MSSPs Particularly Vulnerable to Cisco FDM Flaw

Of all those who potentially face a threat from the recently disclosed vulnerability on the Cisco Firepower Device Manager (FDM), MSSPs could feel the impact the hardest if adversaries decide to exploit it. “An MSSP may be operating Cisco Firepower De… Continue reading MSSPs Particularly Vulnerable to Cisco FDM Flaw

Why Next-Gen Firewalls Miss the Mark for Today’s Remote Workforce

For nearly three decades, next-gen firewalls (NGFWs) have proven to be essential perimeter-based security solutions, helping the enterprise network in the detection and blocking of malicious traffic. However, infosec pros are looking to evaluate if ne… Continue reading Why Next-Gen Firewalls Miss the Mark for Today’s Remote Workforce

Palo Alto Networks Embeds ML Models in Firewalls

Palo Alto Networks (PAN) today unveiled a series of next-generation firewalls (NGFW) that rely on machine learning (ML) models running inline rather than signatures to thwart cybersecurity threats in real-time. Anand Oswal, senior vice president of pr… Continue reading Palo Alto Networks Embeds ML Models in Firewalls

The reason behind IPv6 adoption rate dramatical drop in China according to Google measurements? [closed]

Google has an IPv6 measurement page that reports that their numbers report on the percentage of users that access Google over IPv6.

According to the report by Jan 2020 0.3% of users in China used IPv6 to access Google

However, looking at… Continue reading The reason behind IPv6 adoption rate dramatical drop in China according to Google measurements? [closed]

Next-Gen Firewall Sizing: 5 Things to Look For

An undersized firewall can be catastrophic to your network performance, availability and security posture. Selecting a firewall that is the appropriate size for your environment is arguably the most important technical decision you, the gatekeeper of … Continue reading Next-Gen Firewall Sizing: 5 Things to Look For

How does a NG Firewall do application visibility and classification of TLS traffic without TLS interception and how reliable is this

How Does Application Visibility and Control Work? The application
identification (App ID) classification engine and application
signature pattern-matching engine operate at Layer 7 and inspect the
actual content of… Continue reading How does a NG Firewall do application visibility and classification of TLS traffic without TLS interception and how reliable is this