Fortinet

FortinetSecurity

Fireside Chat with Security7: How this MSSP is Enhancing Security through the Cloud while Reducing Customer Costs

Credit to Author: John Maddison| Date: Tue, 19 Dec 2017 13:45:59 +0000

Security7 Networks is an MSSP focused on delivering security and compliance services to small- and medium-sized enterprises. The company, focusing on intelligence in depth, provides an innovative suite of products to help customers identify risk, improve their ability to defend against cyberthreats, and centralize visibility and control. For several years, Security7 has used Fortinet products to deliver cloud-based security services to its customers. 

Read More
FortinetSecurity

Why Worry? GDPR Doesn’t Apply to Me, Right?

Credit to Author: Patrick Grillo| Date: Mon, 18 Dec 2017 13:45:59 +0000

There’s been a lot of confusion—and frankly, a lot of vendor hype—about the European Union’s (EU) General Data Protection Regulation (GDPR). There is no doubt that GDPR is a very far-reaching legal initiative that will significantly change the way that many private and public sector organizations treat personally identifiable information (PII) and respond to data breaches. On the other hand, it’s safe to say that a majority of readers of this blog post work for organizations that will not be directly affected by GDPR.

Read More
FortinetSecurity

Global Adoption of Fortinet Secure SD-WAN

Credit to Author: Trish Borrmann and Nirav Shah| Date: Fri, 15 Dec 2017 13:45:59 +0000

The compelling benefits of SD-WAN (software-defined wide area network) architectures are catching the attention of companies around the world. SD-WAN offers application-awareness combined with increased performance, flexibility, and simplicity when compared to fundamentally more expensive legacy WAN technologies.

Read More
FortinetSecurity

Executive Insights: Fighting Automation with Automation

Credit to Author: John Maddison | Date: Thu, 14 Dec 2017 13:45:00 +0000

The proliferation of online devices accessing personal and financial information, the adoption of virtualized and multi-cloud environments, and the growing connection of everything – from armies of IoT devices and critical infrastructure in cars, homes, offices, and industry, to the rise of smart cities – have combined to create new destructive opportunities for cybercriminals.

Read More
FortinetSecurity

Three of the Biggest Cybersecurity Challenges Facing the Education Sector

Credit to Author: Susan Biddle| Date: Wed, 13 Dec 2017 13:45:59 +0000

Educational institutions have become regular targets for cybercriminals. In fact, the education sector accounted for 13 percent of data breaches in the first half of 2017, resulting in the compromise of around 32 million records. One of the top reasons that schools are targeted is the diverse data they store on students and staff, including personally identifiable information (PII), healthcare information, and financial information. These records can then be sold on the dark web to be used for purposes of identity theft and fraud. As educational…

Read More
FortinetSecurity

Rise of One More Mirai Worm Variant

Credit to Author: David Maciejak| Date: Tue, 12 Dec 2017 12:45:59 +0000

Not long after a new strain of the Akuma malware was discovered targeting ZyXEL devices with a new series of login/password attacks, FortiGuard Labs last week also began detecting strange scanning activities on uncommon TCP ports 52869 and 37215. We and other threat research teams quickly began to suspect that these were tied together, and that there was a new botnet out there.

Read More
FortinetSecurity

Innovation Insights: Defending Today’s OT Environments

Credit to Author: John Maddison| Date: Tue, 12 Dec 2017 13:45:59 +0000

The transition to hyperconnected networks, such as smart cities and connected utility services, is driving the convergence of IT, OT, and IoT networks. To successfully defend these integrated networks, organizations need an architecture that scales across the entire infrastructure to provide unified visibility and control, distributed segmentation, and integrated protection.

Read More