SSL is hugely important to the modern Internet, and the Heartbleed vulnerability (CVE-2014-0160: OpenSSL Private Key Disclosure Vulnerability) compromised the integrity of communications across the entire Web. Palo Alto Networks is committed to protecting customers from the full spectrum of the threat, and has looked at just how much deeper this goes.
The official blog from Satisnet Ltd
SAP is a complex and ever changing system, whether because of changes introduced to your SAP implementation to better suit your business or through the application of Security Notes (Patches) to ensure that newly disclosed vulnerabilities are mitigated.
In a week which saw the last ever security updates for Windows XP, Microsoft has also made another more modern version of its OS obsolete. Users of Windows 8.1 will no longer receive security updates unless they upgrade to Windows 8.1 Update.
ExtraHop has released a free download that can detect the heartbeats that are used in the Heartbleed exploit, revealing potential attacks against your SSL servers. This capability is available in the ExtraHop Discovery Edition, a free-forever virtual appliance.
An interesting case study by Aerohive Networks highlights how organisations can reduce headaches and cut costs by deploying Aerohive’s Branch on Demand WiFi solution.
Unless you’ve been hiding under a rock, it’s likely you’ve heard about the Heartbleed Internet security vulnerability, which has made headlines around the web over the last few days. Heartbleed is a just discovered security vulnerability that was introduced to OpenSSL about two years ago. Our providers have responded quickly, and here’s a round up of what some of them are staying about it:
As an IBM partner and IT security software integrator, Satisnet has been awarded the prestigious Balanced Partnership Award at the IBM 2014 Security System Business Partner Awards in Las Vegas.
Earlier this week, Tenable announced and released a new UI (version 2.20) and engine (version 5.2.6) for their popular Nessus Scanner. Ordinarily this would not require a banner announcement, but with the new UI comes some extremely helpful new features for customers with multiple scanners, or who also have Tenables’ Perimeter Scanning Service.
The purpose of this guide is to assist other Splunk users with the setup of the Splunk DB Connect application, and to try to answer some of questions posed on Splunk answers regarding this topic. I myself have spent some time configuring and troubleshooting the application to get it to work, and hopefully this blog will help those having difficulties.
A security system is only as strong as its weakest link. That’s one of the lessons enterprise IT teams can learn from the recent spate of security breaches. If partners can connect to an enterprise’s internal network, or enterprise employees regularly exchange files with partners, then the weakest link might be on a partner’s network.
Earlier this week, Puppet Labs kicked off their new Puppet Enterprise supported module program by announcing the first set of such modules with the release of Puppet Enterprise 3.2.
The Target data breach in the USA continues to make headlines, most recently with the resignation of the CIO. But while the scale of the breach was large, Target is hardly the first and won’t be the last to get hit with a persistent threat.
Apple has released an updated white paper covering security in iOS, going into an unprecedented amount of detail about the security architecture and features of the company’s mobile OS.
Interesting infographic produced by Accelops. They asked IT executives who were attendees at Cloud Expo West about their priorities for 2014.
You’ve probably been hearing a lot about two factor authentication and the chances are you’ve come across the terms “OATH-compliant” and “Based on the OATH standards”.
Shavlik Protect 9.1 close to release, and Shavlik has shared some details about the release, which includes some useful enhancements and additions.
I was investigating strange behaviour back in November ’13, no, not MY strange behaviour – those who know me well will state quite clearly that my behaviour goes way beyond anything you’d want to investigate! No, this strange behaviour was repeated triggering of an API call from Thycotic’s Password Reset Server and verification provider ProxStop.