cyber-101
What's the difference between Signals, Transactions, and Indicators?
Clarifying on some vague terminology
cyber-101
Examining how Zscaler processes data for improved efficiency.
cyber-101
A quick intro into the 3 logical layers of Zscaler architecture.
cyber-101
Similar terms. Important differences.
cyber-101
💡This is part of an on-going series in cybersecurity foundations. Check the cyber 101 article tag index from time to time for more content. The FortiGate AV scanning engine relies on virus definitions for some of its traditional analysis. These signatures are stored in AV databases. Depending on what model
cyber-101
Comparing some similar terms in logging
cyber-101
Examining a nifty feature for separating management functions.
cyber-101
Clarifying some popular terms
cyber-101
Unraveling the differences between these two UI modes.
cyber-101
Because in order for logs to be useful, they need to exist...
Cybersecurity and devops questions. Â Answered.
RFCs, lions, and bears. Oh my!
Sounds interesting, right? Let's explore.
A quick tip about interfaces on policies.
Interesting choices...
1... 2... and then 3...
Examples of failover types
A quick reminder on some important IPs.
Walking through the election process for HA units
Comparing policy based routing with SD-WAN on FortiGates.
Exploring a couple popular topics in for FortiGate link state monitoring.
A quick refresher on this critical part of ipsec.
Describing the various components of the FortiGate IPS and signatures.