Notice – 10/06/2016

  • in Blog Posts
  • by
  • June 10, 2016
  • Comments Off on Notice – 10/06/2016

Dear Customers,    Some users may have experienced a brief period of intermittent connectivity to their services this morning due to a spike in server load for some IPs.    Affected IP addresses are:   117.120.5.46    Web Server Linux  117.120.5.51    Mail Server MAIL3.readyspace.com.sg|hk|co|ph 117.120.5.52    Mail Server MAIL4.readyspace.com.sg|hk|co|ph Continue Reading

Threat Intelligence Cyber Defense, Part 3 of 3

  • in Blog Posts
  • by
  • June 10, 2016
  • Comments Off on Threat Intelligence Cyber Defense, Part 3 of 3

In my last blog we discussed some high level defensive tactics we can take within each phase of the attack chain, once we understand the attacker’s attack methodologies, in order to build a more intelligent defensive posture.  (https://blog.fortinet.com/post/threat-intelligence-cyber-defense-part-2-of-3)Now in this final blog in this series, I will take a look Continue Reading

A Wrap up of HITB AMSTERDAM 2016 Conference

  • in Blog Posts
  • by
  • June 9, 2016
  • Comments Off on A Wrap up of HITB AMSTERDAM 2016 Conference

23 May 2016 marked the first day of the annual security conference organized by Hack In the Box. As usual, the event took place in Amsterdam, Netherlands. This year I had the privilege to attend. HITB is one of the top-notch technical conferences, where elite security researchers from around the Continue Reading

Weaving The Security Fabric Together: Fortinet Acquires AccelOps

  • in Blog Posts
  • by
  • June 9, 2016
  • Comments Off on Weaving The Security Fabric Together: Fortinet Acquires AccelOps

One of the biggest security challenges organizations face is being able to see enough of the network to identify today’s most advanced, multi-vector threats. Ideally, you need to be able to see across the distributed network, including cloud deployments and devices from multiple network and security vendors, correlate detected local Continue Reading

Supporting the transition to IPv6-only networking services for iOS

  • in Blog Posts
  • by
  • June 9, 2016
  • Comments Off on Supporting the transition to IPv6-only networking services for iOS

Early last month Apple announced that all apps submitted to the Apple Store June 1 forward would need to support IPv6-only networking as they transition to IPv6-only network services in iOS 9. Apple reports that “Most apps will not require any changes”, as these existing apps support IPv6 through Apple’s Continue Reading

On-Demand Polymorphic Code In Ransomware

  • in Blog Posts
  • by
  • June 9, 2016
  • Comments Off on On-Demand Polymorphic Code In Ransomware

Ransomware is now a common term not only in the security industry, but also in our day-to-day life. A new ransomware seems to pop up almost every given day. What we don’t normally see is how codes are implemented within these malware. Ransomware employs different techniques and attack vectors in order Continue Reading

Webuzo System Application Updated : OpenSSL (1.0.1t)

  • in Blog Posts
  • by
  • June 8, 2016
  • Comments Off on Webuzo System Application Updated : OpenSSL (1.0.1t)

Click install OpenSSL from the Webuzo Library. OpenSSL is a collaborative effort to develop a robust, commercial-grade, full-featured, and Open Source toolkit implementing the Security protocols as well as a full-strength general purpose cryptography library. We have also updated Apache, Apache2, Nginx, LIGHTTPD and Pure-FTPd with the latest of OpenSSL. Continue Reading

Fortinet Offers Carriers Practical Security Solutions for Today, with an Eye on Tomorrow

  • in Blog Posts
  • by
  • June 8, 2016
  • Comments Off on Fortinet Offers Carriers Practical Security Solutions for Today, with an Eye on Tomorrow

Change is definitely the operative word in the Carrier marketplace at the moment.  As new competitors have emerged, and user expectations for what is possible have expanded, there is a serious effort on the part of carriers to innovate and find opportunities to establish leadership in the delivery of new Continue Reading

Move over Healthcare, Ransomware Has Manufacturing In Its Sights

  • in Blog Posts
  • by
  • June 8, 2016
  • Comments Off on Move over Healthcare, Ransomware Has Manufacturing In Its Sights

Everyone has heard how ransomware shut down the networks of several large healthcare providers this past year. To get their systems unlocked, these organizations paid huge ransoms to cybercriminals. Healthcare networks are notoriously vulnerable, and have been tagged by the media and security professionals as the preferred target for these Continue Reading

Turning Network Security Inside Out

  • in Blog Posts
  • by
  • June 7, 2016
  • Comments Off on Turning Network Security Inside Out

Over the years, network security solutions and deployment has been built on the assumption that threats originate outside the enterprise network – trust was put in the internal network, while security was mostly deployed at the perimeter to provide protection from the outside threats and hackers. While security infrastructure has Continue Reading

Page 109 of 120« First...102030...107108109110111...120...Last »