Artikel archief
02-05-2014 11:46
Attackers Fire at Windows XP Users With Recently Discovered IE Zero-Day
Attackers are exploiting a recently disclosed zero-day vulnerability in Internet Explorer in campaigns targeting Windows XP users, FireEye researchers have found. While...
02-05-2014 11:15
!!!NEW!!!
Some very specific, deep-dive guides for tuning, new features, technologies will be provided in here.
Checkout;
Tips & Tricks
Starting with Checkpoint CORE XL and Palo Alto transparent user id retrieval.
02-05-2014 11:05
Agentless capturing transparently the user id's and feeding these into the Palo Alto ID aware gateway.
The need
a. User visibility, User based access control, User based reporting.
b. When using VmWare virtual desktop (Horizon...
02-05-2014 09:35
The firewall kernel is replicated multiple times, each kernel instance runs on one processing core and each instance is an independent firewall. These instances don't share FW-Lock. Thus, concurrency is achieved. An additional component called the dispatcher receives packets and forwards them to...
10-04-2014 17:37
How to See the Malware That Is Operating Inside Your Network
Since most cyber defense technologies are perimeter oriented and cannot detect it, the malware that makes it into your production network can continue to operate, spread, and damage your operation. The Cisco Threat...
10-04-2014 17:31
Enterprise
Company Information
Events & Training
Public Relations
Investor Relations
Careers
Introducing a Unified Solution Against Advanced Threats and Malware Attacks
Today's sophisticated and expanding...
10-04-2014 17:29
Palo Alto Networks: Live Demo
Register
April 23, 2014
9:00 AM - 10:00 AM PDT
Online Event
The Palo Alto Networks demo is a quick and easy way to learn about next-generation firewalls. Please join us for this live webinar with a Palo Alto Networks firewall consultant and see how...
31-03-2014 08:00
20-03-2014 21:20
The document attached describes how non protected access points (fi. public places) are re-imaged with malicious code.
Wifi Chameleon.pdf (3587303)
20-03-2014 21:13
https://www.infosecurity.be/
Onderdelen 11 - 20 van 42