There’s been a lot of confusion—and frankly, a lot of vendor hype—about the European Union’s (EU) General Data Protection Regulation (GDPR). There is no doubt that GDPR is a very far-reaching legal initiative that will significantly change the way that many private and public sector organizations treat personally identifiable information (PII) and respond to data breaches. On the other hand, it’s safe to say that a majority of readers of this blog post work for organizations that will not be directly affected by GDPR.
Fireside Chat with Security7: How this MSSP is Enhancing Security through the Cloud while Reducing Customer Costs
Security7 Networks is an MSSP focused on delivering security and compliance services to small- and medium-s...
Most Recent Articles
High SSL Performance Earns FortiGate 5th Consecutive “Recommended” Rating in Latest NSS Labs NGFW Test Results
While NGFW solutions continue to be the linchpin security technology for the network, in today’s cloud and SSL-centric business environments not all NGFW solutions are created equal.
Join Fortinet at the 2018 AWS New York and Chicago Summits
Fortinet is joining other cloud-computing experts at the AWS New York and Chicago Summits. Join us to learn more about the rise of cloud adoption for enterprises, and the modern cybersecurity...
Executive Insights: Growing Up Tech
Michael Xie, Founder, President and CTO of Fortinet shares some pointers on how to raise a tech business successfully.
GandCrab v4.1 Ransomware and the Speculated SMB Exploit Spreader
Only two days after the release of GandCrab 4.0, FortiGuard Labs found a newer version (v4.1) being distributed using the same method, which is through compromised websites disguised as download...
Helping Facilitate Partner Success with NSE 8 Certification
The modern threat landscape is complex. Today, customers require equally complex security solutions to maintain an effective security posture. By completing Fortinet’s NSE 8 certification,...
Is Wireless Technology Secure?
While we all take wireless access for granted, are we aware of the security risks when using it?
Winning the Cyber Arms Race with Machine Learning
A machine learning-based approach to threat detection is set to revolutionize the security industry.
GandCrab V4.0 Analysis: New Shell, Same Old Menace
It has been over two months since GandCrab has undergone a major update. While this latest version includes an overhaul in terms of the code structure, its major purposes are practically the same.
Overcoming Multi-cloud Security Challenges in Education
Here are five best practices for keeping things safe when you have applications and data spread across multiple clouds.
Hussarini – Targeted Cyber Attack in the Philippines
FortiGuard Labs spotted a malicious document with the politically themed file name “Draft PH-US Dialogue on Cyber Security.doc”. This document takes advantage of the vulnerability CVE-2017-11882....
Easy Hosting Control Panel: SQL Injection & Multiple XSS Vulnerabilities
As part of our ongoing threat research at FortiGuard Labs, we discovered that EHCP contains an SQL Injection and multiple cross-site Scripting (XSS) vulnerabilities.
Executive Insights: The Global Security Risks of a Post-Quantum World
For anyone tasked with securing critical infrastructure the arrival and power of quantum computing might be keeping them up at night.
The Risks Mobile Payments Present to Financial Services
Consumers are rapidly adopting mobile payments and are expecting banks and financial services firms to ensure their security. As a result, financial services organizations must increase their...
Why Network and Security Operations Centers Should be Doing More
In today’s complex ecosystem of hyperconnected digital networks, NOC-only or SOC-only techniques are insufficient.
Identifying Security Priorities to Address New Healthcare Cyber Threats
The healthcare sector continues to be a target for cybercriminals as their capabilities become increasingly rapid, sophisticated, and resilient. To combat this healthcare organizations need to...
Recent Security Research News
This blog post is a summary of some recent research work that caught my attention in May 2018.
An Analysis of the Use-After-Free Bug in the Microsoft Edge Chakra Engine (CVE-2018-0946)
Microsoft fixed an use-after-free bug in the Edge Chakra Engine in the May 2018 Patch. This bug (CVE-2018-0946) causes the Chakra Engine to access a freed function address that can possibly be...
Security Strategies that Federal Agencies Can Employ to Enable Digital Transformation
Federal agencies have unique security needs, which also means they require security experts who understand those needs in order to deliver the right solutions.
How Partners Can Mitigate Cyber Risk for SMB Customers
SMBs are increasing their use of technology to remain competitive, which is simultaneously increasing their potential attack surface. Learn why SMBs are a target for cyberattacks and how Fortinet...
Keeping Kids Safe Online