Fortinet

FortinetSecurity

Securing Customers’ Physical and Virtual Networks with a SIEM Platform

Credit to Author: Lief Koepsel| Date: Wed, 06 Dec 2017 13:45:59 +0000

To keep up with this threat landscape, your customers’ IT teams require security solutions that can provide real-time visibility into network activity and regulatory compliance, as well as automatically initiate a response to security events, to increase the overall efficiency of IT management teams. In order to effectively manage network security, compliance, and performance, your customers should consider implementing a SIEM (security information and event management) solution that features automation, scalability, and actionable intelligence

Read More
FortinetSecurity

Executive Insights: Changing Cybersecurity Regulations that Global Financial Services Firms Need to Know About

Credit to Author: Drew Del Matto| Date: Tue, 05 Dec 2017 13:45:59 +0000

Globally operating financial services firms have to be aware of new cybersecurity regulations and how they affect their business in order to navigate data rules and remain compliant, especially as they conduct business across borders. Compliance is especially crucial as the punishments for noncompliance typically include large fines. Below are some of the most recent implemented or proposed cybersecurity regulations that will affect financial services firms.

Read More
FortinetSecurity

Multiple Plone Cross-Site Scripting Vulnerabilities

Credit to Author: Zhouyuan Yang| Date: Tue, 05 Dec 2017 13:30:59 +0000

Plone is a free and open source content management system, and is ranked among the top 2% of all open source projects worldwide. More than 350 solution providers in more than 100 countries currently support it. The project has been actively developed since 2001, is available in more than 40 languages, and has the best security track record of any major CMS. The users (https://plone.com/about/they-use-plone) include the Federal Bureau of Investigation (FBI), the Central Intelligence Agency (CIA), the Intellectual Property Rights Center, and so on. Earlier…

Read More
FortinetSecurity

Public Cloud Security: Making It a Business Enabler

Credit to Author: Jeannette Jarvis| Date: Mon, 04 Dec 2017 13:50:59 +0000

In general, if a cybercriminal is able to successfully launch an attack at an owner-operated IT infrastructure, they can also launch one at a cloud service provider. In fact, public cloud services have become highly attractive targets for cybercriminals. For them, breaking into a cloud service is like merging onto a superhighway that can deliver their little bundles of evil far and wide, potentially impacting hundreds or thousands of organizations with a single strike.

Read More
FortinetSecurity

Q&A with Bob Fortna President of Fortinet Federal Inc

Credit to Author: Shelly Scarpelli| Date: Mon, 04 Dec 2017 13:45:59 +0000

Bob Fortna joined Fortinet as president of Fortinet Federal Inc. earlier this year. We sat down with Bob to get his perspective on his new role and learn about what he envisions for Fortinet in supporting Federal agencies and partners.   As the Fortinet Federal Inc. leader, what do you see as the company’s role as a Federal agency partner? As prime targets for the most sophisticated adversaries seeking to impact national security, public safety, and civilian services, Federal Government agencies require the most comprehensive…

Read More
FortinetSecurity

PowerDNS Recursor HTML/Script Injection Vulnerability – A Walkthrough

Credit to Author: Chris Navarrete| Date: Sat, 02 Dec 2017 15:50:59 +0000

PowerDNS Recursor is a high-end, high-performance resolving name server that powers the DNS resolution of at least a hundred million subscribers. The “Recursor” is one of two name server products whose primary goal is to act as resolving DNS server. On Aug. 7, 2017, I reported an XSS (cross-site scripting) vulnerability to PowerDNS and its Security Team. They assigned it the identifier CVE-2017-15092. In this report I will explain how I was able to identify and trigger the vulnerability.

Read More
FortinetSecurity

E-Rate Program: What You Should Know When Filing

Credit to Author: Susan Biddle| Date: Fri, 01 Dec 2017 13:45:59 +0000

Having secure, reliable access to the internet is no longer an option. It’s necessary. This is especially true for schools, as curriculum and resources are increasingly moving online and cyberattacks are becoming more frequent. In fact, data shows that 141 US school districts have reported one or more cyber incidents since 2016. To meet these needs, K-12 schools and districts across the United States are currently in the process of applying for E-rate for Funding Year 2018. The E-rate program from the Universal Service Administration…

Read More
FortinetSecurity

Symbiotic Security in Healthcare

Credit to Author: Susan Biddle| Date: Fri, 01 Dec 2017 13:45:59 +0000

If healthcare providers can’t figure out how to safely adopt IoMT and operate in the digital age, they won’t survive. One of the benefits of consolidations, mergers and acquisitions is that the acquiring practice is oftentimes now acting as a SaaS provider for the smaller, acquired practice – including providing cybersecurity. Because networks are more complicated than ever before, security is only as strong as its weakest link. 

Read More