Network Box Technical News
from Mark Webb-Johnson, CTO Network Box
In the Boxing Ring 2021 |
April 2021 Herd Immunity from Computer Worms |
[PDF] |
March 2021 Vulnerability Scanning |
[PDF] |
February 2021 If you can connect it, protect it by Pierluigi Stella |
[PDF] |
January 2021 The Network Box Platform in 2021 and Beyond |
[PDF] |
In the Boxing Ring 2020 |
Network Box Technology Review 2020 Network Box technology news and articles during 2020 |
[PDF] |
December 2020 Safely and Securely Working from Home |
[PDF] |
November 2020 Virtual Patching |
[PDF] |
October 2020 Privacy and MAC Address Randomization |
[PDF] |
September 2020 Bugs, Crashes, and Vulnerabilities |
[PDF] |
August 2020 Top-Level Domains |
[PDF] |
July 2020 Core Engine Upgrades |
[PDF] |
June 2020 Viruses: Biological versus Computer |
[PDF] |
May 2020 Box Office User Management |
[PDF] |
April 2020 Business Continuity in the time of COVID-19 Lockdowns |
[PDF] |
March 2020 When a password doesn’t seem like a password (and you give it out to a stranger) |
[PDF] |
February 2020 Cloud Notifications |
[PDF] |
January 2020 A look ahead to the Network Box platform in 2020 and beyond |
[PDF] |
In the Boxing Ring 2019 |
Network Box Technology Review 2019 Network Box technology news and articles during 2019 |
[PDF] |
December 2019 'Tis the season to be wary: Top 7 security tips to keep your business protected during the holidays |
[PDF] |
November 2019 Sextortion Scams |
[PDF] |
October 2019 Cyber Security Awareness Month: 5 Key Suggestions for IT Managers |
[PDF] |
September 2019 S-80i Hardware Platform |
[PDF] |
August 2019 The Network Box Difference |
[PDF] |
July 2019 Dark Web Monitoring Service version 2 |
[PDF] |
June 2019 Administrative Systems access from the Internet |
[PDF] |
May 2019 Network Box Spam Reporter by Michael Gazeley |
[PDF] |
April 2019 Network Box Cybersecurity Ethos |
[PDF] |
March 2019 Password Policies |
[PDF] |
February 2019 The Dark Side of the Internet by Michael Gazeley |
[PDF] |
January 2019 Network Box Security Services in 2019 and Beyond |
[PDF] |
In the Boxing Ring 2018 |
Network Box Technology Review 2018 Network Box technology news and articles during 2018 |
[PDF] |
December 2018 Dark Web Monitoring by Michael Gazeley |
[PDF] |
November 2018 NBSIEM+ Events Logs at Big Data Scale |
[PDF] |
October 2018 The Internet of Things by Michael Gazeley |
[PDF] |
September 2018 NBSIEM+ Logging Options |
[PDF] |
August 2018 NBRS-3 End of Life Support |
[PDF] |
July 2018 Social Engineering |
[PDF] |
June 2018 PCI-DSS Compliance |
[PDF] |
May 2018 A plea for Dual Factor |
[PDF] |
April 2018 Network Box 5.5 Managed Security Service Platform |
[PDF] |
March 2018 Moving from Log Event to Security Incident base Response |
[PDF] |
February 2018 Network Box Reputation Database |
[PDF] |
January 2018 Network Box Managed Security in 2018 and beyond |
[PDF] |
In the Boxing Ring 2017 |
Network Box Technology Review 2017 Network Box technology news and articles during 2017 |
[PDF] |
December 2017 Physical Security |
[PDF] |
November 2017 Cloud Reputation Service |
[PDF] |
October 2017 WannaCry & NSA, how they're connected by Pierluigi Stella |
[PDF] |
September 2017 Have you been Pwned? |
[PDF] |
August 2017 Spear Phishing |
[PDF] |
July 2017
Cloud Dynamic DNS
UTM-5Q and VPN-5Q Hardware Platform |
[PDF] |
June 2017
How to Survive a Trojan/Ransomware Attack Reducing the Risk of SNMP Abuse |
[PDF] |
May2017 Encrypted eMail |
[PDF] |
April 2017 Dual Factor Box Office HTTPS Interception (when done right) Strengthens TLS Security |
[PDF] |
March 2017 Spam Traps |
[PDF] |
February 2017
Spear Phishing |
[PDF] |
January 2017
PCI Security Standards |
[PDF] |
In the Boxing Ring 2016 |
Network Box Technology Review 2016 Network Box technology news and articles during 2016 |
[PDF] |
December 2016 The Changing Landscape of Cyber Security |
[PDF] |
November 2016 PULL vs PUSH vs Online Signatures Admin and User Portal Enhancements |
[PDF] |
October 2016 Why you need WAF (part 3 of 3) - by Pierluigi Stella |
[PDF] |
September 2016 Why you need WAF (part 2 of 3) - by Pierluigi Stella |
[PDF] |
