have important patches that you should implement right away if you’re impacted. Adobe’s big patch fixes a ColdFusion exploit that allows an attacker to access files located on a server with ColdFusion installed.