In the past decade, cloud computing has become increasingly popular among enterprises, with Gartner Research projecting IT spending on public cloud-based infrastructure services to surpass $24 billion in 2016, and associated management and security to surpass $8 billion. This evolution of our IT infrastructure brings with it concerns about the safety of our data, applications and end users. We talked to Chad Whalen about the move to the cloud, the related security concerns, and how Fortinet is protecting this rapidly-evolving IT infrastructure.
Are Endpoints Integrated Into Your Network Security Strategy?
Endpoint security is the responsibility of far more than the endpoint or desktop IT team. In fact, it is re...
Most Recent Articles
Predictions: AI Fuzzing and Machine Learning Poisoning
2019 Predictions from the FortiGuard Labs team reveal methods and techniques that Fortinet researchers anticipate cybercriminals will employ in the near future, along with important strategy...
New Loki Variant Being Spread By Phishing Email
After a quick analysis of a new phishing email, FortiGuard Labs found that it was spreading a new variant of the Loki malware. In this blog we walk through what it does.
As the Holiday Season Draws Near, Mobile Malware Attacks Are Prevalent
Fortinet's quarterly Global Threat Landscape Report reveals threats are increasing and evolving to become more sophisticated. Unique threat variants and families are on the rise, while botnet...
What Your Customers Need from Today’s NAC Solutions
Customers need a unified view into every IoT device on the network to secure against the threats brought on by the adoption of IoT, combined with the ability to detect and act on threats.
Patch Your Microsoft Outlook: Fortinet Discovered Four Outlook Remote Code Execution Vulnerabilities
This Patch Tuesday, November 13, 2018, Microsoft patched six vulnerabilities discovered in Microsoft Outlook. Four of them were discovered and reported on by Fortinet researcher Yonghui Han by...
Veterans Can Help Your Cyber Skills Gap
One of the most pressing concerns facing organizations today is the widening cybersecurity skills gap. One often overlooked pipeline that may help close the skills gap is servicemembers...
Dharma Ransomware: What It’s Teaching Us
FortiGuard Labs has been monitoring the Dharma (also named CrySiS) malware family for a few years. As we demonstrate in our blog, even though the Dharma ransomware continues to be active, the...
Analyzing the New non-Beta Version of the Kraken Cryptor Ransomware
FortiGuard Labs recently detected new versions of Kraken Cryptor Ransomware. While the beta tag has been removed from its configuration, there are still numerous bugs in this ransomware, and the...
Enabling Education and Security at the 2018 CETPA Annual Conference
Join Fortinet at the 2018 CETPA Annual Conference for discussions focused on the needs of IT professionals in the education field, as well as the security solutions and strategies they need to...
FortiGate NGFW Consistently Delivers in NSS Lab’s 2018 DCSG Group Tests
As part of our ongoing commitment to the independent and fact-based testing and evaluation of FortiGate solutions, Fortinet participated in the 2018 DCSG and DCIPS group tests with FortiGate 6300F...
Deep Analysis of TrickBot New Module pwgrab
FortiGuard Labs found a new TrickBot variant, with a new module pwgrab, which attempts to steal credentials, autofill data, history and so on. We did a deep analysis on this pwgrab module to...
Security is a Crucial SD-WAN Differentiator
SD-WAN offers essential benefits associated with new digital business requirements such as direct cloud access, better application performance, increased agility, and lower costs, enabling...
The Specialized Security Concerns of OT Networks
As cybercriminals begin to more aggressively target OT devices and systems, basic security measures are increasingly inadequate. OT networks need to evolve to address increasing cyber risk.
How-to Guide: Defeating an Android Packer with FRIDA
FortiGuard Labs has encountered a lot of packed Android malware recently. One interesting aspect to this malware is that even though the packer being used is consistently the same, the malware...
The Potential for Biometric Facial Recognition and Authentication
Now is the time for a realistic discussion of how to harness the potential for biometric facial recognition authentication to ensure its continued development includes safeguards and seizes...
CTA Adversary Playbook: Goblin Panda
The FortiGuard SE Team has released a new adversary playbook on the threat actor group known as Goblin Panda as part of its role in the Cyber Threat Alliance (CTA).
The Opportunity with Automation for MSSPs Today
Read about the three reasons automation Is an MSSP's best friend as the speed and volume of attacks make it impossible to manually assess and block each threat.
Security Transformation: The Key to Successful Digital Transformation
As the drive towards digital transformation gathers momentum, this is an appropriate time for organizations to pause and reflect for a moment on their security strategies.
Securing IIoT Requires Extra Care
As IT and operational technology networks converge, organizations are exposing their traditionally isolated OT networks to new cyber-risks.
5 Security Priorities for Government Agencies as TIC 3.0 is Announced