August 2016 Why you need WAF (part 1 of 3) - by Pierluigi Stella
INFL botnet cac URL Category and Proxy Infected LAN |
[PDF] |
July 2016
Network Box 5 Mail Scanning Pattern Engine
Network Box 5 Mail Scanning 'bulk' Classification |
[PDF] |
June 2016
Network Box Notification System
Network Box App |
[PDF] |
May 2016
The Harvard Report on Encryption by Pierluigi Stella |
[PDF] |
April 2016
Security Alert Condition: Threat Level 4
Links vs Malware |
[PDF] |
March 2016 Cyber Crimes & Cyber Terrorism by Pierluigi Stella |
[PDF] |
February 2016 High-Value Targets: Point of Sales, Credit Cards, Customer Information |
[PDF] |
January 2016
2015: Year in Focus |
[PDF] |
In the Boxing Ring 2015 |
Network Box Technology Review 2015 Network Box technology news and articles during 2015 |
[PDF] |
December 2015 Network Box 5.3 Managed Cyber Security Platform |
[PDF] |
November 2015 The ONE Vulnerability |
[PDF] |
October 2015 Network Box Special Report: Analysis of an email attack by Pierluigi Stella and Andrew Tynefield |
[PDF] |
September 2015
New S-Series Appliance: S-38i and S-68i, the Features and Fixes released in Patch Tuesday |
[PDF] |
August 2015
Unification of ACLs and Rules Engine, NBRS-3 Sunset Announcement |
[PDF] |
July 2015
VPN Reporting (part2) |
[PDF] |
June 2015
Network Box VPN-5 Model, VPN Reporting |
[PDF] |
May 2015
Proxying SSL (Part 2 of 2) |
[PDF] |
April 2015
Proxying SSL (Part 1 of 2) |
[PDF] |
March 2015
Data Breaches: Identify and Remediate |
[PDF] |
February 2015
Core Library Vulnerabilities |
[PDF] |
January 2015
Cloud DNS Backup |
[PDF] |
In the Boxing Ring 2014 |
Network Box Technology Review 2014 Network Box Technology news and articles during 2014 |
[PDF] |
December 2014 Event Correlation & Intrusion Alerting system and network-level infected LAN system |
[PDF] |
November 2014
Network Box Cloud Mail Backup |
[PDF] |
October 2014
Shell Shock |
[PDF] |
September 2014
Trust, in an unforgiving Cyber World |
[PDF] |
August 2014
Domain Name System (DNS) Amplification and other Attacks |
[PDF] |
July 2014
Key Performance Indicators (KPI) |
[PDF] |
June 2014
The Vulnerability of Everything |
[PDF] |
May 2014
Network Box 5 User Interface Enhancement |
[PDF] |
April 2014
Network Box 5 Administrative Portal |
[PDF] |
March 2014
Security Modules and Security Packages; Security Package Matrix |
[PDF] |
February 2014
The Entity Management system; The features and fixes to be released in patch Tuesday for Network Box 5 and Network Box 3 |
[PDF] |
January 2014
2013 Threat Round-up, NBRS-5.0 Features |
[PDF] |
In the Boxing Ring 2013 |
Network Box Technology Review 2013 Network Box Technology news and articles during 2013 |
[PDF] |
December 2013 Network Box 5 SSL Proxy |
[PDF] |
November 2013
Network Box 5 Software and Hardware Platform |
[PDF] |
October 2013
IDS/IPS vs WAF. Comparison between the two systems |
[PDF] |
September 2013
NBRS-5.0 SMTP mail scanning, enhancements and fixes of patch Tuesday |
[PDF] |
August 2013
NBRS-5.0 Application Identification Framework, Real-Time Detection and Blocking of Outbound Trojan Activity, NBRS-5.0 Features and Roadmap |
[PDF] |
July 2013
Trojans and the new OWASP Top 10 |
[PDF] |
June 2013
NBRS-5.0 - network-highavailability,network-dhcp-server and portal-webclient-base, NBRS-5.0 Roadmap, Web Client SSL Protection |
[PDF] |
May 2013
How to Survive a DDoS Attack |
[PDF] |
April 2013
SSL Security Strategy (Part iii)and how the Network Box Anti-DDoS WAF+ SSL Protocol Upgrade resolves its security issue |
[PDF] |
March 2013
Java Vulnerabilities and Exploits, SSL Security Strategy |
[PDF] |
February 2013
DNS, Mail & 512 bytes, Secure Socket Layer Security Strategy |
[PDF] |
January 2013
2012 Threat Round-up, 2012 Enhancements, 2013 and Beyond |
[PDF] |
In the Boxing Ring 2012 |
December 2012 Anti-DDoS WAF+ Overview |
[PDF] |
November 2012 Application Firewall, Application Identification |
[PDF] |
October 2012 Different types of DoS and DDoS Attack and Defence, WAF-Scan, Anti-DDoS WAF+ |
[PDF] |
September 2012 S-SCAN - Expanded categories list, Comparisons and update news |
[PDF] |
August 2012 The importance of direction, Cloud infrastructure Powered by 6fusion |
