Firewall Feud Lunch & Learn

CTOvision

FireMon is surveying security pros across the country about their biggest challenges with firewall policy management. Join FireMon in a city near you as their experts reveal the top answers and share firewall management best practices for tackling them head on! Why Running Multiple WordPress Firewalls is a Bad Idea (wpwhitesecurity.com). Technology › Apple hack exposes flaws in building apps behind 'Great Firewall' (japantoday.com).

WEBINAR: The Impact of Firewall Sprawl

CTOvision

Register >> Network firewalls have long been established as the ubiquitous first line of defense for every organization’s network security strategy. Sprawling deployments of firewalls and other security devices that increase complexity, cost and risk. Join representatives from research firm, the Aberdeen Group , as they share their insights on the rise of firewall sprawl and learn how the FireMon platform answers the call for more strategic firewall management.

Trending Sources

Kicking the Tires: Verisign DNS Firewall

CTOvision

Cognitio has been evaluating the new Verisign DNS Firewall along with its Recursive DNS service for the last several weeks. Our bottom line conclusion: Integration of the Verisign DNS Firewall into an existing environment couldn’t be more seamless, configuration and management are a breeze, and it delivers immediate benefit to the security posture of any environment. For more information on the DNS Firewall and other Verisign Security Services check out their website: [link].

Are next-generation firewalls legacy technology?

Network World

A few years ago, next-generation firewalls (NGFWs) came out of nowhere to become a network security staple. NGFWs followed in the footsteps of earlier firewalls—physical appliances installed inline to protect private networks from the public Internet. Rather than deploy physical network devices, data center firewalling of east-west traffic is rapidly moving toward software-based micro-segmentation tools (i.e.

Face-off: Cisco vs. Fortinet for enterprise firewalls

Network World

Firewalls have been on the front lines of network security for 25 years. Today, two of the top enterprise firewalls are Cisco’s Adaptive Security Appliance (ASA) and Fortinet’s Fortigate, according to reviews by users in the IT Central Station community. Over time they’ve evolved beyond simple packet filtering to take on a wider and deeper variety of tasks to block modern threats.

How Google reinvented security and eliminated the need for firewalls

Network World

SAN FRANCISCO -- In some ways, Google is like every other large enterprise. It had the typical defensive security posture based on the concept that the enterprise is your castle and security involves building moats and walls to protect the perimeter. Over time, however, that perimeter developed holes as Google’s increasingly mobile workforce, scattered around the world, demanded access to the network. And employees complained about having to go through a sometimes slow, unreliable VPN.

Cisco starts patching firewall devices against NSA-linked exploit

Network World

Cisco Systems has started releasing security patches for a critical flaw in Adaptive Security Appliance (ASA) firewalls targeted by an exploit linked to the U.S. National Security Agency. The exploit, dubbed ExtraBacon, is one of the tools used by a group that the security industry calls the Equation, believed to be a cyberespionage team tied to the NSA. ExtraBacon was released earlier this month together with other exploits by one or more individuals who use the name Shadow Brokers.

Review: 5 open source alternatives for routers/firewalls

Network World

Plus, they are combined with security functionality, starting with a basic firewall and possibly including antivirus, antispam and Web filtering. Open source software offers an economical and flexible option for deploying basic home, SMB or even enterprise networking. These open source products deliver simple routing and networking features, like DHCP and DNS.

SMB 20

Flaws expose Cisco small-business routers, firewalls to hacking

Network World

Three models of Cisco wireless VPN firewalls and routers from the small business RV series contain a critical unpatched vulnerability that attackers can exploit remotely to take control of devices. The vulnerability is located in the Web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, RV130W Wireless-N Multifunction VPN Router and RV215W Wireless-N VPN Router.

Why firewalls are not recommended for securing SCADA systems

Tech Republic Security

SCADA systems need to be secure, yet according to one expert, firewalls are not up to the task, and should be replaced with Unidirectional Security Gateways. Learn what to look for in a USG

BlackNurse attack: 1 laptop can DoS some firewalls, bring down big servers

Network World

An attacker doesn’t need an IoT botnet or massive resources for a denial of service attack to knock large servers offline; researchers warned that all it takes is one laptop for a “ BlackNurse ” attack to bring vulnerable Cisco, SonicWall, Palo Alto and Zyxel firewalls to their knees.

Cisco discloses PIX firewall, IOS software security holes

Network World

Cisco has warned of a high priority security hole in its IOS software that could have let attackers snatch memory contents from a variety of products that could lead to the disclosure of confidential information. More on Network World: Cisco buys into containers with Container X acquisition +. Specifically Cisco said the vulnerability is due to “insufficient condition checks in the part of the code that handles [Internet Key Exchange] IKEv1 security negotiation requests.

Java and Python FTP attacks can punch holes through firewalls

Network World

The Java and Python runtimes fail to properly validate FTP URLs, which can potentially allow attackers to punch holes through firewalls to access local networks. On Saturday, security researcher Alexander Klink disclosed an interesting attack where exploiting an XXE (XML External Entity) vulnerability in a Java application can be used to send emails.

Next-Gen Enterprise Network Doesn’t Stop at Corporate Firewall

Data Center Knowledge

Study: pressure on IT to create value drives demand for interconnection services Read More. Cloud Computing Colocation Connectivity Data Center Strategies Enterprise Equinix Featured

Study 26

5 open source alternatives for routing/firewall

Network World

These open source products deliver simple routing and networking features, plus they are combined with security functionality, starting with a basic firewall and possibly including antivirus, antispam and Web filtering.

