Firewall Feud Lunch & Learn


FireMon is surveying security pros across the country about their biggest challenges with firewall policy management. Join FireMon in a city near you as their experts reveal the top answers and share firewall management best practices for tackling them head on! Why Running Multiple WordPress Firewalls is a Bad Idea ( Technology › Apple hack exposes flaws in building apps behind 'Great Firewall' (

WEBINAR: The Impact of Firewall Sprawl


Register >> Network firewalls have long been established as the ubiquitous first line of defense for every organization’s network security strategy. Sprawling deployments of firewalls and other security devices that increase complexity, cost and risk. Security teams and business leaders alike need to understand the impacts of sprawl and how a strategic solution delivering visibility, intelligence and automation can help organizations: Overcome complexity.

Kicking the Tires: Verisign DNS Firewall


Cognitio has been evaluating the new Verisign DNS Firewall along with its Recursive DNS service for the last several weeks. Our bottom line conclusion: Integration of the Verisign DNS Firewall into an existing environment couldn’t be more seamless, configuration and management are a breeze, and it delivers immediate benefit to the security posture of any environment. For more information on the DNS Firewall and other Verisign Security Services check out their website: [link].

Euroclear automates firewall rule management with AlgoSec

Computer Weekly

Post-trade back-office process provider has made the management of firewalls more efficient through security management software

Palo Alto Networks: A Next Generation Firewall


They rely on a deep expertise and commitment to innovation to continually enhance their game-changing security platform. The Palo Alto Networks security platform natively brings together all key network security functions, including advanced threat protection, firewall, IDS/IPS and URL filtering. Palo Alto Networks protects thousands of enterprise and governments from cyber threats.

Which firewall security management solution is best for your needs?

IT Toolbox

Which firewall security management solution is best for your needs? IT Central Station is a crowdsourced enterprise tech reviews

How have network firewalls evolved?

Network World

Firewalls have become ubiquitous across the enterprise IT landscape because of their proven ability to stop bad traffic from entering corporate networks and protect a company’s most valuable assets. So how have firewalls evolved over the years and what are the latest trends in firewall security

Spending On Application Security Tools To Grow Over 16% Annually

Forrester IT

Security and risk decision makers are spending more on application security and increasing deployment of application […]. application security web application firewallsHackers go after web applications because they are typically the most vulnerable. In fact, web application was the top data breach type, accounting for almost one in five confirmed data breaches, according to Verizon’s 2018 Data Breach Investigations Report.

The best enterprise level firewalls: Rating 10 top products

Network World

You need a network-security tool that examines the flow of packets in and out of the enterprise, governed by rules that decide whether that flow is safe, malicious or questionable and in need of inspection. You need a firewall. Recognizing that you need a firewall is the first – and most obvious -- step. The next crucial step in the decision-making process is determining which firewall features and policies best-suit your company’s needs.

Why firewalls are not recommended for securing SCADA systems

Tech Republic Security

SCADA systems need to be secure, yet according to one expert, firewalls are not up to the task, and should be replaced with Unidirectional Security Gateways. Learn what to look for in a USG

5 ways to create a secure firewall

Tech Republic Security

Firewall management can be a complicated and risky process if not performed carefully. Here are five tips to help you build a successful strategy

Palo Alto Networks: Proactively Averting Cyber Attacks


It''s important to utilize every form of security to get closer to proactive prevention. Their trifecta of Next Generation Firewall, Threat Intelligence and Advanced Endpoint Protection, can be the key to proactive mitigation of the cyber threat. By Charles Hall.

5 open source alternatives for routing/firewall

Network World

These open source products deliver simple routing and networking features, plus they are combined with security functionality, starting with a basic firewall and possibly including antivirus, antispam and Web filtering.

Are next-generation firewalls legacy technology?

Network World

A few years ago, next-generation firewalls (NGFWs) came out of nowhere to become a network security staple. These devices combined traditional L3/L4 packet filtering with deep packet inspection, IPS, and other network security services along with knowledge about users and applications. This broad functionality packaging changed the network security paradigm—everyone needed, or at least wanted a NGFW at the perimeter or within the internal network.

4 tools for managing firewall rules

Network World

Firewall devices are only as good as the hundreds, or even thousands, rules that govern them. Misconfigurations, unused rules and conflicting rules can cause firewalls to fail in their crucial missions. Firewall security management products can help security managers monitor compliance, orchestrate device policies, optimize rules and manage firewall changes.

What to consider when deploying a next-generation firewall

Network World

Firewalls have become ubiquitous across enterprises over the past decade, but the combination of new and varied access methods combined with increasingly sophisticated attacks has forced network operators and security professionals to constantly evaluate their defenses. MORE AT NETWORK WORLD : What is a firewall? +

How OPM Could Have Avoided the Data Breach


Recently, a data breach at the Office of Personnel Management ( OPM ) demonstrated once again the vulnerability of data and how even when an organization has seemingly deployed the right tools, security holes can be exploited to gain access to highly sensitive information. While the initial intrusion mostly impacted Department of Homeland Security ( DHS ) personnel, it was first detected in September, and it took DHS seven months to conclude their investigation.

Cisco discloses PIX firewall, IOS software security holes

Network World

Cisco has warned of a high priority security hole in its IOS software that could have let attackers snatch memory contents from a variety of products that could lead to the disclosure of confidential information. Specifically Cisco said the vulnerability is due to “insufficient condition checks in the part of the code that handles [Internet Key Exchange] IKEv1 security negotiation requests.

