Fortinet and TAA Compliance: Exceeding Best Practices

Fortinet and TAA Compliance: Exceeding Best Practices

Like many companies that sell to the United States Federal government, Fortinet adheres to the rules related to the Trade Agreements Act (TAA). The TAA was enacted in 1979 to foster fair and open international trade, based on trade agreements between the United States...
Vendor Workspace, Don’t Leave Home Without It

Vendor Workspace, Don’t Leave Home Without It

So, you’re in negotiations with Microsoft for a renewal and have investments across on-premises applications, Microsoft O365 and Azure—how do you leverage your current customer acumen in tandem with deep product knowledge to avoid ending up with an uncomfortable...
JSON Web Token attacks and vulnerabilities

JSON Web Token attacks and vulnerabilities

JSON Web Tokens (JWTs) provide a way to securely exchange data using JSON objects. They are often used in authorization because they can be signed, verified, and therefore trusted – but only if implemented correctly. Here is a technical deep dive into JSON Web Token...
Infographic: Securing Devices with MetaDefender Drive

Infographic: Securing Devices with MetaDefender Drive

The COVID-19 pandemic created new challenges and cyber risks for businesses across many industries. The transition to working from home – and now back to the office – have created a wide range of cyber attack vectors through personal and unauthorized...
Microsoft signed a malicious Netfilter rootkit

Microsoft signed a malicious Netfilter rootkit

What started as a false positive alert for a Microsoft signed file turns out to be a WFP application layer enforcement callout driver that redirects traffic to a Chinese IP. How did this happen? Last week our alert system notified us of a possible false positive...