Fuel HQ

Recent Posts

Implementing and Using Hardware Security Modules

Posted by Fuel HQ on Nov 2, 2018 5:13:22 PM

Friday, November 2, 2018

HSM The Online Trust Alliance (OTA) named 2017 “the worst year ever in data breaches and cyber incidents around the world.” In fact, OTA’s Cyber Incident & Breach Trends Report found that there were almost 160,000 cyber incidents targeting businesses in 2017. Because many cyber incidents are not reported, the firm estimated the actual number could be closer to 350,000. With such a high number of incidents, businesses should be looking at various security options. One such option is a hardware security module (HSM).

Read More

An Update from the Fuel Sacramento Chapter

Posted by Fuel HQ on Oct 24, 2018 3:47:05 PM

Wednesday, October 24, 2018

By Raphael Carrillo, Fuel User Group member and head of the Fuel Sacramento Chapter 

Sacramento-1Editor's note: In this article, Fuel User Group member and head of the Fuel Sacramento Chapter Raphael Carrillo gives us a peek behind the scenes at his local chapter – how they got started, the ways in which they’ve grown, and key learnings from a recent meeting focused on SSL decryption, how to get the most out of a TAC and a mobile office kit.

Read More

‘Embracing a Mindset of Lifelong Learning’: A Q&A with George Finney, New Fuel Board Member

Posted by Fuel HQ on Oct 11, 2018 11:58:00 AM

Thursday, October 11, 2018

George FinneyGeorge Finney is the chief security officer for Southern Methodist University and a new member to the Fuel Board of Directors. Finney is a licensed attorney for the state of Texas and a consummate cybersecurity professional, with three industry certifications to his name: a Certified Information Privacy Professional, a Certified Information Security Manager and a Certified Information Security Systems Professional.

We spoke with Finney to learn why he joined Fuel, what drives his passion for all things cybersecurity, trends and changes he’s observed in the industry, plus his advice for cultivating the next generation of cybersecurity professionals.    

Read More

Setting up SSH on a Non-Standard Port Using Certificate Authentication

Posted by Fuel HQ on Oct 5, 2018 3:21:11 PM

Then Permitting Access Through a Palo Alto PA-220 Next-Generation Firewall to Destination Server

By Charles Buege, Fuel User Group Member | Friday, October 5, 2018

Fuel_SSH How To
Being able to securely connect with an SSH connection is one item that IT professionals need to do all the time, and knowing that the pathway to your system is as secure as possible is of vital importance. In this article, I will review the following items:


  • Setting up a second instance of SSH on a non-standard port number
  • Configuring SSH to require a certificate for authentication instead of a username and password
  • Configuring your Palo Alto PA-220 next-generation firewall (PA-220) to allow the connection through that port 

Read More

Overcoming Cybersecurity Challenges in the Public Sector

Posted by Fuel HQ on Sep 27, 2018 10:05:00 AM

Thursday, September 27, 2018

By John Matelski, Fuel president and Chief Innovation and Information Officer for DeKalb County Department of Innovation & Technology

PublicSectorPublic sector organizations and agencies face unprecedented pressure to provide services to citizens and constituents in a transparent, cost-effective and efficient manner. In fact, the expectation is that they also be customer-focused and responsive to stakeholder needs in a climate of shrinking budgets and resources. Because of this, today, like never before, public sector agencies have had to become more proactive and operate more like private sector businesses. As part of this new behavioral model, agencies are required to maintain and secure an immense amount of data that is collected each day in order to make “just-in-time” decisions, as well as forecast for the long term. The kinds of data and information to collect can be anything from crime data to public health information, economic development data and public school information. While maintaining and securing systems and data can be a challenge at times, there are a few things that can be done to move your organization forward and continue fighting cybersecurity threats.

