How Vendors Can Partner with Education to Narrow the Skills Gap: A Call to Action

The U.S. used to be terrible at soccer. The primary reason is that we already had many established sports that we were good at – baseball, football and basketball. Children started playing these sports from a young age, so that by the time they were of recruiting age for the Continue Reading

Private Git Repositories: Part 4 – Hosting Repositories on GitLab

All the discussion around using private Git repositories so far in this series of blog posts has used GitHub as the hosting service. In this post we will look at using private Git repositories hosted on GitLab. From the perspective of how things are done in OpenShift, there is no Continue Reading

FortiDDoS Launches Support for FortiGuard Domain Reputation Service for IoT and Botnet Based DDoS Attack Mitigation

CSPs and Proliferation of DNS Based DDoS Attacks DNS is used in over 91% of malware communication today (vs. direct IP) in order to contact Command & Control (C&C) servers. Phishing attacks that distribute malware also depend heavily on DNS. And recent cases of ransomware attacks, such as last year’s Continue Reading

The Primary Factors Driving Cybersecurity Investments in Education

Today’s schools are technology-rich environments. For example, they have long used internal systems to keep and track a variety of records, including the personal data of their students and faculty. Today, however, that tech infrastructure must be optimized to accommodate the shift to a new digital education model. Teachers are Continue Reading

IP Phone Switching and VLAN Tagging

VLAN tagging can minimize the cabling as well as the switch ports used, to integrate the endpoints in the current network while still separating the Voice network from the Data network. A workstation can be connected via the PC port on the IP phone in the default or different VLAN. Continue Reading

How FortiSIEM Works to Keep Schools Safe

Networks used by educational institutions benefit from being open and promoting a limitless flow of information and ideas. However, much like the student-teacher relationship, the user-network relationship is one that must be built on trust. The extent of personal information and intellectual data that is often housed on these networks Continue Reading

Strengthening the Security Fabric of Blockchain

Blockchain is a shared and continuously reconciled database used to maintain a list of digital records, called blocks. It is quickly becoming an important tool not just for financial information, but also for managing and recording virtually all types of data, such as medical and other records, identity management, and Continue Reading

Improving the Parallel Applier with Writeset-based Dependency Tracking

MySQL 8.0.1 introduces a new mechanism to track the dependencies between transactions. This feature is used to optimize the binary log applier on asynchronous replication slaves, improving the throughput significantly on workloads where there is low-concurrency on the master and/or on systems with very fast storage. Before diving into that Continue Reading

Analysis of PHPMailer Remote Code Execution Vulnerability (CVE-2016-10033

PHP is an open source, general-purpose scripting language used for web development that can also be embedded into HTML. It has over 9 million users, and is used by many popular tools, such as WordPress, Drupal, Joomla!, and so on. This week, a high-level security update was released to fix Continue Reading

>