article thumbnail

Automate your Cisco Secure Firewall deployment

Cisco Security

I nfrastructure as a Code (IaC) and Automation are now common requests from our customers deploying Cisco Secure Firewalls. Our response to this trend is making Cisco Secure Firewall deployable as a code utilizing new IaC templates , which we are happy to announce! To learn more: Virtual Firewalls for Public Cloud.

Firewall 144
article thumbnail

Introducing new cloud resources page for Cisco Secure Firewall

Cisco Security

To help our customers and partners, we have centralized all our cloud & automation resources for Secure Firewall into a single page: [link]. More than 70 scripts, videos, blogs and documentation are available. Our new page is organized by cloud provider and specific use case to easily deploy Secure Firewall.

Firewall 140
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cisco fixed tens of vulnerabilities, including an actively exploited one

Security Affairs

Cisco addressed multiple vulnerabilities in Adaptive Security Appliance (ASA), Secure Firewall Management Center (FMC), and Firepower Threat Defense (FTD) products, including an actively exploited flaw tracked as CVE-2024-20481. The vulnerability CVE-2024-20481 (CVSS score of 5.8)

VPN 124
article thumbnail

U.S. CISA adds Cisco ASA and FTD, and RoundCube Webmail bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

Cisco warned customers of password-spraying attacks that have been targeting Remote Access VPN (RAVPN) services configured on Cisco Secure Firewall devices. The company published a document containing recommendations against password spray attacks aimed at Remote Access VPN (RAVPN) services.

VPN 114
article thumbnail

How to Perform a Firewall Audit in 11 Steps (+Free Checklist)

eSecurity Planet

A firewall audit is a procedure for reviewing and reconfiguring firewalls as needed so they still suit your organization’s security goals. Auditing your firewall is one of the most important steps to ensuring it’s still equipped to protect the perimeter of your business’ network.

Firewall 115
article thumbnail

Top 12 Firewall Best Practices to Optimize Network Security

eSecurity Planet

Firewalls monitor and control incoming and outgoing traffic while also preventing unauthorized access. Configurations, network diagrams, and security rules should be documented for future reference and auditing. Overlapping rules may impair firewall efficiency or expose flaws that allow attackers to circumvent regulations.

Firewall 121
article thumbnail

Cisco warns of password-spraying attacks targeting Secure Firewall devices

Security Affairs

Cisco warns customers of password-spraying attacks that have been targeting Remote Access VPN (RAVPN) services of Cisco Secure Firewall devices. Cisco is warning customers of password-spraying attacks that have been targeting Remote Access VPN (RAVPN) services configured on Cisco Secure Firewall devices.

Firewall 133