Fortinet

FortinetSecurity

OT and IT: A Fight Over the Control of Digital Ground

Credit to Author: James Cabe| Date: Thu, 12 Oct 2017 12:50:59 +0000

This change is also causing OT and IT to fight over the control of digital ground. While OT is growing, it is primarily growing into the spaces usually controlled by IT as it is being bolted onto the same networks that phones, routers and laptops touch. This is creating a whole range of security challenges that neither group has ever had to deal with in the past and affects the delivery of applications and information that reaches all the way into the executive suite.

Read More
FortinetSecurity

PDF Phishing Leads to Nanocore RAT, Targets French Nationals

Credit to Author: Joie Salvio and Rommel Joven| Date: Thu, 12 Oct 2017 12:54:00 +0000

Recently, FortiGuard Labs found a phishing campaign targeting French Nationals. In this campaign, a PDF file with an embedded javascript is used to download the payload from a Google Drive shared link. As it turns out, the downloaded file is an HTA (HTML Application) file, a format that is becoming more and more common as a malware launch point. It is usually used as a downloader for the actual binary payload. However in this campaign,…

Read More
FortinetSecurity

IoT knife fight: OT or IT? Part II

Credit to Author: James Cabe| Date: Thu, 12 Oct 2017 12:50:59 +0000

Because they have traditionally had clear borders and full control of their respective areas, OT and IT people tend to be nearly as territorial as the raccoons. But as the line between IT and OT continues to blur, issues arise that sometimes render these teams unable to work together to implement a common solution, such as security measures, segmentation and monitoring.

Read More
FortinetSecurity

IoT knife fight: OT or IT? Part I

Credit to Author: James Cabe| Date: Thu, 12 Oct 2017 12:50:59 +0000

This change is also causing OT and IT to fight over the control of digital ground. While OT is growing, it is primarily growing into the spaces usually controlled by IT as it is being bolted onto the same networks that phones, routers and laptops touch. This is creating a whole range of security challenges that neither group has ever had to deal with in the past and affects the delivery of applications and information that reaches all the way into the executive suite.

Read More
FortinetSecurity

Executive Insights: Digital Transformation and Service Providers: A Q&A with Fortinet’s Matt Pley

Credit to Author: Matt Pley, John Welton| Date: Wed, 11 Oct 2017 18:00:59 +0000

This week, Fortinet hosted Fast and Secure in Dallas, Texas. Almost 200 Service Providers, influencers, and decision makers attended this event to discuss the impact that the transition to a digital economy and new digital business models are having on their business. We sat down with Matt Pley, Fortinet’s Vice President of Cloud, Carriers, Service Providers, & Strategic Accounts to get his key takeaways from the event.

Read More
FortinetSecurity

Understanding the Explosion of IoT and Its Impact

Credit to Author: Phil Keeley| Date: Tue, 10 Oct 2017 12:50:59 +0000

The Fourth Industrial Revolution is upon us, with the digital transformation of business largely consisting of automation, AI, and rapid technological innovation. Industrial processes and machines are becoming smarter and more modular. A critical enabler of this transformation is the Internet of Things (IoT). Smart, always-connected devices provide real-time contextual information with low overhead to optimize processes and improve how companies and individuals interact, work, and live. Over a million new IoT devices are connected to the Internet…

Read More
FortinetSecurity

Cybersecurity Needs to be Seen as a Strategic Issue, Not Just an IT Investment

Credit to Author: Patrice Perche| Date: Mon, 09 Oct 2017 12:39:59 +0000

Surveying over 1,800 IT decision makers, Fortinet found almost half believe security is still not a top priority discussion for the board. At the same time, they also strongly contend that cybersecurity should become a top management priority, with 77% of respondents indicating that the board should put IT security under greater scrutiny.

Read More
FortinetSecurity

Common Types of Cyberattacks in Education and What We Can Learn from Them

Credit to Author: Susan Biddle| Date: Fri, 06 Oct 2017 12:50:59 +0000

Cybercriminals have increasingly taken notice of schools and universities as profitable targets for cyberattacks. A key reason for this is the types of information schools keep on students, parents, and staff. Typically, upon infiltrating an institution’s network, cybercriminals will probe for, find, and exfiltrate valuable user data. This could be anything from health records, financial information, or any other personally identifiable information, such as social security numbers. Cybercriminals typically then take this data and sell it…

Read More