How do you create a honeypot for a cyber-criminal? Install Fortinet’s FortiDeceptor (what an uncreative but awesome and effective name. I may have come up with Fortinet Deceptacon or something.) Fortinet makes it easy to find out who is attacking your network and how they are attempting to attack your network. Why? So that you […]
FortiManager 6.4 makes SD-WAN scalable and EASY!
Recently, as I prepared for the Fortinet Network Security Expert 5 certification, I spent a lot of time learning the detailed intricacies of using the FortiManager network orchestration tool to deploy large-scale SD-WAN networks. FortiManager is designed to make deploying hundreds and even thousands of sites easy and simple. SD-WAN is designed to route traffic […]
Fortinet NSE 3 Certification
When COVID-19 shut everything down, I decided it was a good time to get caught up on some of my certifications. The first certifications I tackled were my Fortinet Network Security Expert 1-3 certifications. I have been working with firewalls and security for well over 25 years, so luckily I was able to quickly complete […]
Why Sandboxing is important to network security
What is Sandboxing? Sandboxing is the process of isolating suspected software code so that it can be examined to determine its properties and characteristics, without risking malware infection of valuable internal compute assets. This can be done in an appliance or virtual machine. The sandbox allows the code to run and observes the behavior, then […]
How do you know your CT is hacked?
How do you know your CT (or MRI, ultrasound, portable x-ray) is not hacked? Do you monitor traffic in and out of the device to look for anomalies? Do you have any visibility into the packets and traffic going to or coming from the device? Do you just assume that your hospital firewall security is […]