Fortinet Company Blogs

  • Common SD-WAN Security Mistakes

    Common SD-WAN Security Mistakes

    SD-WAN is quickly becoming an essential component of any network transformation effort, allowing organizations to compete more quickly and efficiently in today’s digital marketplace.

    Read Article
  • What Holiday Shopping Reminded Me About Email Security

    What Holiday Shopping Reminded Me About Email Security

    This week, SE Labs released results for its new 2018 Email Security Services group test and Fortinet’s FortiMail Secure Email Gateway solution was given a top AAA rating.

    Read Article
  • A Look into XPC Internals: Reverse Engineering the XPC Objects

    A Look into XPC Internals: Reverse Engineering the XPC Objects

    We have recently been engaged in deep security research on macOS for FortiGuard Labs focused on the discovery and analysis of IPC vulnerabilities. In this blog, we uncover the XPC internals data...

    Read Article
  • Preparing for Tomorrow's Threats

    Preparing for Tomorrow's Threats

    Organizations can start today to protect against 2019's threats. Look out for crooks using AI "fuzzing" techniques, machine learning, and swarms.

    Read Article
  • Fortinet and Symantec Join Forces to Help Organizations Move their Security to the Cloud

    Fortinet and Symantec Join Forces to Help Organizations Move their Security to the Cloud

    Bringing two global industry leaders together to provide enterprise-class capabilities across cloud, network, and endpoint security is a remarkable event and reflects a deep commitment to the...

    Read Article
  • The Shifting AI-Driven Threat Landscape

    The Shifting AI-Driven Threat Landscape

    As the modern threat landscape continues to expand, adding artificial intelligence (AI) to a security strategy has become paramount to establishing and maintaining an effective security posture.

    Read Article
  • More Encrypted Traffic Than Ever

    More Encrypted Traffic Than Ever

    Over 72% of all network traffic is encrypted, and that figure is expected to grow. Very few security devices can inspect encrypted data without severely impacting network performance.

    Read Article
  • The Weaponization of PUAs

    The Weaponization of PUAs

    In this FortiGuard Labs article we will define what a PUA is, describe its inherent risks, and how malware makes use of them by showcasing a malware sample.

    Read Article
  • Helping Exponential-e Navigate the Changing Threat Landscape

    Helping Exponential-e Navigate the Changing Threat Landscape

    To meet the challenges of the constantly evolving cybersecurity threat landscape, service providers require a robust and flexible infrastructure that enables them to adapt to new lines of attack.

    Read Article
  • RPC Bug Hunting Case Studies – Part 1

    RPC Bug Hunting Case Studies – Part 1

    FortiGuard Labs believes that understanding how this attack works will significantly help other researchers find vulnerabilities similar to the bug that SandboxEscaper found in the Windows Task...

    Read Article
  • Providing Improved Security Posture for Your Customers

    Providing Improved Security Posture for Your Customers

    Effective cybersecurity relies on active threat and vulnerability awareness. Partners can help provide that awareness using a comprehensive cyber threat assessment program.

    Read Article
  • Exploiting an RCE bug in the UDP Protocol implemented in FreeRTOS

    Exploiting an RCE bug in the UDP Protocol implemented in FreeRTOS

    Recently, we saw a report about several bugs that were found on FreeRTOS. Curiosity got the best of us, and we started to take a look to see what can be done from the IPS side to protect our...

    Read Article
  • Cybersecurity Skills Report: Data Shows What CISOs Look for In Security Architects

    Cybersecurity Skills Report: Data Shows What CISOs Look for In Security Architects

    Fortinet’s recent study shows that CISOs are increasingly seeking to hire professionals with a mix of hard and soft skills. Learn how applicants and employers must adapt to meet modern security needs.

    Read Article
  • Smarter Security Starts with Understanding How Cybercriminals Work

    Smarter Security Starts with Understanding How Cybercriminals Work

    Effectively defending against cyberattacks in this new environment requires security teams to work smarter rather than harder.

    Read Article
  • Fortinet Selected to Join the AWS Consulting Partner Private Offer Program

    Fortinet Selected to Join the AWS Consulting Partner Private Offer Program

    By extending support to Fortinet resellers, customers now have access to a broad and global selection of certified resellers with specialized networking and security skills, along with best...

    Read Article
  • Fortinet Expands Cloud Services Hub Integrated with AWS Transit Gateway

    Fortinet Expands Cloud Services Hub Integrated with AWS Transit Gateway

    With AWS launching its much-anticipated Transit Gateway service, we are excited to announce the availability of the Fortinet Cloud Services Hub integrated with the AWS Transit Gateway.

    Read Article
  • Fortinet and AWS Offer New, Integrated Security Solutions

    Fortinet and AWS Offer New, Integrated Security Solutions

    Fortinet has made a number of announcements this week at the AWS Re:Invent Conference as part of AWS’s recently announced launch of new services, where Fortinet was named as launch partner.

    Read Article
  • Fortinet to Serve as a Founding Partner of the World Economic Forum’s Centre for Cybersecurity

    Fortinet to Serve as a Founding Partner of the World Economic Forum’s Centre for Cybersecurity

    The Centre for Cybersecurity today announced that Accenture, Fortinet, and Sberbank will serve as the Founding Partners of the Centre, holding permanent seats on the board.

    Read Article
  • Cloud-Native and Hybrid Cloud Organizations Need Security Best Practices

    Cloud-Native and Hybrid Cloud Organizations Need Security Best Practices

    The future of IT is multi-cloud and hybrid. Following are some best practices to help secure this future.

    Read Article
  • Keeping Your Organization Safe From Mobile Threats During the Holidays

    Keeping Your Organization Safe From Mobile Threats During the Holidays

    The holidays are a big event for cybercriminals. Over the next few weeks the number of compromised web sites, charity scams, email phishing campaigns, malicious web access points, and even fake...

    Read Article
  • loading
    Loading More...