Fortinet

FortinetSecurity

Mitigating Vulnerabilities in Your Customer’s Security Protocol with a Cyber Threat Assessment

Credit to Author: Carl Cayton| Date: Wed, 10 Jan 2018 13:45:59 +0000

While organizations are adopting new technologies and services, cybercriminals are developing sophisticated methods of attack to target new attack vectors, exploit unforeseen vulnerabilities, and gain access to user data and other network resources. With this increased threat landscape and growing sophistication of cyberattacks, visibility into existing security measures, and identifying those places where there may be gaps is especially important.

Read More
FortinetSecurity

Executive Insights: Connected Cars – A View Into Securing Converged Networks

Credit to Author: Jonathan Nguyen-Duy| Date: Tue, 09 Jan 2018 14:00:59 +0000

Hyperconverged systems are on the horizon, connecting new and existing environments in ways we may have never imagined. But careful planning can ensure that we make this transition smoothly and securely. It starts with insisting on open standards and integrated and interactive security systems designed to talk to each other, share information, identify and adapt to changes, and respond to events in a coordinated and collaborative fashion.

Read More
FortinetSecurity

Fortinet Security Fabric earns NSS Recommendation for Breach Prevention

Credit to Author: Damien Lim| Date: Mon, 08 Jan 2018 14:45:59 +0000

FortiSandbox has already proven itself effective in the 2017 BDS test with a 99% Breach Detection rate, earning a Recommended rating four out of four years. And now, integrated with other Security Fabric components – namely, FortiGate, FortiMail, and FortiClient – it has achieved another NSS Recommended award with this latest 2017 BPS test.

Read More
FortinetSecurity

Executive Insights: Viewing GDPR as an Opportunity to Drive Competitive Advantage and Create Digital Trust

Credit to Author: Drew Del Matto| Date: Mon, 08 Jan 2018 13:45:59 +0000

With GDPR scheduled to come into full effect this May, private and public-sector organizations across the world have no time to waste in taking actions to ensure they are ready to comply with these new requirements. The best way forward is through a comprehensive and integrated strategy that is able to see and track personal data, as well as prevent, detect, and remediate data breaches anywhere they may occur.  This is a strategic approach that not only enables regulatory compliance, but will allow you to differentiate security as a value-add.

Read More
FortinetSecurity

A Security Fabric for Digital-Age Healthcare: A Preview of HIMSS 2018

Credit to Author: Susan Biddle | Date: Fri, 05 Jan 2018 13:45:59 +0000

HIMSS 2018 will be held this year on March 5-9th at the Sands Expo Center in Las Vegas. Fortinet is excited to be attending this event yet again to meet with healthcare IT professionals standing on the front lines of digital transformation initiatives at their organizations, and to attend the various workshops, roundtables, and keynotes presented by thought leaders.

Read More
FortinetSecurity

Fortinet Advisory on New Spectre and Meltdown Vulnerabilities

Credit to Author: Fortinet| Date: Thu, 04 Jan 2018 18:45:59 +0000

Earlier this week, it was announced that researchers uncovered two new side channel attacks that exploit newly discovered vulnerabilities found in most CPU processors, including those from Intel, AMD, and ARM. These vulnerabilities allow malicious userspace processes to read kernel memory, thereby potentially causing sensitive kernel information to leak. These vulnerabilities are known as Meltdown and Spectre.

Read More
FortinetSecurity

Prevalent Threats Targeting Cuckoo Sandbox Detection and Our Mitigation

Credit to Author: Floser Bacurio and Wayne Low| Date: Wed, 03 Jan 2018 17:45:59 +0000

In this blog post, we will discuss the history of sandbox detection. We will then unveil the malware families that KTIS has observed from spear-phishing emails that attempt to bypass the user-mode API hook in order to evade sandbox detection. And finally, we will share the mitigation method we use to harden the Cuckoo sandbox against this bypass technique.

Read More
FortinetSecurity

Addressing Three Major Pain Points of the Cybersecurity Skills Gap

Credit to Author: Jon Bove| Date: Wed, 03 Jan 2018 13:45:59 +0000

The cybersecurity skills shortage is an issue impacting all industries. As cyberattacks become more frequent and sophisticated, organizations all over the world are struggling to outfit their teams with personnel that are armed with essential cybersecurity backgrounds and technical security skills, in addition to broader IT know-how.

Read More