Blog
Fortinet expert on securely accelerating cloud strategies
Alain Penel, Regional Vice President – Middle East, Fortinet, discusses how organisations can leverage the performance and flexibility of the cloud without compromising visibility or security. Attacking ...Watchguard – Threat Detection and Response 5.8.X Beta
We are excited to announce that Threat Detection and Response has a new capability to Beta over the next 6 weeks! By popular demand, WatchGuard has ...Preparation Requires Prioritizing Threats
As the attack methods and strategies of our cyber adversaries continue to expand, organizations must stay ahead of those threats most likely to affect individual networks ...Sophos Central Admin-Unable to change login email address in “Account Details” section of Sophos Central Admin dashboard
Overview This article describes an issue when attempting to change the login email address in the “Account Details” section of the Sophos Central Admin dashboard. See example below: ...The Digital Big Bang: A Must-Read for CISOs Leading Security Innovation in the Digital Age
Industry leaders reveal the connection between fundamental and scientific principles and cybersecurity best practices SUNNYVALE, Calif. – Sep 5, 2019 Phil Quade, CISO at Fortinet and ...SonicWALL – HILDACRYPT RANSOMWARE ACTIVELY SPREADING IN THE WILD
The SonicWall Capture Labs Threat Research Team observed reports of a new variant family of Hildacrypt ransomware [Hildacrypt.RSM] actively spreading in the wild. The Hildacrypt ransomware encrypts the victim’s files ...Speed And Connectivity: The Fundamental Elements In The Science Of Cybersecurity
When the internet was first conceived, in a Cold War-era project by the Department of Defense, the sharing of computer information was handled the old-fashioned way: ...Accelerating Your Cloud Security Strategy Without Compromising Protection
Attacking web applications is the most common tactic used in data breaches, accounting for 52% of compromises. This trend has been true for the past several years in ...Sophos XG Firewall: Configure mail notification in Legacy mode when a mail server is local
Overview This article describes the steps to configure mail notifications while being in legacy mode and the mail server is located locally in the firewall and ...Sophos Firewall XG false vulnerability scan on SSL VPN client
Sophos Firewall XG false vulnerability scan on SSL VPN client Applies to the following Sophos product(s) and version(s)Sophos Firewall A ssl vulnerability scan on the SSL ...
Dell Software Group sold to help fund looming EMC deal
Ingram Micro gets distribution access to Dell’s security range in Australia