Remove Authentication Remove Firewall Remove Operating System Remove Virtualization
article thumbnail

CVE-2020-12271: Zero-Day SQL Injection Vulnerability in Sophos XG Firewall Exploited in the Wild

Tenable

Sophos pushes a hotfix to address a SQL injection vulnerability in Sophos XG Firewall that was exploited in the wild. On April 22, Sophos published a knowledge base entry on the Sophos Community regarding the discovery of a zero-day vulnerability in the Sophos XG Firewall that was exploited in the wild. Background. Proof of concept.

Firewall 101
article thumbnail

Be a Cyber Defender and Protect Your Mobile Devices!

Ivanti

Follow the list below of cybersecurity hygiene best practices to protect all your mobile devices physically and virtually by applying multiple layers of protection. Turn on your mobile device’s screen lock with biometric authentication such as iOS’ Face ID or Android’s fingerprint or Face Unlock, or Samsung’s Iris unlock.

Mobile 86
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security-Rich: How the D2iQ Kubernetes Platform Meets NSA/CISA Kubernetes Security Hardening Guidelines

d2iq

As the NSA/CISA guidance notes, a Kubernetes virtualized infrastructure “can provide several flexibility and security benefits compared to traditional, monolithic software platforms.”Organizations Provides support for immutable operating systems such as Flatcar. DKP works transparently with any current firewall implementation.

article thumbnail

Using Secure Configurations | Standardize Your Security

Linux Academy

This included installing operating system updates, NTP servers, DNS servers, static IPs, audit log options, anti-virus, etc. For network devices, we should consider using RADIUS/TACACS+ for authentication purposes, not a shared user account. .” Network Device Configurations. How do we do this kind of monitoring?

Backup 92
article thumbnail

The 8 Best Practices for Reducing Your Organization’s Attack Surface

Ivanti

Once again, borrowing from the NIST glossary, network segmentation is defined as follows: Splitting a network into sub-networks, for example, by creating separate areas on the network which are protected by firewalls configured to reject unnecessary traffic. Seven in 10 government employees now work virtually at least part of the time.

article thumbnail

Top Ten Ways Not To Sink the Kubernetes Ship

Linux Academy

Kubernetes nodes rely on underlying virtual servers for both the master control plane and for worker nodes. It is important to use security tooling such as OpenSCAP, the open source version of the Security Content Automation Protocol, to harden virtual machine images prior to their deployment in virtual private clouds.

article thumbnail

SaaS security: challenges, trends and best practices to follow 

Openxcell

Security measures include encryption, authentication, access controls, network security, data backup & recovery. Account hijacking Most SaaS solutions require users to create accounts and authenticate. To prevent user accounts from being compromised, organizations need to enforce strong authentication practices.

Trends 52