firewall
Holes found in majority of leading network firewalls
Firewalls are well understood as the main barriers between an organization’s internal and external networks. Over the past 25 years, they have become the foundation of …
Battling with manual firewall analysis
In a survey by Skybox Security, 42% of respondents had more than 100 firewalls to manage, and 67% said they have firewalls from multiple vendors. In fact, 54% said their firm …
IronBee versus ModSecurity
After spending a couple of weeks talking about IronBee to anyone willing to listen, I have assembled a list of commonly asked questions. Not unexpectedly, the question that …
Securing data centers from blended threats
Fortinet announced the addition of a new consolidated security appliance to its FortiGate product family, and a new release of its FortiOS 4.0 operating system for said …
IronBee: Creating an open source web application firewall
Qualys announced IronBee, a new open source project to provide the next-generation of web application firewall (WAF) technology. Led by the team who designed and built …
The security landscape from 2010 to 2011
Vendor-neutral testing and certification firm ICSA Labs offers its thoughts on the security landscape spanning 2010 and 2011. Mobile security 1. While most hackers heavily …
Web-based stealth attacks on network security will dominate 2011
Viruses will become more subtle and even harder to detect in 2011, and the primary line of attack will continue to be via the internet, according to Redscan. Malware is now …
Tool finds why specific firewall rules exist in enterprise networks
Athena Security released Firewall Rule Tracker, an asynchronous documentation solution for recording the reason why specific firewall rules exist in enterprise networks. While …
Featured news
Resources
Don't miss
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)
- Webinar: Amplifying SIEM with AI-driven NDR for IT/OT convergence
- How CISOs can elevate cybersecurity in boardroom discussions
- A humble proposal: The InfoSec CIA triad should be expanded