Thursday, June 26, 2014

SonicWall and Long Beach City College Better Together Webinar


Learn how Long Beach City College was able to increase its network performance without having to sacrifice security all while supporting 25,000 BYOD users.

Date: Tuesday, July 8, 2014
Time: 9 a.m. PT / 12 p.m. ET
                                                    
Join this informative webcast to learn how you can:
·         Double your network performance
·         Secure wireless and BYOD traffic from thousands of devices
·         Significantly reduce the number of infected computers
·         Guard against the latest threats as they emerge
·         Use a context-aware monitoring engine to achieve full visibility into application and user activity
·         Leverage a nimble threat research and response team
·         Reduce deployment and administrative costs


Speakers:
Sathya Thammanur, Product Line Manager
Arne Nystrom, Senior Network Administrator, Long Beach City College

I really respect Arne a lot when we worked together on this solution. I am registered. Please do the same. 

Reading Material

Montana Department of Public Health and Human Services data breach. 1.3M personal records leaked. The hacked server helf names, addresses, birth dates, and ssn for services citizens.

PayPal has flaw in two-factor authentication. It is temporarily disabled for mobile apps while they work on a patch. 

Most organizations don't know where their sensitive structured or unstructured data resides, says new Ponemon study.

Tuesday, June 24, 2014

Death by email?

I easily spent all day cleaning out my inbox for emails from last week. I had over 150 emails and got it down to below 20 by the end of the day.

I got behind on my tasks and pipeline report, but I will get caught up on that today.

The funny thing is give my email 6 hours and my inbox has doubled to over 40 emails that need to be followed up on... The endless cycle of clean, rinse, and repeat...

Wednesday, June 11, 2014

SonicWall SRA OpenSSL Vulnerability Customer Communications

All,

As you are likely aware, researchers have discovered seven new vulnerabilities in versions 1.0.1 and 1.0.2-beta of OpenSSL. Of the seven vulnerabilities, the most serious is CVE-2014-0224 which can be exploited by a Man-in-the-Middle (MITM) attack. In response to the discovery we are communicating the impact and recommended actions first to our partners and shortly thereafter to Dell SonicWALL customers with affected products. While none of our firewalls and GMS products are affected by the vulnerabilities, our Secure Remote Access and Email Security products are impacted by some of the seven.  We have posted a support bulletin for the affected products on our support site.

To help you address potential questions on our SRA products, I’m attaching three communications that are going out shortly:

·         A notice to SMB SRA 1200/1600/4200/4600 customers - 

OpenSSL Defects Including Man-in-the-Middle Vulnerability
(CVE-2014-0224)

Hello,
As you may have heard, researchers have found multiple defects including a Man-in-the-Middle (MITM) vulnerability in versions 1.0.1 and 1.0.2-beta of OpenSSL, the cryptographic software library. For detailed information on the Man-in-the-Middle and other vulnerabilities, see the OpenSSL website.
Dell SonicWALL SMB SRA Specific Firmware Versions Affected
SMB Secure Remote Access
SMB SRA Server Side Firmware
7.0.0.12-28sv and all previous 7.0 versions
7.5.0.6-23sv and all previous 7.5 versions
Impact
Versions above are affected and should be patched immediately.
Recommended Action
Upgrade 7.5 to 7.5.0.7-24sv
Upgrade 7.0 to 7.0.0.15-32sv
Additional Information
      The latest 7.0 and 7.5 firmware versions are available for download on MySonicWALL


·         A notice to E-Class SRA customers -

OpenSSL Defects Including Man-in-the-Middle Vulnerability
(CVE-2014-0224)

Hello,
As you may have heard, researchers have found multiple defects including a Man-in-the-Middle (MITM) vulnerability in versions 1.0.1 and 1.0.2-beta of OpenSSL, the cryptographic software library. For detailed information on the Man-in-the-Middle and other vulnerabilities, see the OpenSSL website.
Dell SonicWALL E-Class SRA Specific Software Versions Affected
E-Class Secure Remote Access (Aventail)
E-Class SRA Server Side Software
Software version 10.6.4
Software versions 10.7.0 and 10.7.1
Impact
Versions above are affected and should be patched immediately.
Recommended Action
Apply Hotfix 10.6.4-388
For all 10.7.0 users, you must upgrade to 10.7.1 and apply the hotfix.
Apply Hotfix 10.7.1-322
Additional Information
The latest 10.7.1 software version is available for download on MySonicWALL. To access the 10.6.4 and 10.7.1 hotfixes, see Knowledge Base article 11605 on the Dell SonicWALL Support website.