Author Avatar
21/08/2018

Vulnerability Assessment: How it helps your company's global security

When new security threats are discovered and referenced on the internet, malicious users receive this info as well. Affected IT environments are easy targets. This is were Vulnerability Assement...

Read More...
Author Avatar
17/08/2018

Phishing: 10 lifesaving tips to keep your mailbox secure

Here are ten life saving tips to distinguish a real e-mail from a phishing e-mail.

Read More...
Author Avatar
14/08/2018

SD-WAN : Did you believe me?

If you read my recent article about SD-WAN, did you believe Fortinet was the right solution for delivering Secure SD-WAN?

Read More...
Author Avatar
27/07/2018

SD-WAN : What and why?

Are you struggling with the price, performance and flexibility of traditional WAN? Then you may like SD-WAN!

Read More...
Author Avatar
20/07/2018

These are the apps companies block the most

Apps at work are on the rise. That's why some enterprises choose to block certain apps because they increase the risk of lost or stolen business data. The top 3 includes messaging, social...

Read More...
Author Avatar
28/06/2018

Backup, your last line of defense!

Everybody knows that backups are important. This article will tell you more about how secure you need to store and handle your backups.

Read More...
Author Avatar
20/06/2018

We all have vulnerabilities! But how to address them?

What is my most valuable data? Is it backed up? Is it protected? These are some questions you may have already asked yourself. But what about systems that process or store this data? Are they...

Read More...
Author Avatar
15/06/2018

Beware of the ROBOT

ROBOT, the Return Of Bleichenbacher's Oracle Threat, is a vulnerability that affects TLS cipher modes that use RSA encryption. It allows performing unauthorized operations with the private key of...

Read More...
Author Avatar
13/06/2018

Step 4: Start the journey to Micro-Segmentation

Micro-Segmentation you said? What is that?

Read More...
Author Avatar
28/05/2018

Step 3: The Journey to a Secure Environment

Step 3: Protect your Virtual Machines from the Hyper-Visor. In legacy server environments, we install anti-virus agents on the servers. These anti-virus agents need to be upgraded on a regular...

Read More...

Current job openings

Get our top stories in your inbox every month

Follow us

  

Share this article