Ronald Bartelshubandspoke.amastelek.com·Dec 19, 2024🧱🔥Simplifying Vulnerability Scanning Across Multiple DMZs on a Fortinet Firewall🚒In today’s complex network environments, businesses often use multiple DMZs to isolate different public-facing services for enhanced security. However, running vulnerability scans across these DMZs can become challenging, particularly when managing a...7 likesVulnerbility Scanning
Ronald Bartelshubandspoke.amastelek.com·Nov 25, 2024🐍PPPoE Servers | Why MikroTik Falls Behind Cisco, Fortinet, & Accel-PPP 🐦⬛Point-to-Point Protocol over Ethernet (PPPoE) is a widely used technology in last-mile access networks, offering benefits like authentication, rate limiting, and usage tracking. However, not all PPPoE implementations are created equal. When comparing...1 likeAccel-ppp
Tran Hoang PhongforFIS Securityblog.fiscybersec.com·Nov 17, 2024Citrix và Fortinet cập nhật các bản vá bảo mật quan trọngNgày 12/11/2024, Citrix và Fortinet đã công bố bản vá cho hơn một chục lỗ hổng bảo mật, bao gồm các lỗ hổng nghiêm trọng ảnh hưởng đến NetScaler và FortiOS. 1. Chi tiết thông tin lỗ hổng của Citrix Citrix đã phát hành bản sửa lỗi cho: Hai lỗ hổng tr...66 readsNewslettersFortinet
Ronald Bartelshubandspoke.amastelek.com·Nov 16, 2024🫥Why Fusion’s SD-WAN Outshines Competitors with Its Comprehensive Debug Mode🦟In the world of networking, effective troubleshooting can make or break a business’s connectivity strategy. When issues arise, having the right tools to identify and resolve the root cause is critical. Fusion’s SD-WAN sets itself apart from competito...2 likesdebug
Ronald Bartelshubandspoke.amastelek.com·Nov 15, 2024🗣️Why Elastic IP in a Hub-and-Spoke Architecture is the Ideal Solution for Uninterrupted Connectivity in SD-WAN🎙️In the fast-evolving world of networking, maintaining seamless connectivity across geographically dispersed locations is crucial. An elastic IP (also known as a floating IP) offers a flexible and resilient solution for maintaining a consistent endpoi...10 likesvoip
Ronald Bartelshubandspoke.amastelek.com·Nov 8, 2024🥷Fortinet’s Persistent Vulnerabilities | A Persistent Threat & Essential Mitigations🥸Over recent years, Fortinet’s infrastructure has faced numerous, often critical vulnerabilities, many of which are actively exploited and recurrently flagged by CISA as among the most widely exploitable. In some cases, Fortinet vulnerabilities outpac...10 likesFortinet
Nguyễn Văn TrungforFIS Securityblog.fiscybersec.com·Oct 26, 2024Fortinet Cảnh Báo Lỗ Hổng Zero-Day Nghiêm Trọng Trong FortiManagerFortinet đã công bố công khai một lỗ hổng API nghiêm trọng trong FortiManager, được theo dõi với mã CVE-2024-47575, đang bị khai thác trong các cuộc tấn công zero-day để đánh cắp các tệp nhạy cảm chứa cấu hình, địa chỉ IP và thông tin đăng nhập của c...31 readsthreat intelligence
Ronald Bartelshubandspoke.amastelek.com·Jul 15, 2024🧱Firewall Carpet Bombing is Bad for your Business💣Firewalls are simplistic security devices that have been around since the start of the Internet. They are a necessary component in an overall solution but not the definitive answer to information security problems. They have a minimalist set of featu...4 likesFirewallsCarpet Bombing
Ronald Bartelshubandspoke.amastelek.com·Jul 6, 2024👀Who Is Watching the Firewall?♨️In the ever-evolving landscape of cybersecurity, firewalls stand as the first line of defense against malicious actors. However, the unfortunate reality is that many businesses adopt a "set it and forget it" approach to their firewall installations. ...10 likesFirewallsFirewalls
Ronald Bartelshubandspoke.amastelek.com·Jun 14, 2024⚒️Busting SD-WAN Myths & going Beyond Gartner's Magic Quadrants 📈When I was a teenager at Grey College we could go to the local CNA stationary and bookstore and buy a small booklet in the form of a study guide of the play by Shakespeare which had been prescribed that year. It gave you enough information to pass th...10 likes·43 readsMagic Quadrant