[PDF] |
July 2012 Engines vs Signatures vs Heuristics, ISO Certification upgrade |
[PDF] |
June 2012 IPv6 Ready, Testing NBRS-5.0 Web Application Firewall |
[PDF] |
May 2012 NBRS-5.0 SSL |
[PDF] |
April 2012 NBRS-5.0 Web Application Firewall |
[PDF] |
March 2012 Firewalling Web Applications |
[PDF] |
February 2012 NBRS-5.0 IPv6 |
[PDF] |
January 2012 2011 Threat Round-up, 2011 Enhancements, 2012 and Beyond |
[PDF] |
In the Boxing Ring 2011 |
December 2011 NBRS-5.0 Quality of Service |
[PDF] |
November 2011 NBRS-5.0 High Availability, Load Balancing & Clustering, MAPP |
[PDF] |
October 2011 NBRS-5.0 Intrusion Prevention |
[PDF] |
September 2011 NBRS-5.0 Networking Architecture, S-SCAN Content Filtering Engine |
[PDF] |
August 2011
NBRS-5.0 Networking Architecture, Z-SCAN In-the-cloud Protection |
[PDF] |
July 2011 NBRS-5.0 Provisioning Architecture, Z-SCAN Anti-malware Engine |
[PDF] |
June 2011 NBRS-5.0 Base Platform, Tolly Group |
[PDF] |
May 2011 NBRS-5.0 Configuration |
[PDF] |
April 2011 NBRS-5.0 Firmware, Security Response Website |
[PDF] |
March 2011 Data Leakage Prevention |
[PDF] |
February 2011 IPv6 |
[PDF] |
January 2011 2010 Threat Roundup, 2010 Enhancements, 2011 and Beyond |
[PDF] |
In the Boxing Ring 2010 |
December 2010 Nested '.bin' Blocks, Box Office Notifications, Kaspersky v8 |
[PDF] |
November 2010 M-385, GMS Enhancements, Notifications and iOS |
[PDF] |
October 2010
An Update on Network Box Sentinel, Network Box Office Notification Preview |
[PDF] |
September 2010 On-Going Development, Network Box Sentinel |
[PDF] |
August 2010 On-Going Development, Snake Oil |
[PDF] |
July 2010 On-Going Development, Spam |
[PDF] |
June 2010 Transparent Proxy - What it mean and what impact does it have on your network? |
[PDF] |
May 2010 Vulnerability Scanning, Difficulty in Differentiating Between Spam and Malware |
[PDF] |
April 2010 The importance of certification and the ongoing ISO 27001:2005 process |
[PDF] |
March 2010 Migration of the DNS Root Zone to DNSSEC, DNSSEC Support Tests |
[PDF] |
February 2010 New S-Series Boxes(S-25,S-35 and S-85), New M-Series Boxes(M-255 and M-285) |
[PDF] |
January 2010 2009 Threat Roundup, 2009 Enhancements |
[PDF] |
In the Boxing Ring 2009 |
December 2009 Bandwidth statistics, Hardening Internet protocols |
[PDF] |
November 2009 Internet eMail - SMTP, POP3 and IMAP4 Protocols, Anti-Spam and Whitelisting / Blacklisting |
[PDF] |
October 2009 New NBIPDS System Enters Public Beta, Network Box and the Microsoft Active Protections Program |
[PDF] |
September 2009 Mail Portal & MY.NETWORK-BOX.COM Enhancements |
[PDF] |
August 2009 Mail Portal Enhancements, Mail Scanning Enhancements, Recent Vulnerabilities |
[PDF] |
July 2009 Network Box Virtual Private Network (VPN), Network Box SQL Injection Advice, Bing.com (beta) and Safe Search |
[PDF] |
June 2009 Network Box Intrusion Detection & Prevention, Network Box Office Customer Portal Hints, PUSH Technology |
[PDF] |
May 2009 Network Box Office Customer Portal, PC3 Platinum Brand Awards 2008, Encrypted SMTP eMail, Network Box Intrusion Detection & Prevention System |
[PDF] |
April 2009 Conficker Network Scanner, Certificate Authority and SSL VPNs, Mail Scanning, Sender Policy Framework |
[PDF] |
March 2009 my.network-box.com Enhancements, Relationship Spam Score Adjustments, Customer Portal: Beta Test Open, Proxy Vulnerability |
[PDF] |
February 2009 Relationship Spam Score Adjustments, Whitelisting your own domain, Outbound Policies |
[PDF] |
January 2009 2008 Round-Up, 2009 Preview, CVE 2008-4844 |
[PDF] |
In the Boxing Ring 2008 |
December 2008 McColo Shutdown, MS08-067 Worm, Global Monitoring System |
[PDF] |
November 2008 Fuzzy Fingerprints, Challenge Response |
[PDF] |
October 2008 Relationships |
[PDF] |
October 2008 Supplement Customer Portal |
[PDF] |
September 2008 A Stormy Month, Network Box Office, Upcoming Work, Google Safe, Language Support |
[PDF] |
August 2008 Network Box Office, Google Safe, DNS Attacks |
[PDF] |
July 2008 SPAM Back-scatter, SQL Injection Attacks, Anonymous Proxies, Uncategorized URLs |
[PDF] |