Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Beam OSS: Easily Make your Infra Private Using AWS SSM

Beam is an OSS project that simplifies secure access to private infrastructure within non-public VPC environments. It replaces the traditional bastion host approach with AWS Systems Manager (SSM) for access, ensuring better security and user-friendliness, especially in dynamic environments with changing resources and multi-tenancy requirements. Beam eliminates the complexities of configuring SSM access, making it an accessible solution for various applications and environments while maintaining security best practices. Today Beam is available for AWS (SSM) and will expand to Google's Identity-Aware Proxy (IAP).

ZTNAs Address Requirements VPNs Cannot. Here's Why.

‍ When organizations were forced to shift to remote work during the pandemic, they needed a quick-fix solution that would enable their remote employees to securely access work resources. For many, this solution came in the form of VPNs. However, VPNs were not designed for the bring your own device (BYOD) and cloud app security use cases. While VPNs can provide remote access, it may come as a surprise that they fall short when it comes to security.

What is NQE?

Using Network Query Engine, Forward Enterprise users can start querying their network without knowing which vendors are present and search for what they want to report on without worrying about the different ways to capture and parse this information in a multi-vendor environment. This gives the network and security operators access to normalized and structured data that is easy to consume and generate reports on to answer questions that were next to impossible to answer without access to this structured data.

Dollars and Sense - Why SD-WAN is right for financial services

It is no surprise that across the financial services industry a steady increase in cloud adoption has taken place in recent years. This trend is expected to continue and grow as organizations look to replace aging, traditional technology. For financial organizations, these changes taking place impact both business operations and customers. Banking, commerce, transactions — not to mention all of their corresponding data — are part of this transformation.

Cisco IOS XE Privilege Escalation (CVE-2023-20198) - Cato's analysis and mitigation

All secured webservers are alike; each vulnerable webserver running on a network appliance is vulnerable in its own way. On October 16th 2023 Cisco published a security advisory detailing an actively exploited vulnerability (CVE-2023-20198) in its IOS XE operating system with a 10 CVSS score, allowing for unauthenticated privilege escalation and subsequent full administrative access (level 15 in Cisco terminology) to the vulnerable device.

Forward Networks Receives Back-to-Back Honors in Security and Cloud Computing

Forward Networks was recently honored as the Top InfoSec Innovator by Cyber Defense Magazine. Commenting on the win, Yan Ross, editor of Cyber Defense Magazine said, “We scoured the globe looking for cybersecurity innovators that could make a huge difference and potentially help turn the tide against the exponential growth in cyber-crime. Forward Networks is worthy of being named a winner in these coveted awards and consideration for deployment in your environment.”

The Art of Team Building: Blueprints from the Black Hat NOC

It has been a distinct honor to be a part of the Corelight team that helped defend this year’s Black Hat events. I started the event season in the Network Operations Center (NOC) at Black Hat Asia, and then capped it off at Black Hat in Las Vegas. In this blog I’ll share my experience and learnings from participating in both NOCs.

20 Best Network Security Solutions + FAQs

The best security posture is a multi-layered security posture. Enterprise security leaders understand that no single tool or solution can provide best-in-class security to an entire organization on its own. As a result, security leaders continually invest in new security tools and platforms to address a growing list of emerging cyber threats like ransomware, credential-based attacks, and malicious insiders. However, not all network security solutions work together smoothly.