Artikel archief

02-05-2014 11:46
Attackers Fire at Windows XP Users With Recently Discovered IE Zero-Day     Attackers are exploiting a recently disclosed zero-day vulnerability in Internet Explorer in campaigns  targeting Windows XP users, FireEye researchers have found. While...
02-05-2014 11:15
!!!NEW!!!   Some very specific, deep-dive guides for tuning, new features, technologies will be provided in here.   Checkout; Tips & Tricks   Starting with Checkpoint CORE XL and Palo Alto transparent user id retrieval.
02-05-2014 11:05
Agentless capturing transparently the user id's and feeding these into the Palo Alto ID aware gateway.   The need a.      User visibility, User based access control, User based reporting. b.      When using VmWare virtual desktop (Horizon...
02-05-2014 09:35
The firewall kernel is replicated multiple times, each kernel instance runs on one processing core and each instance is an independent firewall. These instances don't share FW-Lock. Thus, concurrency is achieved. An additional component called the dispatcher receives packets and forwards them to...
10-04-2014 17:37
How to See the Malware That Is Operating Inside Your Network Since most cyber defense technologies are perimeter oriented and cannot detect it, the malware that makes it into your production network can continue to operate, spread, and damage your operation. The Cisco Threat...
10-04-2014 17:31
  Enterprise   Company Information Events & Training Public Relations Investor Relations Careers     Introducing a Unified Solution Against Advanced Threats and Malware Attacks Today's sophisticated and expanding...
10-04-2014 17:29
Palo Alto Networks: Live Demo Register   April 23, 2014 9:00 AM - 10:00 AM PDT Online Event The Palo Alto Networks demo is a quick and easy way to learn about next-generation firewalls. Please join us for this live webinar with a Palo Alto Networks firewall consultant and see how...
31-03-2014 08:00
     
20-03-2014 21:20
The document attached describes how non protected access points (fi. public places) are re-imaged with malicious code. Wifi Chameleon.pdf (3587303)
20-03-2014 21:13
https://www.infosecurity.be/
Onderdelen 11 - 20 van 42
<< 1 | 2 | 3 | 4 | 5 >>