Fortinet

FortinetSecurity

Integrating Artificial Intelligence into Cybersecurity: AI and Transparency Level the Playing Field

Credit to Author: Jack Chan| Date: Mon, 11 Sep 2017 03:00:00 +0000

In our last post we talked about some of the AI tools (AEE, AutoCPRL, etc.) that Fortinet has developed, and how the specialist teams at FortiGuard Labs around the world collaborate to detect, mitigate, and prevent threats of all shapes and sizes. But all of that happens in the background. How do these innovations and techniques translate into actionable tactics and strategies that decision-makers and CISOs can employ toda, to protect their IP, data, and networks from an increasing number of bad actors and adversaries? The key to cyber security…

Read More
FortinetSecurity

Security Research News in Brief – July 2017 Edition

Credit to Author: Axelle Apvrille| Date: Thu, 07 Sep 2017 12:50:00 +0000

Welcome back to our monthly review of some of the most interesting security research publications. July was very busy with the annual DEFCON and BlackHat US conferences, but also RMLL, the Worldwide Free Software Meeting held this year in France. Past editions: June 2017 May 2017 April 2017 March 2017 Elie Burzstein et al, How We Created the First SHA-1 collision and what it means for hash security video, DEFCON 25 slides and paper With the nickname "Crypto Girl", I obviously had to listen to this…

Read More
FortinetSecurity

Integrating Artifical Intelligence into Cybersecurity: AI and Transparency Level the Playing Field

Credit to Author: Jack Chan| Date: Mon, 11 Sep 2017 03:00:00 +0000

In our last post we talked about some of the AI tools (AEE, AutoCPRL, etc.) that Fortinet has developed, and how the specialist teams at FortiGuard Labs around the world collaborate to detect, mitigate, and prevent threats of all shapes and sizes. But all of that happens in the background. How do these innovations and techniques translate into actionable tactics and strategies that decision-makers and CISOs can employ toda, to protect their IP, data, and networks from an increasing number of bad actors and adversaries? The key to cyber security…

Read More
FortinetSecurity

Seven Ways to Ensure a Data Breach Does Not Happen to You

Credit to Author: Derek Manky| Date: Fri, 08 Sep 2017 22:08:00 +0000

While the scale of this data breach is alarming, the attack they suffered is not unique. Far too many organizations have adopted state of the art network designs and yet still rely on isolated second-generation security solutions and strategies to protect them. More than ever, security cannot be an afterthought. It requires planning, people, and processes combined with adaptive security technologies that can dynamically scale to today’s digital networks and automatically respond as an integrated system to address the advanced cyberthreats.

Read More
FortinetSecurity

Moving to the Cloud? Top Security Factors to Consider

It seems like everyone is talking about moving to the cloud these days. The efficiencies, productivity, agility, elasticity, and cost savings all make a compelling case for migrating from traditional private networks and data centers to private clouds and other virtualized instances, and eventually into public and hybrid environments. Because of these advantages, government agencies and private enterprises across industries are all looking at ways to effectively embrace cloud-first strategies.  I attended a security conference just a few…

Read More
FortinetSecurity

Adapting Network Security for DevOps in Financial Services

Credit to Author: Brian Forster| Date: Thu, 07 Sep 2017 12:50:00 +0000

The financial services sector is expected to continue to deliver new, customer-driven and business-critical capabilities as they continue their transition to a digital business model. For example, customers have come to expect to be able to access and make changes to their financial information online and through mobile web applications. Additionally, consumers now expect more customized services from banks and financial services firms, which means these financial institutions must collect and process data about their users to offer tailored products…

Read More
FortinetSecurity

FortiDDoS Launches Support for FortiGuard Domain Reputation Service for IoT and Botnet Based DDoS Attack Mitigation

Credit to Author: Hemant Jain| Date: Wed, 06 Sep 2017 12:50:00 +0000

The FortiGuard Domain Reputation Service License for FortiDDoS is yet further ammunition to use against the growing threat of the IoT and botnet attacks, which are easier than ever to launch due to proliferation of open source code for such attacks, and growing availability of vulnerable devices.

Read More