application security


Security vendors have been touting the advantages of next-generation firewalls (NGFW) that provide application inspection for several years now. As application traffic became more prevalent, criminals found that hiding malware inside application traffic was an excellent way to bypass traditional security. They still do. But now, application traffic is ubiquitous. The number of devices on our networks is growing exponentially, along with the volume of application and transactional traffic. While much of it is still passing through the traditional... [Read More]
by RSS John Welton  |  Jun 28, 2016  |  Filed in: Industry Trends
Security vendors have been touting the advantages of next-generation firewalls (NGFW) that provide application inspection for several years now. As application traffic became more prevalent, criminals found that hiding malware inside application traffic was an excellent way to bypass traditional security.  They still do. But now, application traffic is ubiquitous. The number of devices on our networks is growing exponentially, along with the volume of application and transactional traffic. While much of it is still passing through the traditional... [Read More]
by RSS Mark Byers  |  Jun 09, 2016  |  Filed in: Industry Trends
Anonymous browsing with Tor presents serious challenges for IT as well as possible opportunities for organizations that need it. One of my best friends growing up was named Tor. He was Norwegian through and through and looked like he could wield a giant hammer (for those of you without any Scandinavian stock in you, Tor is the traditional Anglicized spelling of Thor). This blog isn’t about him. Just a good story. Anyway, what we’re talking about here is the Tor Browser and the related Tor protocol that enables anonymous web browsing... [Read More]
by RSS Chris Dawson  |  Jan 21, 2015  |  Filed in: Industry Trends
Deutsche Telekom's interactive, real-time map of global cyberattacks reveals the bulk of recent attacks -- 27.3 million in February alone -- were against the Server Message Block (SMB), aka the Common Internet File System (CIFS). Reuven Harrison, CTO and co-founder of Tufin, a security and lifecycle management company and Fortinet solution partner, wrote in a blog that the map's revelations are significant. This attack vector, he explains, operates across an application-layer network protocol mainly used to provide shared access to files, printers,... [Read More]
by RSS Stefanie Hoffman  |  Jul 30, 2012  |  Filed in: Industry Trends
Application security: It's something that no network can live without, especially in the age of Web 2.0. But what is application security exactly and what is its role in the enterprise? While most users have a very concrete understanding of most standard security measures, such as antivirus, firewalls and intrusion prevention, the definition of application security seems to be a bit more nebulous, if not more misunderstood, with the emergence of Web 2.0 and the explosion of social, interactive and streaming media. So here's a bit of a tutorial. Application... [Read More]
by RSS Stefanie Hoffman  |  Mar 29, 2012  |  Filed in: Industry Trends
[Read More]
by RSS Rick Popko  |  Aug 18, 2010  |  Filed in: Security Research
What's the difference between application visibility and true application security? In the below video, Rick Basile, Fortinet's senior director of technical services, chats with analyst Richard Stiennon about how the two approaches greatly differ, how a safe application could pose a threat to networks, and protection methods for applications in use by enterprises. (Click the picture to watch the video) [Read More]
by RSS Rick Popko  |  Aug 19, 2009  |  Filed in: Security Research