Fortinet

FortinetSecurity

Dr. StrangePatch or: How I Learned to Stop Worrying (about Meltdown and Spectre) and Love Security Advisory ADV180002

Credit to Author: Minh Tran| Date: Fri, 12 Jan 2018 11:39:59 +0000

  Introduction 2018 truly is starting off with a bang: fundamental CPU flaws dubbed Meltdown and Spectre were found affecting pretty much all modern processors developed since the Pentium Pro (1995). These flaws root in two critical CPU features: Out of Order Execution and Speculative Execution, which are crucial for performance. Since this is an important feature and not a bug, it is inherently hard to fix. Furthermore, for performance reasons, speculative execution is almost always implemented in hardware, so “fixes”…

Read More
FortinetSecurity

An Analysis of the OpenSSL SSL Handshake Error State Security Bypass (CVE-2017-3737)

Credit to Author: Dehui Yin| Date: Fri, 12 Jan 2018 11:39:59 +0000

OpenSSL is a widely used library for SSL and TLS protocol implementation that secures data using encryption and decryption based on cryptographic functions. However, a Security Bypass vulnerability – recently addressed in a patch by the OpenSSL Project –can be exploited to make vulnerable SSL clients or remote SSL servers send clean application data without encryption. This Security Bypass vulnerability (CVE-2017-3737) is caused by an error when the SSL_read or SSL_write function handles an "error state" during an SSL handshake….

Read More
FortinetSecurity

Do You Want an SD-WAN with Basic Security or Robust Secure SD-WAN

Credit to Author: Nirav Shah| Date: Thu, 11 Jan 2018 13:45:59 +0000

As network leaders assess their SD-WAN options, however, what is often missing from their deliberations is how to adequately address security risks. SD-WAN vendors are increasingly embedding security features into their offerings, but these tend to be basic, Layer 3 network controls and not the robust security functions that these environments require.

Read More
FortinetSecurity

Mitigating Vulnerabilities in Your Customer’s Security Protocol with a Cyber Threat Assessment

Credit to Author: Carl Cayton| Date: Wed, 10 Jan 2018 13:45:59 +0000

While organizations are adopting new technologies and services, cybercriminals are developing sophisticated methods of attack to target new attack vectors, exploit unforeseen vulnerabilities, and gain access to user data and other network resources. With this increased threat landscape and growing sophistication of cyberattacks, visibility into existing security measures, and identifying those places where there may be gaps is especially important.

Read More
FortinetSecurity

Executive Insights: Connected Cars – A View Into Securing Converged Networks

Credit to Author: Jonathan Nguyen-Duy| Date: Tue, 09 Jan 2018 14:00:59 +0000

Hyperconverged systems are on the horizon, connecting new and existing environments in ways we may have never imagined. But careful planning can ensure that we make this transition smoothly and securely. It starts with insisting on open standards and integrated and interactive security systems designed to talk to each other, share information, identify and adapt to changes, and respond to events in a coordinated and collaborative fashion.

Read More
FortinetSecurity

Fortinet Security Fabric earns NSS Recommendation for Breach Prevention

Credit to Author: Damien Lim| Date: Mon, 08 Jan 2018 14:45:59 +0000

FortiSandbox has already proven itself effective in the 2017 BDS test with a 99% Breach Detection rate, earning a Recommended rating four out of four years. And now, integrated with other Security Fabric components – namely, FortiGate, FortiMail, and FortiClient – it has achieved another NSS Recommended award with this latest 2017 BPS test.

Read More
FortinetSecurity

Executive Insights: Viewing GDPR as an Opportunity to Drive Competitive Advantage and Create Digital Trust

Credit to Author: Drew Del Matto| Date: Mon, 08 Jan 2018 13:45:59 +0000

With GDPR scheduled to come into full effect this May, private and public-sector organizations across the world have no time to waste in taking actions to ensure they are ready to comply with these new requirements. The best way forward is through a comprehensive and integrated strategy that is able to see and track personal data, as well as prevent, detect, and remediate data breaches anywhere they may occur.  This is a strategic approach that not only enables regulatory compliance, but will allow you to differentiate security as a value-add.

Read More