Author Avatar
16/10/2018

ADVPN : Enjoy the shortcuts

IPSec VPN are common to secure connectivity between networks. However maintaining many of them can be cumbersome, so why not take shortcuts?

Read More...
Author Avatar
28/09/2018

How much SPAM is out there?

How much SPAM do we receive and how much SPAM receives everybody else? Let's find out.

Read More...
Author Avatar
19/09/2018

"Companies mainly focus on reputation, they forget about the financial damage or data loss"

Ethical Hacker Inti De Ceukelaire talks about the biggest threats in the next 5 years, the best tips for security staff, the chances of being hacked and what to do when you are (not yet?) hacked. 

Read More...
Author Avatar
05/09/2018

New Zero Day Local Privilege Escalation Vulnerability in Windows Task Scheduler

Microsoft acknowledged a new Zero Day vulnerability on Microsoft Windows Task Scheduler. Currently there is no workaround. That's why we show you how to reduce the risk. 

Read More...
Author Avatar
21/08/2018

Vulnerability Assessment: How it helps your company's global security

When new security threats are discovered and referenced on the internet, malicious users receive this info as well. Affected IT environments are easy targets. This is were Vulnerability Assement...

Read More...
Author Avatar
17/08/2018

Phishing: 10 lifesaving tips to keep your mailbox secure

Here are ten life saving tips to distinguish a real e-mail from a phishing e-mail.

Read More...
Author Avatar
14/08/2018

SD-WAN : Did you believe me?

If you read my recent article about SD-WAN, did you believe Fortinet was the right solution for delivering Secure SD-WAN?

Read More...
Author Avatar
27/07/2018

SD-WAN : What and why?

Are you struggling with the price, performance and flexibility of traditional WAN? Then you may like SD-WAN!

Read More...
Author Avatar
20/07/2018

These are the apps companies block the most

Apps at work are on the rise. That's why some enterprises choose to block certain apps because they increase the risk of lost or stolen business data. The top 3 includes messaging, social...

Read More...
Author Avatar
16/07/2018

Backup, your last line of defense!

Everybody knows that backups are important. This article will tell you more about how secure you need to store and handle your backups.

Read More...

Current job openings

Get our top stories in your inbox every month

Follow us

   

Share this article