article thumbnail

These Services Shall Not Pass: Abusing Service Tags to Bypass Azure Firewall Rules (Customer Action Required)

Tenable

Azure customers whose firewall rules rely on Azure Service Tags, pay attention: You could be at risk due to a vulnerability detected by Tenable Research. Tenable Research has discovered a vulnerability in Azure that allows an attacker to bypass firewall rules based on Azure Service Tags by forging requests from trusted services.

Firewall 142
article thumbnail

Just Released and Ready for Download — Software Firewalls for Dummies

Palo Alto Networks

If you want to protect applications and workloads throughout today’s complex and interrelated environments, you need software firewalls. You can better understand the extensive need and numerous use cases for virtual firewalls, container firewalls and managed cloud firewalls with our essential guide, “ Software Firewalls for Dummies.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

VM-Series Virtual Firewalls Beat Fortinet Fortigate in Miercom Testing

Palo Alto Networks

The lift-and-shift of applications to the cloud has accelerated the adoption of virtual firewalls over the past few years. Virtual firewalls have evolved with higher performance and flexibility for private, public and multi-cloud tenants. So, how does our virtual firewall performance stack up against the competition?

article thumbnail

Firewall Security: Is a Secure, Firewall-less Network Possible? Perhaps, But Why Would You?

Firemon

Just three years ago, technology headlines were rife with articles stating that the firewall was obsolete. And maybe that prophecy would have come true if we were stuck with the same old firewalls that could only perform simple packet filtering. Learn how FireMon Firewall Security solves your most complex problems.

article thumbnail

From Phishing to Firewalls: Solving Security with AI

Palo Alto Networks

David Szabo, who conducted the interview, raises an interesting point about the computational requirements of running machine learning models on firewalls. Firewalls need to handle massive volumes of data, making memory optimization essential. I'm most proud of machine learning in the firewall.

article thumbnail

How To Configure Squid As An Egress Gateway

Xebia

This blog configures Squid Proxy as an egress gateway to filter web traffic. Firewalls filter traffic based on attributes such as IP address, protocol and domain name. The available attributes depend on the firewall’s operating layer. The higher the layer, the more advanced (and costly) the firewall.

Firewall 147
article thumbnail

How to Protect Your Azure App with a Web Application Firewall

Modus Create

In these blog posts, we will be exploring how we can stand up Azure’s services via Infrastructure As Code to secure web applications and other services deployed in the cloud hosting platform. To start with, we will investigate how we can stand up Web Applications Firewall (WAF) services via Terraform.