Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Networks

It's A Fact: Forward Networks Delivers Customers an Average Annual ROI of $14.2 Million

To objectively understand how increased efficiency translates to measurable ROI for enterprises, Forward Networks engaged IDC Research to determine the business value of the platform. After interviewing existing customers, they produced the IDC Solution Brief, The Business Value of Forward Networks, (US52128624, June 2024). The paper delved deep into the experiences of Forward Networks’ customers who leverage the digital twin technology.

Best Practices for Secure Communication During Business Trips in the APAC Region

Make no mistakes about it, we live in a world where information is power. Securing your information while you communicate on business trips is critical, especially within regions like APAC (Asia Pacific) where rapid technological advancement has led to increased risk of cyber threats.

CVE-2024-24919: Zero-Day Vulnerability Detected in Check Point Products

Note: This vulnerability remains under active exploitation, and Kroll experts are investigating. If further details are uncovered by our team, updates will be made to the Kroll Cyber Risk blog. A critical zero-day vulnerability, being tracked as CVE-2024-24919, has been discovered and patched in a number of Check Point products. This vulnerability has a CVSS score of 8.6 assigned by Check Point and is actively being exploited in the wild with proof of concept (POC) exploits available.

Forward Networks' Online Community: Elevate Your Networking Expertise

In the dynamic and ever-evolving fields of networking, cloud, and security, staying informed and connected is crucial for professional growth and success. At Forward Networks, we believe in the power of community and collaboration to drive innovation and excellence. Here are four compelling reasons to join Forward Networks' online community and elevate your expertise.

CrowdStrike and Cloudflare announce expanded strategic partnership to secure networks and power the AI-native SOC

New alliance combines best-of-breed platforms, accelerating partners' ability to drive vendor consolidation by securing the network and stopping breaches across device endpoints, cloud, identity, data, and applications.

RPC Endpoint Mapper Authentication and Hardening

This policy setting determines if RPC clients authenticate with the Endpoint Mapper Service when their call includes authentication data. The Endpoint Mapper Service on Windows NT4 (all service packs) is unable to process authentication data provided in this manner. Disabling this policy means RPC clients won’t authenticate with the Endpoint Mapper Service, but they can still communicate with it on Windows NT4 Server. The recommended state for this setting is: Enabled.

CVE-2024-24919 - Check Point Quantum Gateway

CVE-2024-24919 is a critical security vulnerability identified in Check Point Quantum Security Gateway, a widely used network security appliance. This vulnerability allows attackers to exploit the gateway, leading to the exposure of sensitive information. As a zero-day exploit, it presents significant risks to organizations relying on Check Point for their network security.

New CIP standards: Why utilities shouldn't wait to deploy

On May 9, the North American Electric Reliability Corporation (NERC) officially adopted new Critical Infrastructure Protection (CIP) requirements for Internal Network Security Monitoring (INSM). This is one of the last steps before Federal regulators make it an official standard for utilities and the electrical power grid industry. What does it mean? Compliance for CIP-015-1 is coming to your utility. Utilities will need monitoring tools with deep and wide asset intelligence and network control.

Enhancing Incident Response with 1-Click Entity Isolation

We are excited to announce a significant enhancement to our Entity Enrichment integration with CrowdStrike Falcon: the 1-Click Response action. This new feature empowers SOC analysts to isolate a host directly from Corelight Investigator, leveraging enriched context and point-in-time evidence to make informed, rapid decisions during security incidents.