FortiGate Moves to the Leader’s Quadrant

  • in Blog Posts
  • by
  • July 13, 2017
  • Comments Off on FortiGate Moves to the Leader’s Quadrant

Fortinet’s FortiGate solution has just shifted into the leader’s quadrant in the 2017 Gartner Magic Quadrant for Enterprise Network Firewalls report. This report acknowledges the ‘completeness’ of our Security Fabric vision, along with our ability to execute, as factors for our advanced placement. We believe the Magic Quadrant results provide Continue Reading

What’s NEW in Parallels RAS v16

  • in Blog Posts
  • by
  • July 12, 2017
  • Comments Off on What’s NEW in Parallels RAS v16

Parallels RAS v16 – Version 16 of Parallels® Remote Application Server (RAS) continues to offer the best value among application and desktop delivery solutions, with several improvements that affect the performance and ease of use of the software. These across-the-board improvements especially affect virtual desktop infrastructure (VDI) deployment, offering application Continue Reading

Considering the Cloud? Five Questions to Ask

  • in Blog Posts
  • by
  • July 12, 2017
  • Comments Off on Considering the Cloud? Five Questions to Ask

The cloud is an increasingly attractive prospect for federal agencies, but many still have unanswered questions about how public cloud security stacks up. With the president’s recent cybersecurity executive order emphasizing the shift to the cloud, agencies will have to move quickly to comply. Below are five questions that federal Continue Reading

Petya’s Master Boot Record Infection

  • in Blog Posts
  • by
  • July 11, 2017
  • Comments Off on Petya’s Master Boot Record Infection

Last week we started our technical analysis on Petya (also called NotPetya) and its so-called “killswitch.” In that blog post we mentioned that Petya looks for a file in the Windows folder that has the same filename (no extension) as itself (for example: C:WindowsPetya). If it exists, it terminates by Continue Reading

Key Differences Between Petya and NotPetya

  • in Blog Posts
  • by
  • July 11, 2017
  • Comments Off on Key Differences Between Petya and NotPetya

There have already been a lot of write-ups for the NotPetya malware. This article is just a supplement for what is already out there. Our focus is to highlight some key differences between a previous strain of the Petya ransomware and the malware that scared everyone a few weeks ago, Continue Reading

Python 3.6.2rc2 is now available for testing

  • in Blog Posts
  • by
  • July 10, 2017
  • Comments Off on Python 3.6.2rc2 is now available for testing

Python 3.6.2rc2 is now available.   Python 3.6.2rc2 is the second release candidate for the next maintenance release of Python 3.6.  See the change log for Python 3.6.2rc2 for the changes included in this release and see the What’s New In Python 3.6 document for more information about features included in the 3.6 series. Continue Reading

WannaCry and Petya: The Circus Comes to Town

  • in Blog Posts
  • by
  • July 8, 2017
  • Comments Off on WannaCry and Petya: The Circus Comes to Town

By now, you will have all heard about the rampant spread of ransomware through countless press pieces, blog articles, and far too often, the outrageous claims of some security vendors.  But let’s stop and think for a minute or two. How did these attacks happen? Are companies focusing on valid Continue Reading

MiniShift as a Development Environment for Node.js on OpenShift

  • in Blog Posts
  • by
  • July 7, 2017
  • Comments Off on MiniShift as a Development Environment for Node.js on OpenShift

On a recent client project, our team was tasked with setting-up local development environments for a new Node.js-based microservices system that would eventually be deployed on Red Hat’s OpenShift platform. We’ve found a good approach using the MiniShift project and we’ve put together a demo with some accompanying documentation about Continue Reading

Wildcard Certificates Coming January 2018

  • in Blog Posts
  • by
  • July 7, 2017
  • Comments Off on Wildcard Certificates Coming January 2018

Let’s Encrypt will begin issuing wildcard certificates in January of 2018. Wildcard certificates are a commonly requested feature and we understand that there are some use cases where they make HTTPS deployment easier. Our hope is that offering wildcards will help to accelerate the Web’s progress towards 100% HTTPS. Let’s Continue Reading

Amman-based United Insurance Boosts Business Growth with 3CX PBX

  • in Blog Posts
  • by
  • July 7, 2017
  • Comments Off on Amman-based United Insurance Boosts Business Growth with 3CX PBX

LONDON, UK 07 JULY 2017 –  3CX, developer of the next-generation software-based Unified Communications system, is pleased to announce that Amman-based United Insurance company has successfully completed deployment of its IP PBX solution. Established in 1972, United Insurance has gone on to become one of the leading insurance companies in Jordan and specializes Continue Reading

Page 4 of 129« First...23456...102030...Last »