Author Avatar
05/09/2018

New Zero Day Local Privilege Escalation Vulnerability in Windows Task Scheduler

Microsoft acknowledged a new Zero Day vulnerability on Microsoft Windows Task Scheduler. Currently there is no workaround. That's why we show you how to reduce the risk. 

Read More
Author Avatar
21/08/2018

Vulnerability Assessment: How it helps your company's global security

When new security threats are discovered and referenced on the internet, malicious users receive this info as well. Affected IT environments are easy targets. This is were Vulnerability Assement...

Read More
Author Avatar
17/08/2018

Phishing: 10 lifesaving tips to keep your mailbox secure

Here are ten life saving tips to distinguish a real e-mail from a phishing e-mail.

Read More
Author Avatar
14/08/2018

SD-WAN : Did you believe me?

If you read my recent article about SD-WAN, did you believe Fortinet was the right solution for delivering Secure SD-WAN?

Read More
Author Avatar
27/07/2018

SD-WAN : What and why?

Are you struggling with the price, performance and flexibility of traditional WAN? Then you may like SD-WAN!

Read More
Author Avatar
20/07/2018

These are the apps companies block the most

Apps at work are on the rise. That's why some enterprises choose to block certain apps because they increase the risk of lost or stolen business data. The top 3 includes messaging, social...

Read More
Author Avatar
16/07/2018

Backup, your last line of defense!

Everybody knows that backups are important. This article will tell you more about how secure you need to store and handle your backups.

Read More
Author Avatar
20/06/2018

We all have vulnerabilities! But how to address them?

What is my most valuable data? Is it backed up? Is it protected? These are some questions you may have already asked yourself. But what about systems that process or store this data? Are they...

Read More
Author Avatar
15/06/2018

Beware of the ROBOT

ROBOT, the Return Of Bleichenbacher's Oracle Threat, is a vulnerability that affects TLS cipher modes that use RSA encryption. It allows performing unauthorized operations with the private key of...

Read More
Author Avatar
13/06/2018

Step 4: Start the journey to Micro-Segmentation

Micro-Segmentation you said? What is that?

Read More

Current job openings

Get our top stories in your inbox every month

Follow us

  

Share this article