article thumbnail

A Practical History of the Firewall – Part 3: Performance Takes Center Stage

Firemon

As internet speeds increased and firewall adoption inside the enterprise increased, performance drove purchasing decisions. Enter Netscreen, the firewall appliance, and the Application-Specific Integrated Circuit (ASIC). Netscreenintroduced the purpose-built firewall “appliance.” Cisco was selling the PIX in the 90s.

article thumbnail

Modern Network Security: How Technology and Smart Practices are Reducing Risk

CIO

With the shift to hybrid work, data, applications, intellectual property, and personal information is no longer stashed safely behind a corporate firewall. In this webcast, we’ll explore: The current trending threats facing networks, like authentication vulnerabilities, malware, phishing, and denial of service attacks.

Network 245
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Why you must extend Zero Trust to public cloud workloads

CIO

Why securing cloud workloads is an urgent matter In recent years, major cloud service providers encountered 6,000 malware samples actively communicating with them, underlining the magnitude of cloud security challenges. It’s not as simple as just extending traditional firewall capabilities to the cloud. 8 Complexity.

Cloud 338
article thumbnail

CVE-2020-12271: Zero-Day SQL Injection Vulnerability in Sophos XG Firewall Exploited in the Wild

Tenable

Sophos pushes a hotfix to address a SQL injection vulnerability in Sophos XG Firewall that was exploited in the wild. On April 22, Sophos published a knowledge base entry on the Sophos Community regarding the discovery of a zero-day vulnerability in the Sophos XG Firewall that was exploited in the wild. Background. Proof of concept.

Firewall 101
article thumbnail

CVE-2024-21762: Critical Fortinet FortiOS Out-of-Bound Write SSL VPN Vulnerability

Tenable

Dutch Authorities disclose that CVE-2022-42475 was abused to spread malware On February 6, Dutch authorities released a cybersecurity advisory about an attack against the Netherlands Ministry of Defence (MOD) in which attackers exploited CVE-2022-42475 against a Fortigate device to gain initial access and deploy malware known as "COATHANGER."

Malware 123
article thumbnail

Five Remote Access Security Risks And How To Protect Against Them

Palo Alto Networks

The problem is that many legacy firewall rules enable access to practically everything in the network. Teams must ensure that these devices are protected against malware and viruses. Historically, many companies deployed VPNs primarily for technical people needing access to critical technology assets.

Malware 98
article thumbnail

What Is cloud security?

Lacework

The 1990s also saw the rise of firewalls and antivirus programs, as organizations (and individuals) began storing and sharing more personal information online. Authentication issues — Accessing cloud resources is available via the Internet, which means traditional on-site network security controls are ineffective. Secure Endpoints.

Cloud 98