Vulnerability Spotlight: Apache OpenOffice Vulnerabilities

By Talos Group Today, Talos is releasing details of three new vulnerabilities discovered within Apache OpenOffice application. The first vulnerability, TALOS-2017-0295 within OpenOffice Writer, the second TALOS-2017-0300 in the Draw application, and the third TALOS-2017-0301 discovered in the Writer application. All three vulnerabilities allow arbitrary code execution to be performed. Read More >>

Source:: Cisco Security Notice

Vulnerability Spotlight: Apache OpenOffice Vulnerabilities

By Talos Group Today, Talos is releasing details of three new vulnerabilities discovered within Apache OpenOffice application. The first vulnerability, TALOS-2017-0295 within OpenOffice Writer, the second TALOS-2017-0300 in the Draw application, and the third TALOS-2017-0301 discovered in the Writer application. All three vulnerabilities allow arbitrary code execution to be performed. Read More >>

Source:: Cisco Security Notice

Gartner releases report on the transformation of the SWG market

By Kevin Rollinson On September 12, Gartner – the leading research and advisory company – released a competitive report on the secure web gateway (SWG) market. The report highlights the significant transformation as the traditional SWG gives way to a new platform –– the secure internet gateway (SIG). Gartner states, “the SIG service platform offers a new promise to […]

Source:: Cisco Security Notice

Gartner releases report on the transformation of the SWG market

By Kevin Rollinson On September 12, Gartner – the leading research and advisory company – released a competitive report on the secure web gateway (SWG) market. The report highlights the significant transformation as the traditional SWG gives way to a new platform –– the secure internet gateway (SIG). Gartner states, “the SIG service platform offers a new promise to […]

Source:: Cisco Security Notice

How to Quickly Differentiate Between Malicious and Harmless Traffic Using the Cisco Security Packet Analyzer

By Matthew Packer With the constant news headlines about data theft it is mandatory that organizations understand what data is entering, traversing, and leaving their networks and have the ability to examine that data if necessary for conducting network forensic investigations. Two popular style of attacks that are constantly in the news are data hoarding (Edward Snowden) and […]

Source:: Cisco Security Notice

How to Quickly Differentiate Between Malicious and Harmless Traffic Using the Cisco Security Packet Analyzer

By Matthew Packer With the constant news headlines about data theft it is mandatory that organizations understand what data is entering, traversing, and leaving their networks and have the ability to examine that data if necessary for conducting network forensic investigations. Two popular style of attacks that are constantly in the news are data hoarding (Edward Snowden) and […]

Source:: Cisco Security Notice

Fireproofing your network with software-defined segmentation

By Andrew Akers We often hear of the many challenges of the industrial revolution, but one of the scourges of this time period that often goes unmentioned was mass fires. To the people of the time, great fires threatened the very viability of industrialization. The number of fires bearing the moniker ‘great‘ helps prove this point: The 1835 […]

Source:: Cisco Security Notice

Fireproofing your network with software-defined segmentation

By Andrew Akers We often hear of the many challenges of the industrial revolution, but one of the scourges of this time period that often goes unmentioned was mass fires. To the people of the time, great fires threatened the very viability of industrialization. The number of fires bearing the moniker ‘great‘ helps prove this point: The 1835 […]

Source:: Cisco Security Notice

Fortinet Expands Security Fabric Visibility and Protection into the Industrial Internet of Things

Fortinet Expands Security Fabric Visibility and Protection into the Industrial Internet of Things

Source:: Fortinet

Fortinet Expands Security Fabric Visibility and Protection into the Industrial Internet of Things

Fortinet Expands Security Fabric Visibility and Protection into the Industrial Internet of Things

Source:: Fortinet