How to configure a SSL-VPN with certificate authentication on a FortigateThis guide details the steps to configure an SSL VPN with certificate authentication on a Fortigate device, using OPENSSL to generate the necessary CA and certificates. Key steps include generating a root certificate, creating server and client certificate signing requests (CSRs), signing the CSRs, and importing the certificates into the Fortigate. The guide also covers configuring PKI users, SSL-VPN settings, and troubleshooting commands.
Checklist for Fortigate admin access over SSL-VPNThe checklist for Fortigate admin access over SSL-VPN includes ensuring trusted hosts are configured, allowing access on the interface, establishing a firewall policy from the SSL-VPN interface to the LAN, and verifying the routing table for proper connectivity. Specific configuration commands are provided for each step to facilitate the setup process.
4 tabletop exercises every security team should run | CSO OnlineSecurity teams should run tabletop exercises to prepare for ransomware, third-party risks, insider threats, and distributed denial-of-service (DDoS) attacks. These exercises help identify vulnerabilities, improve response strategies, and ensure compliance with regulatory requirements. Key questions for each scenario include data encryption, partner vetting, insider threat detection, and DDoS mitigation plans. Regularly conducting these exercises with relevant stakeholders, including legal and communications teams, enhances overall cybersecurity readiness.
AC-Hunter™ Community Edition - Active CountermeasuresAC-Hunter™ Community Edition is a free version of AC-Hunter that provides threat hunting functionality with some limitations. It offers the same powerful threat hunting analytics and network insights as the paid Enterprise Edition. Users can choose between an install script or a VMWare virtual image based on their specific use case. AC-Hunter Enterprise and AC-Hunter Community Edition are compared in a chart, and users are also directed to other threat hunting tools.
10 cybersecurity frameworks you need to know about - Help Net SecurityThis article highlights 10 essential cybersecurity frameworks that organizations should be aware of and implement to protect their digital assets. These frameworks include the NIST Cybersecurity Framework, ISO/IEC 27001, CIS Critical Security Controls, COBIT, CSA Cloud Controls Matrix, HITRUST CSF, Katakri, PCI DSS, SOGP, and Secure Controls Framework. Each framework offers a structured and strategic approach to managing cybersecurity risks and enhancing an organization's cybersecurity posture.
PNETLab : Lab is SimpleTo use PNETLab, download the .ova file and deploy it on virtualization platforms like VirtualBox or VMWare. Make sure to enable virtualization in your BIOS. After deployment, register and login to access the PNETLab box through your browser. You can choose between online and offline mode, with offline mode not requiring registration. In the PNETLab box, you can go to the store to download free labs and practice them. The labs come with lab files, workbooks, and instructions on how to use the console.
5 Best Open Source SIEM Tools | MezmoThis post discusses the 5 best open-source SIEM tools for organizations looking to mitigate cybersecurity risks and detect threats. The featured SIEM solutions include AlienVault OSSIM, MozDef, Wazuh, Prelude OSS, and Sagan, each with its own unique features and advantages. The post emphasizes the importance of finding a SIEM that suits specific needs and offers effective threat detection capabilities.
Create and host a tunnel - Microsoft dev tunnels | Microsoft LearnLearn how to create and host a dev tunnel using Microsoft's devtunnel CLI tool. This article provides step-by-step instructions for installing the CLI on different operating systems, logging in, hosting a dev tunnel, and connecting to it. With dev tunnels, you can securely test and debug web apps and webhooks from anywhere.