How do you create a honeypot for a cyber-criminal? Install Fortinet’s FortiDeceptor (what an uncreative but awesome and effective name. I may have come up with Fortinet Deceptacon or something.) Fortinet makes it easy to find out who is attacking your network and how they are attempting to attack your network. Why? So that you […]
Fortinet SD-WAN and the TIC 3.0 standard allows federal agencies to move from a hub-and-spoke network to a much faster software-defined network at a much lower cost. Best part is that SD-WAN capabilities is included with every Fortigate firewall.
Recently, as I prepared for the Fortinet Network Security Expert 5 certification, I spent a lot of time learning the detailed intricacies of using the FortiManager network orchestration tool to deploy large-scale SD-WAN networks. FortiManager is designed to make deploying hundreds and even thousands of sites easy and simple. SD-WAN is designed to route traffic […]
What is Sandboxing? Sandboxing is the process of isolating suspected software code so that it can be examined to determine its properties and characteristics, without risking malware infection of valuable internal compute assets. This can be done in an appliance or virtual machine. The sandbox allows the code to run and observes the behavior, then […]
How do you know your CT (or MRI, ultrasound, portable x-ray) is not hacked? Do you monitor traffic in and out of the device to look for anomalies? Do you have any visibility into the packets and traffic going to or coming from the device? Do you just assume that your hospital firewall security is […]