Read More

Topics: Fuel member stories, case study, public sector, next-generation security, WildFire, Global Protect, threat prevention, AutoFocus, Panorama, Security Life Cycle Review, Join Fuel, public sector IT jobs

How Do You Spend Your Time? A Breakdown of Fuel User Group Data

Posted by Fuel HQ on Sep 20, 2018 9:24:08 AM

Thursday, September 20, 2018

With input from George Finney and Michelle Malcher, Fuel User Group Board Members

Earlier this year at the Ignite Cybersecurity Conference in Anaheim, California, Fuel set up an interactive wall for attendees to mark areas where they are spending their time in their work, such as firewall configuration, and areas where they’d like to spend more time, such as private cloud management. The wall tells a great story—by peers, for peers—about where the industry stands. Here, we’ve broken down a few of the findings, with input from two Fuel User Group Board Members.


Read More

Topics: Fuel member stories, NetOps, DevSecOps, public cloud, Ignite 2018

Fuel Cybersecurity Question of the Month: Moving to the Cloud

Posted by Fuel HQ on Sep 14, 2018 9:22:59 AM

Friday, September 14, 2018

art-blue-skies-clouds-335907According to a prediction by Gartner, more than half of global enterprises already using the cloud today will adopt an all-in cloud security strategy by 2021. The technology has been around for a decade and in that time has allowed for more agile, scalable solutions and greater innovation from IT departments. However, companies are still experiencing growing pains as use of the cloud expands beyond the IT department. Common challenges include measuring compliance, gaining visibility across the IT infrastructure and open communication between security operations and IT groups. But it’s clear that the cloud is here to stay, and these challenges should be faced head-on.

Read More

Topics: cloud migration, the cloud, cloud management, cybersecurity question of the month

Simplifying and Properly Using Security Monitoring Stacks

Posted by Fuel HQ on Sep 7, 2018 3:40:10 PM

Friday, September 7, 2018

SecurityStacks2A security stack is a collection of resources a company uses to protect itself from cybersecurity incidents. When incidents do occur, companies often believe the solution is to increase tools in their stack. However, this may not always be the best use of the stack. In many cases, more tools can mean more work for cybersecurity analysts who are already addressing thousands of possible threats every day. Companies can simplify their security stack by eliminating redundant tools or ones that rely too heavily on manual monitoring, to improve efficiency. It’s not about having every new tool or service in your security stack — it’s about how you use them.

Read More

Topics: security stacks

An Introduction to DevSecOps

Posted by Fuel HQ on Aug 20, 2018 11:41:34 AM

Monday, August 20, 2018

By Gary Ramah, Fuel User Group Board Member

DevSecOps-1The Importance of DevSecOps

Over the past several years, there have been considerable changes to IT infrastructure. The addition of new technology, including cloud computing, dynamic provisioning and shared resources have increased the speed and agility of IT, while also affecting the cost. The result is that application development is now stronger than ever.

Because applications in the cloud are now larger and faster, the development and operations (DevOps) guidelines have to also become faster. This also means so-called “big bang” application launches are no longer prevalent, but thanks to integrated development, we now see faster releases and better stability in applications.

However, security still lags behind, which is why its incorporation from the start is paramount to the success of preventing hacks from occurring. This means the transformation of DevOps to DevSecOps.

Read More

Topics: DevSecOps

Today's Biggest Cloud Security Challenges

Posted by Fuel HQ on Aug 9, 2018 10:02:13 AM

Thursday, August 9, 2018

HVR Homepage Feature-7.18-701094-edited

Use of the cloud is growing — but so are the problems that industries are facing to make it a safe tool. Gartner predicts that, by 2021, more than half of global enterprises already using the cloud today will adopt an all-in cloud security strategy. Given the tool’s rapid growth, companies are sometimes finding more challenges than solutions. Being ahead of the curve is the best way to ensure that cloud usefulness is maximized. Here are a few areas cybersecurity professionals should keep a close eye on to ensure they’re staying on top of common challenges.   

Read More

Topics: Cloud Security Management, Cloud Security

Posts by Topic

see all

Subscribe to Blog Updates

Recent Posts

Posts by Topic

see all