NSFOCUS UTS: Elevating Cybersecurity with Advanced NDR Solution
February 20, 2024
Introduction Network Detection and Response (NDR) has become a cornerstone in modern cybersecurity, offering a proactive approach to identifying and mitigating potential threats in real time. NSFOCUS, a global security vendor in cybersecurity, places significant emphasis on NDR with its product Unified Threat Sensor (UTS). NSFOCUS UTS stands out as a strategic product, driving NSFOCUS […]
NTA Flow Configuration Example
February 16, 2024
NTA analyzes traffic and detects exceptions based on flow data sent by the routers and switches. To provide a better understanding of how to send flow data for NTA analysis, we will illustrate flow configuration through an example. Additionally, we’ll guide you on key considerations during the configuration process. In the given network environment, a […]
NSFOCUS Earns Dual Honors, Receives Recognition for Outstanding IPv6 Technology Capabilities
February 14, 2024
SANTA CLARA, Calif., February 14, 2024 – In a recent announcement, the IPv6 Forum bestowed the prestigious 2023 IPv6 Pioneer Enterprise Awards, recognizing leaders in the adoption and advancement of IPv6 technologies. NSFOCUS proudly accepted two distinguished accolades: the “2023 IPv6 Innovation Product Award” and the “2023 Product IPv6 Support Excellent Award in the ICS […]
2023 Cybersecurity Regulation Recap (Part 4): Tech Development & Governance
February 13, 2024
In 2023, countries worldwide continued to strengthen their cybersecurity capabilities and systems in response to their national needs, using regulatory means to enhance their cybersecurity management. Based on continuous tracking and research, NSFOCUS summarized the development of global cybersecurity regulations and policies in 2023, hoping to provide valuable insights and guidance for stakeholders, policymakers, and […]
NSFOCUS WAF Security Reports
February 8, 2024
NSFOCUS WAF security reports are divided into classification-specific alert reports and period-specific alert reports. You can acquire reports based on query conditions, such as websites, event types, statistic collection periods, and statistic collection time. 1. Generation procedure: Logs & Reports > Security Reports > Classification-Specific Alert Report or Period-Specific Alert Report > Choose the query […]
CTEM: Navigating the Future of Attack Surface
February 8, 2024
This article introduces the concept of Continuous Threat Exposure Management (CTEM), delving into the philosophy behind CTEM, its five stages, and exploring key technologies that support its implementation. I. Introduction In mid-October 2023, Gartner released the top 10 strategic technology trends for 2024 that enterprises need to explore, as depicted in Figure 1. Gartner categorized these trends into three […]
2023 Cybersecurity Regulation Recap (Part 3): Privacy Protection
February 6, 2024
In 2023, countries worldwide continued to strengthen their cybersecurity capabilities and systems in response to their national needs, using regulatory means to enhance their cybersecurity management. Based on continuous tracking and research, NSFOCUS summarized the development of global cybersecurity regulations and policies in 2023, hoping to provide valuable insights and guidance for stakeholders, policymakers, and […]
Runc Container Escape Vulnerability Alert
February 2, 2024
Overview Recently, NSFOCUS CERT detected that the runc officially issued a security notice and fixed a container escaping vulnerability (CVE-2024-21626). Since the internal file descriptor of runc is leaked during initialization and the final working directory is not verified to be located in the mount namespace of the container, attackers can conduct container escaping in […]
Preliminary Troubleshooting for Cloud Authentication Failure in ADS, NTA and ADSM
February 1, 2024
If the virtual product uses cloud authentication, it needs to communicate with the cloud authentication center periodically every day to complete the authentication and ensure availability. You can confirm the authorization mode by checking the Authorization Mode of the license. For example, in the image below, NTA uses cloud authorization. If the product fails to […]
2023 Cybersecurity Regulation Recap (Part 2): Data Security
February 1, 2024
In 2023, countries worldwide continued to strengthen their cybersecurity capabilities and systems in response to their national needs, using regulatory means to enhance their cybersecurity management. Based on continuous tracking and research, NSFOCUS summarized the development of global cybersecurity regulations and policies in 2023, hoping to provide valuable insights and guidance for stakeholders, policymakers, and […]