Interview with HostAdvice

We had a great opportunity to be interview by HostAdvice a few weeks back. Read more about the ReadySpace approach in helping our customer grow their business using Cloud Services in a recent interview by HostAdvice Thank you Jack Goldstein for this!

How Advanced Threat Protection Can Help Protect Financial Data

Technology integration in the financial services industry has opened opportunities that could only be dreamed of a few decades back. Around the turn of the millennium, we began seeing banks set up websites for internet-based banking, and about a decade later, mobile banking customers began tapping their smartphones to make Continue Reading

Case Study on Enterprise South Liverpool Academy Using Parallels RAS

Parallels RAS empowers students and teachers at Enterprise South Liverpool Academy Enterprise South Liverpool Academy (ESLA) chose the award-winning virtualization solution Parallels Remote Application Server (RAS) for two reasons. The first reason was to find an inexpensive method for delivering education applications to students on tablets or small laptops. The Continue Reading

Incident report on memory leak caused by Cloudflare parser bug

Last Friday, Tavis Ormandy from Google’s Project Zero contacted Cloudflare to report a security problem with our edge servers. He was seeing corrupted web pages being returned by some HTTP requests run through Cloudflare. It turned out that in some unusual circumstances, which I’ll detail below, our edge servers were Continue Reading

Q&A: Securing IoT in the World of Healthcare

According to IBM’s 2016 Cyber Security Intelligence Index report, cyber criminals attacked healthcare more than any other industry last year, with more than 100 million healthcare records being compromised. As the use of IoT devices continues to grow in hospitals, we talked to Roger Bailey about the risks, and how Continue Reading

Did you order those iTunes movies? Nope, it’s just phishing for Canadian Apple users

  • in Blog Posts
  • by
  • February 24, 2017
  • Comments Off on Did you order those iTunes movies? Nope, it’s just phishing for Canadian Apple users

Over the weekend, we encountered an interesting variation of a phishing email targeting Apple users. The email contained an alleged receipt for five movies purchased from the iTunes Store that was so detailed that the user who received it, and who knows better, still almost fell for the scam. Figure Continue Reading

Looking Back at Fortinet’s Security Research and Vulnerability Discoveries

  • in Blog Posts
  • by
  • February 23, 2017
  • Comments Off on Looking Back at Fortinet’s Security Research and Vulnerability Discoveries

In an effort to provide more proactive protections in Fortinet products and to more effectively identify and defeat network threats, the Fortinet security research team works on discovering potential threats in popular products. As a result, over the past year we have discovered 84 vulnerabilities that have been reported to Continue Reading

Three reasons eCommerce companies should frequently update product prices

Every eCommerce company aims to build a sustainable and profitable business. To do so, they should focus on their pricing strategies. Every business, large or small, can benefit from finding new ways to optimize product pricing. But this doesn’t happen by simply assigning a monthly price list to the whole Continue Reading

LiteSpeed Enterprise WebServer for CWP

LiteSpeed Enterprise 30 Day Free Trial! LiteSpeed Enterprise is a high-performance Apache drop-in replacement web server, currently the 4th most popular web server on the internet and the #1 commercial web serverCompatible with commonly used Apache features, including mod_rewrite, .htaccess, and mod_security, LiteSpeed Enterprise can load Apache configuration files directly Continue Reading

Join GitLab's March Issue Bash

There are currently over 6000 open issues on GitLab CE, and we need your help to sort them out! We have over 1500 GitLab contributors, and we want everyone to be able to find issues to work on. Of course, some lucky contributors will be rewarded with awesome swag! Our Continue Reading

Byline: Solving IoT Security – Pursuing Distributed Security Enforcement

For many of us in the Security Industry, the possibility of using Internet of Things (IoT) devices as a launchpad for an attack has been mostly theoretical. However, information obtained after the massive distributed denial-of-service (DDoS) attack against the services offered by DYN.com appears to show that the threat is Continue Reading

Cloud Services For Small Businesses And How To Enable It

Cloud services for small businesses – While cloud computing has been aggressively embraced by medium- and large-scale enterprises, small businesses have been slower to outsource their IT networks, due to budget constraints and lack of technical resources. How do you enable cloud services for small businesses? The advent of cloud Continue Reading

5 modules for optimizing sales

You’ve created a PrestaShop store and selected a popular and trustworthy payment method for customers. You’re also offering buyers delivery services that can match any profile—from the thriftiest to the most hurried—and your store’s design is adapted to your product universe. Congratulations! You’re ready to speed up sales on your Continue Reading

“The king is dead, long live the king”: Our Paxos-based consensus

In this blog post, we will describe our Paxos-based solution, named eXtended COMmunications, or simply XCOM, which is a key component in the MySQL Group Replication. XCOM is responsible for disseminating transactions to MySQL instances that are members in a group and for managing their membership. Its key functionalities are: Continue Reading

Our Big Frontend Plan Revealed

The Frontend at GitLab is getting better and better every day. Today we did two big things, and I’d like to share them with you and our big plans for the future. If you use the GDK, then make sure you update it! If you have no idea what I Continue Reading

MailEnable Version 9.60 Release

RSS: MailEnable Version 9.60 Release MailEnable version 9.60 for Standard, Professional, Enterprise and Premium Editions is available for download from the MailEnable Web Site. The following change list outlines changes in version 9.60: RECENT CHANGES ADD: IMAP provides STARTTLS support ADD: IMAP provides LOGINDISABLED support (to force clients to authenticate Continue Reading

