Fortinet Company Blogs

  • Training to Combat Modern Cyber Threats at the NSE EMEA Xperts Academy

    Training to Combat Modern Cyber Threats at the NSE EMEA Xperts Academy

    Fortinet’s NSE Xperts Academy offers our certified partners a hands-on security experience, giving them the resources needed to provide consistent value to their customers using Fortinet products.

    Read Article
  • Going Beyond Compliance

    Going Beyond Compliance

    Organizations that go beyond compliance to offer robust data-security controls provide greater value to consumers and build their level of trust, resulting in a distinct competitive edge.

    Read Article
  • Together, Fortinet and AWS Secure the Government

    Together, Fortinet and AWS Secure the Government

    Fortinet’s Security Fabric cloud solutions are available to AWS enterprise, service provider, and public sector customers, providing comprehensive security, threat intelligence, and visibility to...

    Read Article
  • Thrip ATP Attack Update

    Thrip ATP Attack Update

    In conjunction with the Cyber Threat Alliance, Symantec today released their blog post on an APT (advanced persistent threat) group codenamed "Thrip.” As part of our membership with the Cyber...

    Read Article
  • Defending Against an Automated Attack Chain: Are You Ready?

    Defending Against an Automated Attack Chain: Are You Ready?

    Threats like AutoSploit bring malware-as-a-service to a whole new level. Here are four ways to be prepared.

    Read Article
  • AI Doesn’t Eliminate Jobs, It Creates Them

    Automation and AI are not eliminating jobs, they are creating them — high-paying, high-level and secure ones at that — at an unprecedented rate. As the levels of data continue to grow, that will...

    Read Article
  • The Rise of Destructive Botnets

    It is critical that every organization become aware of these emerging risks and begin to take appropriate countermeasures now. In the escalating cyberwar, enterprises need to be able to fight...

    Read Article
  • Microsoft Windows Remote Kernel Crash Vulnerability

    At the end of January 2018, the FortiGuard Labs team discovered a remote kernel crash vulnerability in Microsoft Windows and reported it to Microsoft by following Fortinet’s responsible disclosure...

    Read Article
  • Two Options for Evolving Your IPS Solution

    Two Options for Evolving Your IPS Solution

    Every moment of every day an IPS system works to detect malicious content in network traffic to prevent attacks and exploits for organizations of all sizes. But as the digital infrastructure...

    Read Article
  • Threat Information Sharing Goes Far Beyond Simply Protecting Businesses

    Threat Information Sharing Goes Far Beyond Simply Protecting Businesses

    Threat intelligence sharing is critical in our digital society. Learn more about Fortinet's gobal stragtic partnerships with Interpol, and our training & education programs.

    Read Article
  • PyRoMineIoT: NSA Exploit, Monero(XMR) Miner, & IoT Device Scanner

    In this article, we will discuss the changes made to PyRoMine, as well as how the ETERNALROMANCE exploit was used to distribute yet another Monero miner we have dubbed PyRoMineIoT.

    Read Article
  • You Can’t Protect What You Can’t See: Gaining Visibility in Endpoint Security

    You Can’t Protect What You Can’t See: Gaining Visibility in Endpoint Security

    Implementing an integrated and automated security solution allows IT teams to discover, assess, and monitor endpoints to ensure security and compliance.

    Read Article
  • Fabric-Ready Partner Spotlight Q&A – CSPi

    Fortinet recently talked with Gary Southwell, Managing Director, about CSPi’s security priorities and the tools they produce to keep customers’ information secure through automated breach...

    Read Article
  • Securing the Modernization of IT for State and Local Governments

    State and local government entities are modernizing legacy IT systems. The modernization of security solutions should be done in tandem with these new deployments.

    Read Article
  • Is Cryptojacking Replacing Ransomware as the Next Big Threat?

    Is Cryptojacking Replacing Ransomware as the Next Big Threat?

    Cryptojackers have clearly discovered that, if done properly, leveraging the processing power of a hijacked system to mine for cryptocurrencies can be a potentially long-term profitable venture.

    Read Article
  • Non-Russian Matryoshka: Russian Service Centers Under Attack

    With the help of FortiGuard’s in-house Threat Intelligence Platform (Kadena), FortiGuard Labs discovered a series of attacks targeted at service centers in Russia. These service centers provide...

    Read Article
  • Could 5G Mutate the Threat Landscape?

    IoT and 5G are important technological achievements that are changing the world. However, this optimism needs to be tempered with clear thinking and planning if we want to keep up with the...

    Read Article
  • New Threats, Old Threats - A Deeper Look

    New Threats, Old Threats - A Deeper Look

    IT security teams stand a much better chance of defeating the latest cyber schemes when they know what to look for. Here are some key findings from Fortinet Threat Landscape Report.

    Read Article
  • VPNFilter Malware - Critical Update

    As a member of the Cyber Threat Alliance (CTA), FortiGuard Labs received critical information and additional findings showing the VPNFilter campaign is targeting significantly more devices than...

    Read Article
  • FortiWeb Release 6.0: AI-based Machine Learning for Advanced Threat Detection

    FortiWeb Release 6.0: AI-based Machine Learning for Advanced Threat Detection

    FortiWeb’s new machine learning (ML) technology delivers a different approach to threat detection to the web security market. This new approach leverages probability to identify threats rather...

    Read Article
  • loading
    Loading More...