This was my attendee’s card for the SunNetwork conference 2003 in Berlin. It had been used for years as my access card to our Sun Ray Servers and is still in my wallet. Nearly loved to death.
The QRadar Insights blog describes and compares three different methods to collect Logs from Windows desktops. Worth reading.
Yesterday Check Point released their software package R77.10. This opens the first opportunity to upgrade from R75.47 to a higher Version. What is new in R77.10? Continue reading »
Federal and State laws, as well as industry regulations, are major drivers in the security industry, and none are probably more far-reaching and controversial than the Payment Card Industry Data Security Standard (PCI DSS). Here, Fortinet provides an overview of PCI DSS and what you need to know about this regulation.
CRN reports that hackers with a possible relationship to the Chinese government attacked 3 large U.S. companies with a malware called Javafog. This malware installs backdoors via a vulnerability in Oracle Java and flaws in Microsoft Office. But why to attack them directly, when one can use service providers? Continue reading »
Fortniet Blog delivers a short introduction what is Fortinet’s view on layered security:
Layered security combines multiple security measures to make sure that you don’t have all your security eggs in one basket. This protects you from different sources and different types of threats.
There are a few different models out there for layered security. The one we’ll be using has seven distinct layers. Below you’ll find a brief description of each layer, followed by a list of the relevant Fortinet features.
A good way to get a very short introduction to this topic.
(Also dealing with with Email made in Germany, Schlandnet and Cloud.)