How Does Citrix StoreFront Work? | Parallels Answers

Citrix StoreFront enables IT administrators to provide users with access to virtual desktops, applications and data. StoreFront works with the Citrix Receiver client software to support access to XenDesktop and XenApp servers from Windows, Mac, Apple iOS, Google Android, Linux and HTML5 endpoints. In this article we will review the solution Continue Reading

How To Reduce IT Costs With Parallels Remote Application Server

To optimize resources in an era of shrinking  IT budgets, IT network administrators are finding that there are many advantages to implementing a comprehensive virtualization solution. Parallels Remote Application Server (RAS) is a leading provider of virtual application and delivery solutions. These solutions are the best way to reduce IT Continue Reading

Five tips to choose the right payment method to grow your online store

The popularity of an online shop amongst consumers depends increasingly on the selection of payment methods available. At the end of an order process, customers want a selection of payment methods that they like to use and that are both simple and practical. Customers will only complete a purchase and Continue Reading

Setting up GitLab Pages with CloudFlare Certificates

CloudFlare SSL/TLS certificates are free to use. If you want your GitLab Pages site to work with them, it’s as simple as could be. There’s just a trick you might not know about (yet)! We assume you’re familiar with SSL/TLS, DNS, GitLab Pages, and CloudFlare. On this page Introduction With Continue Reading

Cloudflare Crypto Meetup #5: February 28, 2017

Come join us on Cloudflare HQ in San Francisco on Tuesday, Febrary 28, 2017 for another cryptography meetup. We again had a great time at the last one, we decided to host another. It’s becoming a pattern. We’ll start the evening at 6:00p.m. with time for networking, followed up with Continue Reading

Fortinet’s Partnership with the NHS Alliance in the UK – a Q&A

At a time when the UK’s National Health Service (NHS) faces increasing cyber threats, Fortinet has partnered with the new NHS Alliance to help raise awareness of these threats and better protect our health service moving forwards. Launched in 1948, the NHS has provided free health care, at the point Continue Reading

Case Study on Xillion ICT Solutions using Parallels RAS

Xillion ICT Solutions – Achieves universal client for all OSes, with easy configuration and management interface Xillion ICT Solutions needed a virtualization solution that offered a universal client for all operating systems while being easy to configure and manage. To achieve this, Xillion began working with a comprehensive application delivery solution; Parallels® Continue Reading

Innovation Insights: Defining and Securing IoT

The Internet of Things represents a new genus of the Internet, and enterprises and government agencies are searching for ways to better serve customers and spawn new growth.  Experts predict that by 2020 there will be 4.3 Internet-connected devices for every man, woman, and child on the planet. North America Continue Reading

How to Ensure Your Omni-Channel Strategy is a Success – An Interview with Faguo

  • in Blog Posts
  • by
  • February 3, 2017
  • Comments Off on How to Ensure Your Omni-Channel Strategy is a Success – An Interview with Faguo

The omni-channel strategy has become a web development cornerstone for ambitious and connected entrepreneurs. The aim is to promote sales using various distribution channels synergistically to more effectively reach a wider target base while reducing operational constraints. This is what the French company Faguo was able to achieve with international Continue Reading

Saudi Organizations Targeted by Resurfaced Shamoon Disk-Wiping Malware

FortiGuard is currently investigating a new wave of attacks targeting Kingdom of Saudi Arabia organizations that use an updated version of the Shamoon malware (also known as DistTrack.) We described this malware in detail a few months ago in a previous article. The key features of that version remain the Continue Reading

A Closer Look at Sage 2.0 Ransomware along with Wise Mitigations

Sage 2.0 is the new kid on an already crowded block of ransomware, demanding hefty ransom of 2.22188 bitcoins (roughly 2000 USD) per infection. We have recently begun seeing this malware being distributed by the same malicious spam campaigns that serve better-known ransomware families, such as Cerber and Locky. In Continue Reading

Zimbra Collaboration 8.7.2 and 8.6 Patch 8 are Available

In July of last year, we announced Zimbra Collaboration 8.7, which included four of my favorite, admin-related features including Two-Factor Authentication (2FA), a new Zimbra Packaging System, SSL Server Name Identification (SNI) and Zimbra Postscreen. Today, I’m thrilled to announce our first minor release of 2017: Zimbra Collaboration 8.7.2, please Continue Reading

Ransomware And The Boot Process

Since its discovery in early 2016, we have tracked a number variations of Petya, a ransomware variant famous for multi-stage encryption that not only locks your computer, but also overwrites the Master Boot Record. Petya continues to persist, and in this blog we will take a deeper look at its more complex second stage Continue Reading

Social marketing and smartphones — trends you should know if you’re working in fashion

  • in Blog Posts
  • by
  • February 2, 2017
  • Comments Off on Social marketing and smartphones — trends you should know if you’re working in fashion

Smartphone use is on the rise. Whether they’re keeping up-to-date on social networks, searching online, watching videos, or making purchases, users increasingly prefer to use a smartphone. This has resulted in a change in buyer–seller mentality that is better adapted to new behaviors smartphone technology has set in motion. Social Continue Reading

Protecting everyone from WordPress Content Injection

Today a severe vulnerability was announced by the WordPress Security Team that allows unauthenticated users to change content on a site using unpatched (below version 4.7.2) WordPress. CC BY-SA 2.0 image by Nicola Sap De Mitri The problem was found by the team at Sucuri and reported to WordPress. The Continue Reading

>