Tag: awards

Astaro Security Gateway V8 is End-of-Life December 31st, 2014

This is your official reminder that Version 8 of Astaro Security Gateway will be end-of-life on December 31st 2014.  If you are not running any Astaro Security Gateway Version 8 installations, you unaffected by this announcement and can disregard it. If you still maintain an active ASG V8, it is important that you read on for what this end-of-life means for you

IT-Harvest Interviews Fortinet’s John Maddison (video)

In the following video, IT-Harvest’s Richard Stiennon interviews John Maddison, Fortinet’s vice president of marketing on how Fortinet views itself in the security market. Topics covered include network security performance, the depth and breadth of the company’s product line and the company’s technology innovation.

Preventing DDoS: What to Look for in a Security Solution

Distributed Denial of Service (DDoS) attacks are on the rise, and they’re only getting stronger. This was driven home by The New York Times report on how anti-spam organization Spamhaus fell prey to one of the largest DDoS attacks in history. Few can forget the targeted DDoS assaults on global financial institutions JP Morgan Chase, Wells Fargo and Bank of America, Regions Bank and American Express – attacks that crippled the businesses for hours and cost millions in lost business, rem…

New NSS Labs Report: IE’s Browser Security Bests Others

Microsoft’s Internet Explorer 10 is the most secure web browser according to the results of a mid-May 2013 NSS Labs’ analysis. Apple Safari 5, Google Chrome 25/26, Internet Explorer 10, Mozilla Foxfire 19 and Opera 12 were all evaluated against malware downloads and socially engineered malware. Results show that Chrome’s malware download protection improved significantly, up to more than 83 percent from a 70 percent performance in NSS’ October 2012 analysis, Browser C…

Tufin Talks ‘Magic’ in Network Security Abstraction

There’s no shortage of reports on the latest network security breaches. Each incident holds its own valuable security lesson but it’s beneficial to recognize the incremental successes paving the way to progress. That’s exactly what Reuven Harrison of Fortinet’s solution partner Tufin did in a blog published last week.

11MB for a simple conference program application?

As I was following the tweets of IEEE S&P, one of the top academic conferences on security, I saw they had created a special application for the people attending the conferences, with the agenda, paper abstracts and a few news. Figure 1. IEEE Security & Privacy Android application Curious, I downloaded the application for Android (air.org.computer.confprog.sp.apk) and ran it through my automated analysis scripts.

Twitter Adds 2FA

Yesterday Twitter announced that it has enabled two-factor authentication for users of their popular service. As we wrote in our Two-Factor Authentication Solution Brief earlier this year: the password as you know it is dead. As we continue to move into a world where literally everything we do touches the Internet in some fashion, companies owe it to their users and customers ways of ensuring they provide safe and secure methods of authentication

App Security Wins Move at Snail’s Pace

Of 200 enterprise security professionals recently surveyed by Enterprise Strategy Group, 79 percent report Web application security attacks in the past year. In a late April Network World blog on the topic, Jon Oltsik, a principal analyst at ESG, said the study also found thieves attacked Web application features and functions such as application authentication, configuration management, application authorization and session management. Oltsik says the good news is that there’s more em…