Firewalls

Keep your local data private with these firewall products.

security code big data cyberespionage byte
open source alternatives routing firewall 1

NSA headquarters

Alleged NSA data dump contain hacking tools rarely seen

A stolen cache of files that may belong to the National Security Agency contains genuine hacking tools that not only work, but show a level of sophistication rarely seen.

20151027 openworld dell sign

Dell patches critical flaws in SonicWALL Global Management System

Dell has patched several critical flaws in its central management system for SonicWALL enterprise security appliances, such as firewalls and VPN gateways.

f secure ransomeware

Why ransomware criminals need great customer service

Yes, even bad-guy malware developers have to keep their "customers" happy. Read what happens when F-Secure tests the "help desks" of four crypto-locking malware makers.

Firewall

4 tools for managing firewall rules

Poorly managed firewall rules can lead to security disasters. Here, security managers in the IT Central Station community review the top firewall management suites: Tufin, AlgoSec, FireMon and RedSeal.

computer security

Are you failing Security Basics 101?

Patching, backups, firewall configuration … when it comes to security, make sure you take care of your infrastructure before you invest in next-level tools.

telekom security

Deutsche Telekom to boost security offering for European enterprises

Deutsche Telekom is introducing new services to help prevent "bring your own device" from turning into "bring your own disaster" for corporate networks.

20151005 cisco headquarters sign

Critical VPN key exchange flaw exposes Cisco security appliances to remote hacking

Cisco Systems patched a critical vulnerability that could allow remote attackers to take over Cisco Adaptive Security Appliance (ASA) firewalls configured as virtual private network servers by simply sending malformed network packets...

juniper netscreen 5200 firewall

The Juniper VPN backdoor: buggy code with a dose of shady NSA crypto

Juniper was using a known flawed random number generator as the foundation for cryptographic operations in NetScreen's ScreenOS and the safeguards it put in place were ineffective.

easedropping backdoor listening

After Juniper security mess, Cisco searches own gear for backdoors

While it says it has no reason to think there are backdoors in any of its products, Cisco has started an additional review of code in its products looking for “malicious modifications.”

juniper netscreen 5200 2

Bad actors race to exploit Juniper firewall vulnerability

Now that Juniper has created a patch for its vulnerable firewall/VPN appliances, bad actors are setting to work reverse engineering the flaw so they can exploit devices that users don’t patch, and profit by selling the exploits to...

juniper netscreen 5200 2

Juniper firewalls compromised by spy code: What you need to know

Juniper Networks is warning customers to patch their NetScreen enterprise firewalls against spyware that enables attackers to take over the machines and decrypt VPN traffic among corporate sites and with mobile employees.

juniper netscreen 5200 2

Juniper warns of spying code in firewalls

Juniper, a major manufacturer of networking equipment, said on Thursday it found spying code planted in certain models of its firewalls, an alarming discovery that echoes of state-sponsored tampering.

Security building blocks

Shades of Greynets: The Internet of Secure Things

The plummeting costs of computing is leading to ubiquitous computing with the Internet of Things, security could be the next beneficiary of this revolution.

0 innovation

The most innovative tech products, services

Reader nominations for what security products they felt changed the tech industry.

firewall

Selling IT on getting the most out of a new firewall

The IT department was reluctant to take full advantage of the advanced functionality. So our manager annoyed them into compliance.

cars driving on roadway rear view aa052878

Firewalls can't protect today's connected cars

While the automobile industry pursues more secure internal bus architectures, security experts say no network firewall will ever be totally secure, and it's more important to be able to detect and stop an attack rather than blocking...

Palo Alto service to flag particularly evil security attacks

Palo Alto Networks is introducing a service that tips customers off when it discovers unique or particularly dangerous attacks against their networks, giving them a heads up that perhaps they are the targets of particularly...

SQL injection

Waratek takes on SQL injections with new RASP approach

Companies looking to protect their Web applications from SQL injection attacks typically install a firewall in learning mode and train it to recognize attacks. It's not a perfect solution, but it's been the best available.

Load More