Denying the Deniers: Tackling DDoS Attacks

DDoS

The festive period is supposed to be a season of goodwill, but cyber-attackers were evidently not sharing that feeling this year. After a persistent DDoS attack on the UK academic computer network JANET earlier in December, cloud hosting company Linode was hit at the end of December by a DDoS attack, which led to service…Read More

Managing Security and Preventing Cyber Threats with NGFWs – New Prof Wool Whiteboard Video Lessons

NGFW

In these two new whiteboard lessons, Professor Wool provides technical tips for managing security policies on next generation firewalls alongside traditional firewalls. Whether your organization is looking to deploy a NGFW, or you were an early adopter, find out how to properly manage NGFWs and protect your business. Managing Your Security Policy in a Mixed…Read More

Security Lessons from CSI: Cyber

CSI-Cyber-Logo

Thanks to winter storm ‘Jonas’ I had some free time on my hands this weekend and I got to catch up on a recent episode of CSI: Cyber – the latest in the CSI franchise which follows the work of an elite team of FBI special agents investigating cyber-crime across the US. The episode, titled ‘Hack…Read More

Would You Like Your Data Back? It Will Only Cost $1,000 - Love, Ransomware

ransomware_image

Happy New Year! You wake up to find that your files have been encrypted by someone else. And now the only thing that is readable is an html file, informing you that for a fixed price you “may” receive the magic key to unencrypt those files. This is Ransomware – where someone encrypts your files…Read More

Why You Should Move Security Away from Security

Moving security operations away from your security team? This may sound counterintuitive, but it’s something that we see happening more and more. Escalating security requirements, the growing risks of breaches and outages, and the shortage of skilled and experienced security staff is forcing businesses to find new ways to make more efficient use of their…Read More

Managing Your Security Policy for Disaster Recovery

recovery and crisis directional sign

If a catastrophe hits, will your organization be able to properly function? How can you ensure that your security policy on your primary site and on your disaster recovery (DR) site are always in sync? In this new lesson from Professor Wool learn how to manage your security policy for disaster recovery. Setting this up…Read More

2015 in Review: Top 10 Blogs to Help Improve Your Security Posture

Top 10 blog

Since the beginning of the year is the time for summaries, resolutions and lists, we’ve put together a list of our most popular security blogs from the past year. These blogs cover a variety of tips, best practices and expert opinions, all to help you improve your security posture across your enterprises in 2016. So…Read More

Stay on Top of Your Security Game: Why Network Vulnerabilities Matter

Increase Security

Over the past couple of months both Cisco and Juniper have had major vulnerabilities in their operating systems that allowed for remote execution of code, access to networking and the ability to decrypt encrypted traffic. While incidents like these should not change network security fundamentals, as pointed out in a recent blog post on the…Read More

How to Avoid Business Outages from Misconfigured Network Devices

PF_Risk Analysis B

A single change to a network device can have a far reaching effect on your business. It can create security holes for cyber criminals, impact your regulatory audit, and even cause costly outages that can bring your business to a standstill – as we have recently seen in the news! Next Wednesday, January 13, join…Read More

Security Predictions for 2016: Software-Defined to Become Everything

Security Predictions

2015 has been a very eventful year in the world of security. As Matt Pascucci wrote in last week’s post, we’re now living in the golden age of security (thanks mostly to the numerous high-profile breaches hitting the headlines and affecting both companies and consumers alike).  So with this crazy year coming to an end,…Read More

The Juniper Vulnerability… the Plot for a Next "Mission Impossible" Movie?

mission_impossible

On Thursday, December 17, Juniper Networks announced that during an internal code review, they detected malicious code embedded in Netscreen ScreenOS firewalls, versions 6.2 and 6.3. The malicious code gives attackers backdoor access, allowing them to log into the Juniper device’s console with full administrative privileges, as well as enable the attacker to decrypt VPN…Read More

The State of Security: Reflections on 2015

It’s that time of year again – when we reflect on the events of the past year to assist us improve in the year to come. It’s been a wild 2015 for cyber security and we have a lot to learn from the year. With 2015 in the rear view mirror, let’s talk about how…Read More