Author: Ken Dang

Ken Dang

About: Ken Dang

Website
Profile
Ken Dang has well over 12 years of technology product management and product marketing experience creating and directing product development and launch strategies for new product introductions. He is specialized in the network and information security, data management, data protection, disaster recovery and storage industry. Ken is currently the Product Marketing Manager principally responsible for managing and driving the product marketing lifecycle for SonicWall’s enterprise firewall and policy and management product lines.
With the number of attempted web attacks ranging up to millions over the course a year, you need to ensure web application security. You need a Web Application Firewall (WAF) solution that protects both your public and internal web properties. Why you need a web application firewall Today’s businesses strive to provide the highest possible service experience and engagement through different types of interactive web applications and user-friendly mobile applications.
FacebookTwitterGoogle+LinkedIn
To keep pace with innovations and modernize data center operations and services, businesses are embracing today’s application-centric, virtualized world. Virtualization and cloud can cut costs and increase efficiency and operational agility. Four common pitfalls of modern virtual environments However, advantages in savings and efficiency must be weighed against applying constrained budgets to prevent potential damages due to growing threats and common pitfalls.
FacebookTwitterGoogle+LinkedIn
Since the shocking announcement of serious Meltdown and Spectre vulnerabilities in early 2018, we have yet to hear of a mega-breach that would signal the start of another vicious hacking year. Has it been luck? Are our network security defenses stronger? Or are current hacks hiding their efforts? Whatever the situation, the expectations from lessons learned in historical security events are that hacking tools will evolve and new threat vectors will emerge — year after year.
FacebookTwitterGoogle+LinkedIn
Keeping organizations running safely, while improving business and user productivity in today’s accelerating threat environment, continues to be a non-trivial task for IT leaders. At the current pace of cyber attacks, we understand all too well that the effects of recent events, such as the Equifax, WannaCry and NotPetya attacks, have demonstrated their capacity to change the global business environment from normal to total hysteria in the blink of an eye.
FacebookTwitterGoogle+LinkedIn
The earliest schemes of cryptography, such as substituting one symbol or character for another or changing the order of characters instead of changing the characters themselves, began thousands of years ago.  Since then, various encoding and decoding systems were developed, based on more complex versions of these techniques, for the fundamental purpose of securing messages sent and received in written or electronic forms for all sorts of real world applications.  
FacebookTwitterGoogle+LinkedIn
Some consider WannaCry to be the first-ever, self-propagating ransomware attack to wreak havoc across the globe. The chaos that followed is yet another harsh wake-up for many, in a situation far too familiar.  Only this time, the victims are new, the infection spreads more rapidly, the effects are far-reaching and the headlines are bigger. 
FacebookTwitterGoogle+LinkedIn
Times are extremely restless for security teams as they face highly motivated adversaries, and the onslaught of very active and progressive cyber-attacks.  Today’s hacking techniques are stealthy, unpredictable in nature and waged by skillful attackers capable of developing innovative ways of circumventing security defenses. One new and more popular way that is becoming a status quo among malware writers today is the malicious use of encryption.
FacebookTwitterGoogle+LinkedIn
Sonic OS Breach Prevention
There is no end to the danger of cyber-criminal activities, as long as there is an underground marketplace that makes it almost impossible for authorities to intervene and enforce law and order.  We continue to see our adversaries relentlessly going after money by developing and experimenting with different methods and tools against new and existing vulnerabilities, in preparation for the next phase of their business model.
FacebookTwitterGoogle+LinkedIn
Fingers typing on a keyboard with a computer in the background
Preventing your organization from being the victim of an inevitable cyber-attack is paramount so it is important for us to kick off this blog with an important risk question. Do you know whether or not your organization‘s firewall is inspecting HTTPS traffic traversing its networks? I have polled this question on numerous webinars I have conducted over the past year.
FacebookTwitterGoogle+LinkedIn
The recently publicized Distributed Denial of Service (DDoS) attacks on the Domain Name System (DNS) service provider Dyn involved large numbers of IoT (Internet of Things) botnets. These attacks took many high traffic websites such as Twitter, Spotify and Netflix temporarily offline. Contrary to conventional wisdom, recent reports suggest this attack could be the largest of its kind carried out by amateur hackers as opposed to someone with skills that are more sophisticated.
FacebookTwitterGoogle+LinkedIn