SMB 10

DoS technique lets a single laptop take down an enterprise firewall

Network World

At a time when the size of distributed denial-of-service attacks has reached unprecedented levels, researchers have found a new attack technique in the wild that allows a single laptop to take down high-bandwidth enterprise firewalls. BlackNurse uses ICMP Type 3 (Destination Unreachable) Code 3 (Port Unreachable) packets instead and some firewalls consume a lot of CPU resources when processing them.

Qatar’s Milaha Maritime and Logistics upgrades firewall to ensure global network performance

Computer Weekly

Middle East marine and logistics company has improved its firewall to support global expansion

Pacnet Opens Data Center Behind Great Firewall of China

Data Center Knowledge

Partners with government to help establish tech park in Tianjin Wuqing District as major technology hub Read More. Asia-Pacific colocation

Why bother with firewalls?

IT Toolbox

I get the purpose of firewalls. Every modern operating system has firewalls installed by default these days and even the average modem has a firewall built in. In short, just about every computer under the sun has some sort of firewall built in and you cannot access the internetThey are supposed to block people and connections from doing things they are not supposed to do.

How OPM Could Have Avoided the Data Breach

CTOvision

Knowing the interaction of firewall rules, and uncovering vulnerabilities introduced by misconfiguration, is vital. Uncovering unused, hidden, and redundant rules, which can have unforeseen impact on overall security, would help to simplify the overall firewall environment. Cleaning up and optimizing firewall configurations can remove obscurity and improve security, manageability, and performance.

IDG Contributor Network: Barracuda protects industrial IoT with network-based firewall

Network World

How do IoT firewalls protect against such threats? Many industrial IoT systems have open doors that create unintended vulnerabilities. What information could be exposed by open communications protocols? How do hackers identify vulnerable systems? What security resources are available? TCP Port 502 vulnerabilities. Many industrial systems use TCP Port 502, which allows two hosts to establish a connection and exchange streams of data.

Palo Alto Networks: A Next Generation Firewall

CTOvision

The Palo Alto Networks security platform natively brings together all key network security functions, including advanced threat protection, firewall, IDS/IPS and URL filtering. Palo Alto Networks protects thousands of enterprise and governments from cyber threats. They rely on a deep expertise and commitment to innovation to continually enhance their game-changing security platform.

FireMon, Breaking into Australian and New Zealand Markets

CTOvision

We don’t make the firewall, we don’t make the F5 load balancer, we don’t make the Cisco router, but we make them better,” DeBell said. The most significant play for FireMon, according to DeBell, was the move toward next-generation firewall. Mick Stephens, FireMon’s A/NZ regional manager, said that their next-generation firewall process was like getting rid of redundant rulesets and overshadowed rule sets. Katie Kennedy.

Euroclear automates firewall rule management with AlgoSec

Computer Weekly

Post-trade back-office process provider has made the management of firewalls more efficient through security management software

Embrace DBaaS to Speed Up Mobile App Development

CTOvision

Big Data CTO Application Deployment Application Development Application Lifecycle Cloud Computing Cloud Database Cloud platform Cloud services Couchbase Couchbase DBaaS Database-as-a-Service DBaaS DBaaS inside the firewall DBaaS Platform DBaaS provider DBaaS service provider DBaaS services DBaaS Software devops Mobile Apps MongoDB MongoDB-as-a-Service On-premise DBaaS Private DBaaS By Chip Childers.

4 tools for managing firewall rules

Network World

Firewall devices are only as good as the hundreds, or even thousands, rules that govern them. Misconfigurations, unused rules and conflicting rules can cause firewalls to fail in their crucial missions. Firewall security management products can help security managers monitor compliance, orchestrate device policies, optimize rules and manage firewall changes.

What users love (and hate) about 4 leading firewall solutions

Network World

While always an integral part of a company’s security procedures, firewalls are becoming even more important as more companies move to the cloud and software defined networks. A firewall is a network security system that controls and monitors incoming and outgoing network traffic, based on preset security parameters. Firewalls create a barrier between a secure internal network and a potentially less-secure outside network.

Juniper Unveils New Software-Defined Secure Networks Offerings

Data Center Knowledge

New containerized SRX and virtual SRX provide enhanced firewall capabilities Read More. Shared

CenturyLink Launches Shanghai Data Center, its First in Mainland China

Data Center Knowledge

Location important for clients who have to stay within the Great Firewall of China Read More. Asia-Pacific CenturyLink Featured Services

New products of the week 3.6.17

Network World

A10 Networks Thunder CFW, with integrated Gi/SGi firewall capabilities Image by a10 To read this article in full or to leave a comment, please click hereNew products of the week Image by Certa Our roundup of intriguing new products.

How to install Config Server Firewall on CentOS 7

Tech Republic Security

Although the default firewall in CentOS is powerful, there's a more flexible option available. Jack Wallen walks you through the steps for installing Config Server Firewall

Why CIOs May Be The Company's Biggest Security Risk (a chief information officer needs an IT strategy to create IT alignment)

The Accidental Successful CIO

The definition of information technology tells us that we need to use firewalls to keep the bad guys out and strict corporate policies to restrict just exactly what can be connected to the corporate network. Your actions may be inviting danger into the company.

SS8’s time machine is designed to automate the hunt for compromises  

Network World

Prevention largely depends on knowing what is bad and priming security devices like firewalls and intrusion prevention systems with the rules necessary to keep bad stuff out. The problem is, something can be bad but nobody knows it yet, so there’s no rule to put in the firewall. This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe.