Ensuring Cloud Cybersecurity at the Rate of Cloud Adoption

Credit to Author: Amy Thompson| Date: Wed, 18 Oct 2017 12:50:59 +0000

In an effort to meet consumer demands and business needs, moving business-critical infrastructure and operations over to cloud environments is becoming less of an option and more of a requirement. Recently, we wrote about the digital transformation that will, sooner rather than later, be adopted by our channel partner’s clients. This transformation will be focused on enabling business operations and consumers with such things as big data analytics, IoT devices, and new technology that is faster and more agile than ever. The ability to offer…

Read more

How to Achieve Automated, Intelligence-Driven Security

Credit to Author: Michael Xie| Date: Tue, 17 Oct 2017 12:50:59 +0000

Over the last couple of years, cyberattacks have evolved in both scale and effectiveness, affecting organizations across all industries and geographic regions. Successful cyberattacks are a growing industry-wide problem in spite of billions being spent on cybersecurity solutions. Part of the reason is that new techniques- and in fact a mature supporting cybercrime ecosystem- for penetration and evading detection have reduced the effectiveness of many traditional defenses. The lingering effects of a successful attack often have devastating consequences,…

Read more

WPA2 Has Been Broken. What Now?

Credit to Author: Bill McGee| Date: Mon, 16 Oct 2017 13:50:59 +0000

On Monday morning it was announced that WPA2, WiFi’s most popular encryption standard, had been cracked. A new attack method called KRACK (for Key Reinstallation AttaCK) is now able to break WPA2 encryption, allowing a hacker to read information passing between a device and its wireless access point using a variation of a common – and usually highly detectable – man-in-the-middle attack. If successful, this vulnerability can potentially allow a hacker to spy on your data as well as gain access to unsecured devices sharing the…

Read more

How Vendors Can Partner with Education to Narrow the Skills Gap: A Call to Action

Credit to Author: Anthony Giandomenico| Date: Mon, 16 Oct 2017 12:50:59 +0000

In light of today’s huge skills gap, security professionals have an obligation to mentor the next generation. Employees of cybersecurity vendors can help shrink the gap by volunteering their time in the classrooms, from elementary school through college. The knowledge and experience of front-line professionals is invaluable, whether to explain to first-graders what malware is or to steer college students toward the right classes to give them a strong foundation for a cybersecurity career. The problem is bigger than any one vendor or educational

Read more

Join Fortinet at the 2017 Internet2 Tech Exchange Where Industry Experts Will Bring Wisdom to Automation

Credit to Author: Susan Biddle| Date: Sun, 15 Oct 2017 12:50:59 +0000

From October 15th – 18th, the 2017 Internet2 Technology Exchange will take place in San Francisco, CA. The Technology Exchange brings together leaders from the research, education, and technology communities to discuss and find solutions to the technical challenges that threaten the missions of their organizations. The robust Internet2 community comprises 317 US higher education institutions, 81 leading corporations, 64 affiliate and federal affiliate members, 43 regional and state education networks, and more than…

Read more

Minimizing Cyber Risks as Healthcare Providers Increase Technology Use

Credit to Author: Susan Biddle| Date: Fri, 13 Oct 2017 12:50:59 +0000

The healthcare sector has undergone dramatic changes in the past several years, primarily spurred by the adoption of new medical technology. Beginning with the adoption of electronic health records (EHRs) and continuing on into the increased use of medical applications, online patient portals, connected devices, and wearables, the healthcare sector has been capitalizing on digital advancements to improve overall patient experiences and outcomes. This effort has been well received by patients and physicians alike, as it simplifies communication…

Read more

Securing Legacy IT Systems from Modern Application Threats in the Financial Sector

Credit to Author: Bill Hogan| Date: Fri, 13 Oct 2017 12:50:59 +0000

The rhetoric surrounding mainframes and their uses in modern enterprises tends to be largely negative. Mainframes are seen by many as outdated legacy IT systems that are, or will be, obsolete in the near future as businesses increasingly move to the cloud. However, these notions are one-sided. The reality is that mainframe computing remains alive and well within many infrastructure-critical industries, including some of the largest organizations in the world. It’s reported that 71 percent of Fortune 500 companies still run much of their…

Read more

OT and IT and Security by Design

Credit to Author: James Cabe| Date: Thu, 12 Oct 2017 12:50:59 +0000

Because they have traditionally had clear borders and full control of their respective areas, OT and IT people tend to be nearly as territorial as the raccoons. But as the line between IT and OT continues to blur, issues arise that sometimes render these teams unable to work together to implement a common solution, such as security measures, segmentation and monitoring.

Read more

OT and IT: A Fight Over the Control of Digital Ground

Credit to Author: James Cabe| Date: Thu, 12 Oct 2017 12:50:59 +0000

This change is also causing OT and IT to fight over the control of digital ground. While OT is growing, it is primarily growing into the spaces usually controlled by IT as it is being bolted onto the same networks that phones, routers and laptops touch. This is creating a whole range of security challenges that neither group has ever had to deal with in the past and affects the delivery of applications and information that reaches all the way into the executive suite.

Read more

PDF Phishing Leads to Nanocore RAT, Targets French Nationals

Credit to Author: Joie Salvio and Rommel Joven| Date: Thu, 12 Oct 2017 12:54:00 +0000

Recently, FortiGuard Labs found a phishing campaign targeting French Nationals. In this campaign, a PDF file with an embedded javascript is used to download the payload from a Google Drive shared link. As it turns out, the downloaded file is an HTA (HTML Application) file, a format that is becoming more and more common as a malware launch point. It is usually used as a downloader for the actual binary payload. However in this campaign,…

Read more

IoT knife fight: OT or IT? Part II

Credit to Author: James Cabe| Date: Thu, 12 Oct 2017 12:50:59 +0000

Because they have traditionally had clear borders and full control of their respective areas, OT and IT people tend to be nearly as territorial as the raccoons. But as the line between IT and OT continues to blur, issues arise that sometimes render these teams unable to work together to implement a common solution, such as security measures, segmentation and monitoring.

Read more