Leave A Comment

22 03, 2020

Remote Working: 8 Tips for IT Security Teams

Thanks to Coronavirus (COVID-19), already overstretched IT teams worldwide have a new priority. How do we enable our entire workforce to work remotely, while keeping the network, and data, safe and secure? Here are our 8 tips for IT teams when enabling staff to work from home.

25 10, 2019

Monitoring Internet Usage to Safeguard Students in Schools

In this digital-driven age, it has become integral to focus educational resources and policy towards protecting students/pupils while they are online at school. Across the world, different countries are putting guidelines in place to help protect children and keep them safe from exposure to harmful online content through digital safeguarding in schools.

10 07, 2019

A Crazy Six Months at Fastvue. Report Speed, Safeguarding, FortiGate and More!

The first half of 2019 has been a huge step forward for Fastvue. We finally finished an epic project that insanely increases report speed in Fastvue Reporter. We added Safeguarding sections to Fastvue Reporter's Internet Usage Reports making it super-simple for schools to identify students at risk of self-harm, extremism as well as generally nasty online behaviour. We also released our first new product in two years with Fastvue Reporter for FortiGate - now available as Beta. And we're not looking at slowing down any time soon!

5 03, 2019

Fastvue Syslog Version 2.0 Now Available! A Free Syslog Server for Windows

It has been over three years since we first launched our simple unlimited and free syslog server for Windows - Fastvue Syslog. Since that time, it's received thousands of downloads worldwide and been featured as one of the top syslog servers by multiple online reviews. Today, we're happy to introduce Fastvue Syslog v2.0!

1 03, 2019

Testing Web Application Firewalls with Web Security Dojo

When testing your Web Application Firewall's (WAF) ability to mitigate threats, you need a vulnerable target to test attacks against. In this guide, I will step through setting up the Web Security Dojo to provide several weak web applications to attack, and configure it for external testing.  I will also show how to configure your attacking machine to access the Dojo, and finally how to perform a basic SQL injection.

Load More Posts