Protect SaaS Applications with Cloud-Based Security

Information Week

The massive amount of sensitive data being processed by SaaS applications requires new approaches to security, including cloud-based next generation firewalls

Review: 5 open source alternatives for routers/firewalls

Network World

Plus, they are combined with security functionality, starting with a basic firewall and possibly including antivirus, antispam and Web filtering. Open source software offers an economical and flexible option for deploying basic home, SMB or even enterprise networking. These open source products deliver simple routing and networking features, like DHCP and DNS.

Face-off: Cisco vs. Fortinet for enterprise firewalls

Network World

Firewalls have been on the front lines of network security for 25 years. Today, two of the top enterprise firewalls are Cisco’s Adaptive Security Appliance (ASA) and Fortinet’s Fortigate, according to reviews by users in the IT Central Station community. Cisco’s answer is Cisco Security Manager (CSM). Over time they’ve evolved beyond simple packet filtering to take on a wider and deeper variety of tasks to block modern threats.

Cisco starts patching firewall devices against NSA-linked exploit

Network World

Cisco Systems has started releasing security patches for a critical flaw in Adaptive Security Appliance (ASA) firewalls targeted by an exploit linked to the U.S. National Security Agency. The exploit, dubbed ExtraBacon, is one of the tools used by a group that the security industry calls the Equation, believed to be a cyberespionage team tied to the NSA.

Fight firewall sprawl with AlgoSec, Tufin, Skybox suites

Network World

New and innovative security tools seem to be emerging all the time, but the frontline defense for just about every network in operation today remains the trusty firewall. They aren’t perfect, but if configured correctly and working as intended, firewalls can do a solid job of blocking threats from entering a network, while restricting unauthorized traffic from leaving. The problem network administrators face is that as their networks grow, so do the number of firewalls.

How Google reinvented security and eliminated the need for firewalls

Network World

It had the typical defensive security posture based on the concept that the enterprise is your castle and security involves building moats and walls to protect the perimeter. Without much of a detailed business plan or cost/benefit analysis, Google execs gave the green light to an ambitious project aimed at totally reinventing the company’s security infrastructure. SAN FRANCISCO -- In some ways, Google is like every other large enterprise.

Video: How an IoT firewall can protect your smart office from cyber-attacks

Tech Republic Security

Leon Kuperman, CTO of CUJO IoT Security, why your small business and home office needs a firewall, and why your ISP can't protect you from bad IPs, phishing links, and sites loaded with malware

Cisco touts next-gen firewall gear for midsize installations

Network World

Cisco is coming out with four next-generation firewall boxes aimed at giving smaller organizations protection that is better sized to their needs and engineered to minimize performance hits as additional security services are turned on. The devices make up a family called the Cisco Firepower 2100 series and are built around dual, multi-core processors.

Microsegmentation – Secure Your Internal Network


The problem is that threat actors are able to get through the castle gates (firewalls) and once in, are able to evade the castle guards (IPS). Since 2000, secure networks have been built by segmenting traffic at the switch port level from server to server, radically limiting east-west traffic.

What users love (and hate) about 4 leading firewall solutions

Network World

While always an integral part of a company’s security procedures, firewalls are becoming even more important as more companies move to the cloud and software defined networks. A firewall is a network security system that controls and monitors incoming and outgoing network traffic, based on preset security parameters. Firewalls create a barrier between a secure internal network and a potentially less-secure outside network.

5 Tips to Start a Lucrative Career in Cyber Security

Doctor Chaos

Information Security professionals are akin to our policemen. They are equipped with advanced firewalls and porn filters, secure email and web traffic gateways, encryption keys, IPS signatures, security policies, and intrusion detection systems.

BlackNurse attack: 1 laptop can DoS some firewalls, bring down big servers

Network World

An attacker doesn’t need an IoT botnet or massive resources for a denial of service attack to knock large servers offline; researchers warned that all it takes is one laptop for a “ BlackNurse ” attack to bring vulnerable Cisco, SonicWall, Palo Alto and Zyxel firewalls to their knees.

Java and Python FTP attacks can punch holes through firewalls

Network World

The Java and Python runtimes fail to properly validate FTP URLs, which can potentially allow attackers to punch holes through firewalls to access local networks. On Saturday, security researcher Alexander Klink disclosed an interesting attack where exploiting an XXE (XML External Entity) vulnerability in a Java application can be used to send emails.

Firemon: Providing proactive security intelligence and governance over your IT


With this post we are initiating coverage of Firemon, provider of proactive security intelligence and governance capabilities. Firemon enables enterprises to continuously analyze, visualize and improve the capabilities of your existing network security infrastructure.

Infoblox Unveils Secure DNS Server

Data Center Knowledge

DNS servers inside the data center have become targets because firewalls don’t inspect DNS queries. SecurityInfoblox unveiled an appliance that can detect and block DNS attacks. Read More.

A Flicker Of Light: A new security stack points the path to safety


Defense-in-depth, the gold standard in cyber security, has failed. The basis behind defense-in-depth is to deploy redundant layers of security products to defeat every part the cyber kill chain. Conceptually the new security stack is a hardware-based virtual enclave.

FireMon, Breaking into Australian and New Zealand Markets


Todd DeBell, FireMon’s vice-president of worldwide channel sales and distribution, told ARN that "the vendor was born out of this professional services play from FishNet , one of the largest managed services security providers in the US.” FireMon’s solution allows for the administrator or the MSSP bridge the security gaps. We don’t make the firewall, we don’t make the F5 load balancer, we don’t make the Cisco router, but we make them better,” DeBell said. Katie Kennedy.