By John Dominguez In war, any good military strategist will try to exploit their enemy’s weaknesses. Cybercriminals are no different. Their latest tactic: use file-less attacks to exploit vulnerabilities in everyday applications.

Source:: Cisco Security Notice

By John Dominguez In war, any good military strategist will try to exploit their enemy’s weaknesses. Cybercriminals are no different. Their latest tactic: use file-less attacks to exploit vulnerabilities in everyday applications.

Source:: Cisco Security Notice

Fortinet to Announce Fourth Quarter and Full Year 2017 Financial Results

Source:: Fortinet

Fortinet to Announce Fourth Quarter and Full Year 2017 Financial Results

Source:: Fortinet

Fortinet Recognized by Tech Data with Growth Vendor of the Year Award

Source:: Fortinet

Fortinet Recognized by Tech Data with Growth Vendor of the Year Award

Source:: Fortinet

By Tobias Mayer I have already written about two secure protocols that are impacting our network security. The first was HTTP/2, the second one was TLS 1.3. Both posts can be found here: HTTP/2 TLS1.3 Today I want to talk about another very important protocol, it is called QUIC. QUIC stands for QUICK UDP INTERNET CONNECTIONS. It is […]

Source:: Cisco Security Notice

By Tobias Mayer I have already written about two secure protocols that are impacting our network security. The first was HTTP/2, the second one was TLS 1.3. Both posts can be found here: HTTP/2 TLS1.3 Today I want to talk about another very important protocol, it is called QUIC. QUIC stands for QUICK UDP INTERNET CONNECTIONS. It is […]

Source:: Cisco Security Notice

By Claudia Martinez If an average employee at your company got an email from an executive with an urgent request, would they question whether the email was coming from the actual sender? They probably wouldn’t. The reality is that most people would act on the request because of its time-sensitive nature. They assume that the IT team has […]

Source:: Cisco Security Notice

By Claudia Martinez If an average employee at your company got an email from an executive with an urgent request, would they question whether the email was coming from the actual sender? They probably wouldn’t. The reality is that most people would act on the request because of its time-sensitive nature. They assume that the IT team has […]

Source:: Cisco Security Notice