By now, you will have all heard about the rampant spread of ransomware through countless press pieces, blog articles, and far too often, the outrageous claims of some security vendors. But let’s stop and think for a minute or two. How did these attacks happen? Are companies focusing on valid threats, fixing the right problems, or developing correct processes? Have so-called disruptive technologies disrupted our thinking? Let’s not go tactical. Instead, we need to consider, “what is our best strategy?” Ever since the...
Network Security in the Era of the Millennials
One of the toughest gigs in IT is the job of keeping an organization’s network safe. It is also one that is...
Most Recent Articles
Three Options for Managing Secure Wireless Access
When searching for a wireless access infrastructure solution, network leaders should look for the following key attributes.
Resolving the Challenges of IT-OT Convergence
Success in the new digital economy requires developing integrated networks that are able to seamlessly leverage all available resources, even those ICS/SCADA systems deep inside OT networks.
Training to Combat Modern Cyber Threats at the NSE EMEA Xperts Academy
Fortinet’s NSE Xperts Academy offers our certified partners a hands-on security experience, giving them the resources needed to provide consistent value to their customers using Fortinet products.
How to Protect Your Privacy on The Web
Privacy-minded consumers can combine general strategies with cost effective privacy-oriented tools to achieve the goal of protecting their privacy and identity.
Going Beyond Compliance
Organizations that go beyond compliance to offer robust data-security controls provide greater value to consumers and build their level of trust, resulting in a distinct competitive edge.
Together, Fortinet and AWS Secure the Government
Fortinet’s Security Fabric cloud solutions are available to AWS enterprise, service provider, and public sector customers, providing comprehensive security, threat intelligence, and visibility to...
Thrip ATP Attack Update
In conjunction with the Cyber Threat Alliance, Symantec today released their blog post on an APT (advanced persistent threat) group codenamed "Thrip.” As part of our membership with the Cyber...
Defending Against an Automated Attack Chain: Are You Ready?
Threats like AutoSploit bring malware-as-a-service to a whole new level. Here are four ways to be prepared.
Cybersecurity in the Digital Business Transformation Era
Even as digital technology is transforming business, government, and society, it also transforms how we think of and practice cybersecurity. There are five key implications for cybersecurity in...
AI Doesn’t Eliminate Jobs, It Creates Them
Automation and AI are not eliminating jobs, they are creating them — high-paying, high-level and secure ones at that — at an unprecedented rate. As the levels of data continue to grow, that will...
The Rise of Destructive Botnets
It is critical that every organization become aware of these emerging risks and begin to take appropriate countermeasures now. In the escalating cyberwar, enterprises need to be able to fight...
Microsoft Windows Remote Kernel Crash Vulnerability
At the end of January 2018, the FortiGuard Labs team discovered a remote kernel crash vulnerability in Microsoft Windows and reported it to Microsoft by following Fortinet’s responsible disclosure...
Two Options for Evolving Your IPS Solution
Every moment of every day an IPS system works to detect malicious content in network traffic to prevent attacks and exploits for organizations of all sizes. But as the digital infrastructure...
Threat Information Sharing Goes Far Beyond Simply Protecting Businesses
Threat intelligence sharing is critical in our digital society. Learn more about Fortinet's gobal stragtic partnerships with Interpol, and our training & education programs.
PyRoMineIoT: NSA Exploit, Monero(XMR) Miner, & IoT Device Scanner
In this article, we will discuss the changes made to PyRoMine, as well as how the ETERNALROMANCE exploit was used to distribute yet another Monero miner we have dubbed PyRoMineIoT.
You Can’t Protect What You Can’t See: Gaining Visibility in Endpoint Security
Implementing an integrated and automated security solution allows IT teams to discover, assess, and monitor endpoints to ensure security and compliance.
Fabric-Ready Partner Spotlight Q&A – CSPi
Fortinet recently talked with Gary Southwell, Managing Director, about CSPi’s security priorities and the tools they produce to keep customers’ information secure through automated breach...
Securing the Modernization of IT for State and Local Governments
State and local government entities are modernizing legacy IT systems. The modernization of security solutions should be done in tandem with these new deployments.
Is Cryptojacking Replacing Ransomware as the Next Big Threat?
Cryptojackers have clearly discovered that, if done properly, leveraging the processing power of a hijacked system to mine for cryptocurrencies can be a potentially long-term profitable venture.
Non-Russian Matryoshka: Russian Service Centers Under Attack