Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Networks

Borderless SD-WAN: Ushering in the New Era of Borderless Enterprise

Let’s face it, your remote connectivity architecture isn’t going to cut it for much longer. Maybe you struggle with providing uniform secure optimized access, or with a patchwork of multi-vendor policies, or with network blind spots across all remote users, devices, sites, and clouds. One or all of these issues can lead to a situation that would significantly impact digital business operations. Fortunately, there’s a better way.

Fortinet Patches Critical RCE Vulnerabilities in FortiNAC and FortiWeb

On Thursday, February 16, 2023, Fortinet patched two critical unauthenticated remote code execution vulnerabilities, one impacting FortiNAC (CVE-2022-39952) and one impacting FortiWeb (CVE-2021-42756). Both vulnerabilities were discovered by Fortinet’s Product Security team.

Making Operations More Agile and Efficient with a Digital Twin

On January 25, Forward Networks was honored to host Cloud Field Day 16. We especially enjoy working with the delegates because of their industry experience and objective viewpoints; in fact, we launched our product at a Networking Field Day in 2017. This blog is the first in a series covering our Cloud Field Day 16 presentations.

WatchGuard Launches New Line of Firewall Products to Enhance Unified Security for Remote and Distributed Businesses

Powered by WatchGuard's Unified Security Platform® architecture, new Fireboxes deliver enhanced performance and added security capabilities that MSPs and IT admins can easily manage in WatchGuard Cloud.

Entity Collection Overview

The current tempo in information security is getting increasingly faster. We continue to chase quicker detections and faster responses. But does that align with reality? Troves of data is being ingested at wire speed w/filtering, comparing, correlating, identifying, and other transform operations in the event lifecycle. This comes with an increased risk of missed events/alerts, indiscernible log activity from various origins, and the potential for analysis paralysis/desensitization/burnout…

BOD 23-01 April 3, 2023, Deadline for Federal Agencies: Are You Ready?

On October 3, 2022 the Cybersecurity and Infrastructure Security Agency (CISA) issued Binding Operational Directive 23-01 – Improving Asset Visibility and Vulnerability Detection on Federal Networks, a compulsory order intended to “make measurable progress toward enhancing visibility into agency assets and associated vulnerabilities.” BOD 23-01 mandates that Federal Civilian Executive Branch (FEEB) agencies complete a series of required actions within six months, or by April 3, 2023.

Ensure a secure IT environment with integrated network vulnerability management

NIST's National Vulnerability Database shows a quintuple increase in attacks against firmware in the last four years. These statistics indicate that cyber criminals have continually improved their techniques in penetrating your network via firmware vulnerabilities. To combat these malicious actions, let's first discuss the components that are vulnerable to these attacks.

Understanding Direct Cloud Connectivity: Jargon and Benefits

Direct cloud connectivity refers to a natural, dedicated connection between a user's on-premises infrastructure and a cloud service provider's network. It bypasses the public internet and provides a secure and private connection with lower latency and higher bandwidth than traditional internet-based connections. Direct cloud connectivity enables organizations to move large amounts of data, applications, and workloads to the cloud with improved performance, security, and reliability.