Office of The CISO Knowledge Base

Cybersecurity, Information Security, Information Technology – Knowledge Base

Skip to content
  • Home
  • Cybersecurity YouTube
  • Cybersecurity Podcast

Category Archives: Fortinet

CVE 2022 39947 Fortinet FortiADC Vulnerability

This entry was posted in CVE, Cybersecurity, Fortinet, Information Security on March 12, 2023 by kbAdmin.

CVE 2022 42475 Fortinet SSL VPN Vulnerability!

This entry was posted in CVE, Cybersecurity, Fortinet, Information Security on March 12, 2023 by kbAdmin.

Recent Posts

  • FirewallA vs Next Generation Firewalls
  • The Path to Becoming an Ethical Hacker: Skills, Steps, and Strategies
  • Cybersecurity and the Oil Industry
  • Chinese Hackers Exploit Fortinet Vulnerability To Commit Espionage
  • Microsoft March 2023 Patch Tuesday
  • Chinese and Russian Hackers Using SILKLOADER Malware to Evade Detection
  • Google Finds 18 Critical Security Vulnerabilities in Samsung Exynos Chips
  • Websites that look like Telegram and WhatsApp Sites Stealing Crypto
  • GoLang-Based HinataBot Exploiting Router and Server Flaws
  • Cybersecurity Burnout Causes and Remedies
  • Cybersecurity Mental Health
  • Am I Too Old To Get Into Cybersecurity?
  • Are all Hackers Criminals?
  • Sophos Vulnerability CVE 2022 3236
  • Auth0 JWT Vulnerabilities Announcement
  • Patching is Critical
  • Windows 7 ESU is DONE!
  • CVE Notice BIG Microsoft ALPC Vulnerabilities
  • CVE 2022 39947 Fortinet FortiADC Vulnerability
  • CVE 2022 42475 Fortinet SSL VPN Vulnerability!
  • CVE 2022 27623 Synology DSM Vulnerability
  • ChatGPT and The Related Cybersecurity Risks
  • Quiet Quitting and Cyber Risks
  • The Cyber Staffing Shortage
  • US Cybersecurity Investment
  • Who Should a Chief Information Security Officer Report To?
  • Information Security Frameworks
  • Nation States – Cybersecurity – Mandiant, and More
  • When and Why To Report Cybersecurity Incidents
  • Trusted Platform Modules and Why They Are Important
  • Cybersecurity Burnout Causes and Remedies
  • IOT is Bad For Security
  • Vulnerability Assessments vs Penetration Tests
  • Why is Penetration Testing Important?
  • Privacy Concerns In Relation To Cybersecurity
  • Botnets and their negative effect on organizations
  • What are VLANs and why are they important to Cybersecurity
  • NIST 800-53 – Audit & Accountability Family of Controls
  • NIST 800-53 – Awareness & Training Family of Controls
  • NIST 800-53 – Access Control Family of Controls
  • NIST 800-53 – Program Management Family of Controls 
  • NIST 800-53 – Introduction
  • Running an Information Security Team
  • SAML Integration Security Benefits
  • Implementing Security in The Agile Software Development Methodology
  • How Agile is Utilized in Software Development
  • The Importance of a System Development Lifecycle
  • Security Awareness Training Is Important
  • Zero-Day Vulnerabilities
  • Email Security Best Practices
  • Anti-Virus Software Overview
  • Security Information and Event Management (SIEM) Tool
  • Virtual Private Networks – Uses For Orgs and Users
  • Cryptography in Information Security
  • Identity and Access Management and INFOSEC
  • What is a Security Operations Center and What is it composed of?
  • Common Methods For Mobile Device Security
  • Common Malware Analysis Methods
  • Advanced Persistent Threats and Why They Are Hard To Catch
  • Securing the Internet of Things
  • Incident Response and Disaster Recovery – Best Practices
  • Cybersecurity Regulations and Their Industries
  • Network Security and Common Best Practices
  • Cyber Liability Insurance and How it Works!
  • Ransomware and Why it is Bad!
  • Password Management and Why
  • Cloud Security and Its’ Importance
  • What is two-factor authentication and why is it important?
  • PHISHING and Social Engineering Tactics
  • Top 5 Cybersecurity Podcasts of 2023
  • Palo Alto vs Fortinet Firewalls Cost and Performance
  • Cybersecurity Framework Benefits For Federal Agencies
  • CISOs are Stressed and Burned Out
  • BlackLotus – First EUFI Bootkit Malware To Bypass Windows 11 Secure Boot
  • Cybercriminals Targeting Law Firms With GootLoader and FakeUpdates
  • Top 3 Vulnerability Scanners Today
  • What is a Vulnerability Scanner?
  • What is Penetration Testing and Why Is It Important?
  • How To Start Building an Information Security Policy
  • What is Information Security All About?
  • Deep Packet Inspection
  • Top 3 Cybersecurity Certification Pros and Cons
  • Cybersecurity Awareness Month
  • What is a Man-In-The-Middle Attack?
  • Why Cybersecurity is Important For Business
  • Cybersecurity – Where to Start
  • What is a DDOS and why do they hurt businesses?
  • How Encryption Benefits Organizations
  • What is PHISHING and how does it negatively impact organizations?
  • What is Malware and how does it negatively impact organizations?
  • What does EDR do for an Organization?
  • Benefits of Next-Generation Firewalls
  • Microsoft Exchange Admins Told to Expand Antivirus Scanning
  • What Are Enterprise Insider Threats in Relation to Information Security?
  • Leading Causes of Security Breaches
  • How to Secure Enterprise Apple Devices like iPhones and iPads
  • IPS Considerations for Containerized Environments
  • What does an Intrusion Prevent System do for Network Security?
  • What does a firewall do for network security?
  • What does a Security Analyst do for an Information Security Office?
Skip to content
  • Home
  • Cybersecurity YouTube
  • Cybersecurity Podcast