Fortinet Company Blogs

  • Recognizing and Preventing Modern Cyber Scams

    Recognizing and Preventing Modern Cyber Scams

    As more and more devices are incorporated into a network, the risk of falling victim to modern cyber scams increases. Learn about the scams targeting your devices, as well as the indicators that...

    Read Article
  • Financial, Healthcare, Government, and Retail IT Professionals Review Fortinet’s Enterprise Firewall Solution

    Financial, Healthcare, Government, and Retail IT Professionals Review Fortinet’s Enterprise Firewall Solution

    Fortinet has been named a Leader in a Gartner Magic Quadrant. Fortinet’s Enterprise Firewall solution has been reviewed on Gartner Peer Insights. Learn more about the capabilities included in this...

    Read Article
  • Fortinet Discovers New Android Apps that Mine the Unminable

    Fortinet Discovers New Android Apps that Mine the Unminable

    Cryptocurrencies don't all work the same way. Some are minable, some aren't. For example, Ripple (XRP), Cardano (ADA) and Tether (USDT) aren't minable.

    Read Article
  • Why Education and Training are Essential for Closing the Cybersecurity Skills Gap

    Why Education and Training are Essential for Closing the Cybersecurity Skills Gap

    Trained and experienced cybersecurity professionals are increasingly difficult to hire. To close this skills gap, organizations must change their approach to education and training. Learn how...

    Read Article
  • Bindweed: Digging Down to a Root of a Hidden Phishing Network

    Bindweed: Digging Down to a Root of a Hidden Phishing Network

    In one of our previous investigations into attacks on the service centers, FortiGuard Labs ran across a list of domains used by the criminals. During our subsequent monitoring process, we spotted...

    Read Article
  • Fortinet Again Recognized by Gartner as an Enterprise Firewall Magic Quadrant Leader

    Fortinet Again Recognized by Gartner as an Enterprise Firewall Magic Quadrant Leader

    In addition to having again been recognized by Gartner as an Enterprise Firewall MQ leader, we believe Fortinet is also the most certified security vendor in the industry.

    Read Article
  • Addressing Your Customers’ IoT Risks with FortiNAC

    Addressing Your Customers’ IoT Risks with FortiNAC

    Learn how the deployment of IoT devices is introducing complex cybersecurity challenges for your customers, as well as how our newest solution, FortiNAC, addresses these challenges head-on.

    Read Article
  • The Sony Smart TV Exploit: An Inside View of Hijacking Your Living Room

    The Sony Smart TV Exploit: An Inside View of Hijacking Your Living Room

    More and more Smart TVs are connected to the Internet than ever before, with an estimated 760 million of them now connected globally. As new threats increasingly target IoT devices, such as Smart...

    Read Article
  • Making Security Hygiene a Priority

    Making Security Hygiene a Priority

    To help mitigate the risk of a successful attack, agencies should maintain and consistently update their cybersecurity hygiene. The best practices listed above will help make effective security...

    Read Article
  • Leveraging Segmentation to Secure IoT

    Leveraging Segmentation to Secure IoT

    To adequately protect networks and the IoT, organizations require a broad security architecture that can span networked environments, powerful security tools that can dynamically segment IoT...

    Read Article
  • FakeSpy Comes Back. New Wave Hits Japan

    FakeSpy Comes Back. New Wave Hits Japan

    FortiGuard Labs recently encountered malicious traffic traveling to a C2 server located in China. The connection was established by a domain using a name that closely resembled one of Japan’s most...

    Read Article
  • Cyber Hygiene Practices That Can Make a Difference

    Cyber Hygiene Practices That Can Make a Difference

    As work and home networks become more intertwined, everyone must be aware of the security hygiene best practices that will minimize risk, data leakage, and non-compliance. Get tips and best...

    Read Article
  • What Increased EHR Accessibility Means for Cybersecurity

    What Increased EHR Accessibility Means for Cybersecurity

    Electronic health records (EHRs) offer many benefits, such as centralizing a patient’s information and streamlining communication. These benefits will only grow as technical advancements continue...

    Read Article
  • Four Roads to Securing SD-WAN, Deep Dive at the SD-WAN Summit 2018 Paris

    Four Roads to Securing SD-WAN, Deep Dive at the SD-WAN Summit 2018 Paris

    SD-WAN is quickly becoming a topic de jour. Sorting through the different options can be difficult, an undertaking that Fortinet will facilitate at the SD-WAN Summit 2018 conference.

    Read Article
  • VPNFilter Update – New Attack Modules Documented

    VPNFilter Update – New Attack Modules Documented

    This most current update, also posted by Cisco Talos through the Cyber Threat Alliance, identifies additional updates to the VPNFilter malware that have not been seen previously.

    Read Article
  • Securing Your Azure Deployment with the Fortinet Security Fabric

    Securing Your Azure Deployment with the Fortinet Security Fabric

    This week during Microsoft’s Ignite conference, we introduced new Fortinet Security Fabric capabilities for the Azure cloud, further establishing our leadership position of offering the broadest,...

    Read Article
  • Fortinet Recognized by Gartner as a Leader in UTM MQ

    Fortinet Recognized by Gartner as a Leader in UTM MQ

    Fortinet has now been recognized by Gartner as a leader in their annual UTM (Unified Threat Management) Magic Quadrant report for nine years, with the highest placement for their ability to execute.

    Read Article
  • Fortinet Again Recognized as Leader in Gartner’s 2018 UTM MQ Report

    Fortinet Again Recognized as Leader in Gartner’s 2018 UTM MQ Report

    Gartner published its 2018 Unified Threat Management (UTM) Quadrant. Fortinet is proud to announce that we’re named a leader for the ninth time and have attained the highest position with regards...

    Read Article
  • Deep Analysis of a Driver-Based MITM Malware: iTranslator

    Deep Analysis of a Driver-Based MITM Malware: iTranslator

    The FortiGuard Labs research team recently captured a malware sample, an EXE file, which was signed by an invalid certificate. Once a victim opens the exe file, it installs two drivers to control...

    Read Article
  • FortiGate Intrusion Prevention Continues to Excel in NSS Labs’ NGIPS Testing Results

    FortiGate Intrusion Prevention Continues to Excel in NSS Labs’ NGIPS Testing Results

    NSS Labs gives coveted “Recommended” rating for Fortinet FortiGate IPS.

    Read Article
  • loading
    Loading More...