Fortinet Blog | Latest Posts

  • Getting in Front of Cyber Risk: An Interview with Fortinet’s CISO Phil Quade

    Getting in Front of Cyber Risk: An Interview with Fortinet’s CISO Phil Quade

    Fortinet CISO Phil Quade recently spoke to Peter High for an interview that appeared on the Forbes website. In the interview they discussed everything from segmentation to convergence to machine...

    Mehr erfahren
  • AI-based Fuzzing Could Change Security

    AI-based Fuzzing Could Change Security

    Once the purview of defense researchers, advanced fuzzing is poised to fall into the hands of the criminal community. AI-powered fuzzing will change the game for both attacker and target. One...

    Mehr erfahren
  • Digital Convergence’s Impact on OT Security

    Digital Convergence’s Impact on OT Security

    Converging IT and OT environments is essential for many organizations to compete effectively in today’s digital economy. But unless great care is taken and the needs of the OT environment are...

    Mehr erfahren
  • Join Fortinet at AWS Summit Santa Clara 2019

    Join Fortinet at AWS Summit Santa Clara 2019

    Join Fortinet and the cloud computing industry at the AWS Summit Santa Clara 2019 to discover Fortinet’s security solutions for Amazon Web Services, VPCs, and more. Learn more about this event.

    Mehr erfahren
  • Bolstering Endpoint Security

    Bolstering Endpoint Security

    Connected endpoint devices need to be seen and treated as part of your WAN rather than as something separate, and securing them requires tying them together with your full range of different...

    Mehr erfahren
  • 5G Implications for Security

    5G Implications for Security

    Fabric-enabled security platforms not only provide the comprehensive visibility, protection, detection and automated response 5G networks require, they also enable organizations to weave their 5G...

    Mehr erfahren
  • TLS 1.3: What This Means For You

    TLS 1.3: What This Means For You

    TLS 1.3 was released last summer, and it has some important ramifications for securing your critical data.

    Mehr erfahren
  • Addressing Known and Unknown Operational Technology Threats

    Addressing Known and Unknown Operational Technology Threats

    There is a convergence of technologies that is blurring the lines between the physical and digital worlds, known as cyber-physical systems. And it is transforming the technology systems that...

    Mehr erfahren
  • The Need for Threat Intelligence in SMB Cybersecurity

    The Need for Threat Intelligence in SMB Cybersecurity

    For some time now, SMBs have assumed cybercriminals won’t consider them a viable target due to their size. Unfortunately, this isn’t the case. SMBs still provide plenty of incentive to entice...

    Mehr erfahren
  • Taking a Look at Security Trends at RSAC 2019

    Taking a Look at Security Trends at RSAC 2019

    As always, there is literally too much information to consume. But with some simple analysis, we can break down some of the bigger security trends unveiled at this year’s RSA event and help...

    Mehr erfahren
  • Fortinet Recognized as Best Security Company at 2019 SC Magazine Awards

    Fortinet Recognized as Best Security Company at 2019 SC Magazine Awards

    Fortinet won the Excellence Award for Best Security Company and the Trust Award for Best UTM Security Solution at the 2019 SC Awards held in San Francisco during RSAC 2019.

    Mehr erfahren
  • Multi-cloud Complicates Security

    Multi-cloud Complicates Security

    Securing multiple clouds can be very complex. What’s needed is an integrated approach that is dynamic and flexible, and able to keep pace with cloud workloads and applications as they expand.

    Mehr erfahren
  • Analysis of the New Modules that Emotet Spreads

    Analysis of the New Modules that Emotet Spreads

    Just a few days ago, FortiGuard Labs published a research blog about a fresh variant of Emotet. When I wrote that blog, I had not yet detected any further malicious actions from its C&C server....

    Mehr erfahren
  • Getting Ready for Swarm-as-a-Service

    Getting Ready for Swarm-as-a-Service

    Advances in swarm technology have powerful implications in the fields of medicine, transportation, engineering, and automated problem solving. However, if used maliciously, it may also be a game...

    Mehr erfahren
  • Leveraging UEBA to Address Insider Threats

    Leveraging UEBA to Address Insider Threats

    UEBA is a critical tool that can help unify the detection of and response to insider threats, helping close the gap on one of the most serious—and most often overlooked—threats to your business.

    Mehr erfahren
  • New Stealth Worker Campaign Creates a Multi-platform Army of Brute Forcers

    New Stealth Worker Campaign Creates a Multi-platform Army of Brute Forcers

    A brute force attack is very resource intensive, but when using the collective processing power of a bot army, like the one used by this StealthWorker campaign, the task can be efficiently...

    Mehr erfahren
  • FortiGate-VM Next-Generation Firewall Extends Support for VMware NSX-T Data Center

    FortiGate-VM Next-Generation Firewall Extends Support for VMware NSX-T Data Center

    Fortinet is announcing more extensive interoperability between Fortinet’s FortiGate-VM and VMware’s NSX-T Data Center to provide organizations centralized visibility into all workload environments.

    Mehr erfahren
  • Fortinet Introduces FortiInsight for Enhanced Insider Threat Protection

    Fortinet Introduces FortiInsight for Enhanced Insider Threat Protection

    Following the acquisition of ZoneFox Limited at the end of last year, Fortinet is today introducing FortiInsight to help organizations mitigate insider threats.

    Mehr erfahren
  • WordPress WooCommerce XSS Vulnerability –  Hijacking a Customer Account with a Crafted Image

    WordPress WooCommerce XSS Vulnerability – Hijacking a Customer Account with a Crafted Image

    The FortiGuard Labs team recently discovered a Cross-Site Scripting (XSS) vulnerability in WooCommerce. WooCommerce is an open-source eCommerce platform built on WordPress.

    Mehr erfahren
  • Q4 Threat Landscape Report: 2018 Attacks Highlighted the Need for Advanced Threat Intelligence

    Q4 Threat Landscape Report: 2018 Attacks Highlighted the Need for Advanced Threat Intelligence

    Because cyber threats often evolve along with the expanding attack surface, access to regular threat research is essential. Learn about key threat findings from 2018 and what they mean for...

    Mehr erfahren
  • loading
    Mehr laden…