Micro-segmentation – The solution for security and management in virtual environments

Every day we hear, see or read in the news that a new cyber attack has hit the headlines, affecting busineses small and large, across the world. The penalty is usually ransom in exchange for releasing their data. This has naturally made organizations more concerned about the security of their data, who have taken the…

Getting the Right Firewall Protection for Your Data Centre

The explosive growth in data creation and data storage is set to continue, with Asia Pacific’s data center market increasing significantly and even surpassing the European market by 2021, according to Cushman & Wakefield. The surge in data consumption in the region is currently driving the increase, and mobile data usage has increased in Asia…

Challenges Impacting Advanced Threat Prevention for the Software-Defined Data Center

Few technologies have enhanced business agility and economics as much as data centre virtualization. By abstracting physical servers as software running on a hypervisor, server virtualization has enabled IT to deploy new virtual servers and applications in minutes, speeding time to market for new business services and initiatives. Storage virtualization followed close behind, allowing fast…

Vulnerability Notification: Adobe ColdFusion Deserialization

[Overview] Adobe ColdFusion is a dynamic web server, a rapid application development platform offered by Adobe Systems that contains advanced features for enterprise integration and internet application development. [Vulnerability Details] CVE-2017-11284: This vulnerability is caused by no input validation before the object in the RMI registry is deserialized. An unidentified attacker could exploit this vulnerability…

Vulnerability Notification: Oracle WebLogic Server XmlAdapter Deserialization

[Overview] Oracle WebLogic Server is an enterprise multi-tiered Java application service, commonly used as a large enterprise web application platform. [Vulnerability Details] This vulnerability is exploited due to insufficient validation of serialized XML data by WorkContextXmlInputAdapter. An unauthenticated attacker could exploit this vulnerability by sending carefully crafted HTTP XML requests. Exploiting this vulnerability could result…