Access management is a crucial function for every organization with an Internet connectionand it’s a lot harder these days. The explosion of remote workers and mobile devices has complicated and confused once-rudimentary access management functions, while the popularity of social media and other Web 2.0 sites have added a more challenging dimension to the work environment.
Tragic Spam
Whenever something awful happens in the world, both the good and the bad come to the surface: bad guys doing bad things like we saw in Boston last week, and good guys rushing to random people’s aid in the wake of the explosions.
FortiGate Cookbook – BYOD Scheduling (5.0)
In this video, you’re going to learn how to configure a scheduling policy to limit BYOD users and their devices’ access to the internet. Portable wireless de…
Android malware gets phish-y
Last week the security world was abuzz with news of a new attack vector for mobile attacks.
Spamhaus, Cyberbunker and the largest DDoS attack on Record
Botnet owners took a page out of Chef Emeril Legasse’s cookbook and ‘kicked it up a notch’ last week when they launched a massive Distributed Denial of Service (DDoS) attack on Internet spam fighter Spamhaus, content delivery provider CloudFlare and other Internet infrastructure providers. The Spamhaus Project provides blacklisting services to many ISPs and email servers around the world with the intent of stopping the billions of spam emails sent daily
Security 101: Two-Factor Authentication
Time and time again, the old methods of identifying who you are have fallen prey to various attacks and breaches. Simply having a login name and a password, even a strong password – one that doesn’t contain words from the dictionary, and consists of upper case letters, lower case letters, numbers, and special symbols like exclamation points, ampersands or other non-alphanumeric characters – is often no longer strong enough to prevent a breach. You could have an incredibly strong passwo…
Fortinet Customer Case Study: TWM Solicitors
Alan Barrett, Head of IT at TWM Solicitors.
DDoS: A Brief History
Distributed-denial-of-service (DDoS) attacks have been the tool of choice for cybercriminals since the dawn of the Internet. Why
05 – Power to Control Users
Artist: Terry Devine-King-Solar Storm.
Deloitte Survey Finds Breaches Across Industries
A mid-February 2013 Deloitte Tech Trends poll of 1,749 business executives found more than one in four report their organizations were the victims of at least one cyber attack in the past year. Nine percent report multiple breaches, and 17 percent say they are not confident their organizations could detect an attack