This video shows how to setup SSL VPN on both FortiGate (v5.0.2) and client side so that user’s can access work/local network remotely. This video includes c…
Twitter Adds 2FA
Yesterday Twitter announced that it has enabled two-factor authentication for users of their popular service. As we wrote in our Two-Factor Authentication Solution Brief earlier this year: the password as you know it is dead. As we continue to move into a world where literally everything we do touches the Internet in some fashion, companies owe it to their users and customers ways of ensuring they provide safe and secure methods of authentication
Fortinet Next Generation Firewall
Fortinet Next Generation Firewall.
FortiGate Cookbook – IPsec VPN
In this video, you’re going to learn how to configure a secure IPsec VPN connection between two locations. With a FortiGate at each location, properly config…
App Security Wins Move at Snail’s Pace
Of 200 enterprise security professionals recently surveyed by Enterprise Strategy Group, 79 percent report Web application security attacks in the past year. In a late April Network World blog on the topic, Jon Oltsik, a principal analyst at ESG, said the study also found thieves attacked Web application features and functions such as application authentication, configuration management, application authorization and session management. Oltsik says the good news is that there’s more em…
1,000 malicious Android samples per day
“Is mobile malware really an issue?” is probably among the most frequent questions my friends ask me regarding my work. I usually like to answer indirectly with a graph as below: Figure 1. Evolution of malicious Android samples.
Patch Tuesday On the Way!
Another Patch Tuesday is upon us, and both Microsoft and Adobe have important patches that you should implement right away if you’re impacted. Adobe’s big patch fixes a ColdFusion exploit that allows an attacker to access files located on a server with ColdFusion installed.
FortiOS 5.0 – Packet Capture Feature
Packet capture feature can be used to capture data packets in real time while they pass through the FortiGate.
FortiGate Cookbook – Redundant Internet Connections
In this video, you’re going to learn how to configure redundant internet connections from two ISPs on your FortiGate. Having two redundant internet connectio…
Network World’s Security Threat Landscape – May 2013
In this monthly video series focusing on the latest digital security threats, Keith Shaw and Fortinet’s Derek Manky discuss the recent Twitter hack on the Associated Press, the Spamhaus arrests and DNS amplification, and the latest Android hacks.