Fortinet

FortinetSecurity

The GDPR: Adding Teeth to Data Privacy

Credit to Author: Drew Del Matto| Date: Tue, 22 Aug 2017 15:50:00 +0000

The Fortinet Security Fabric allows organizations to harness the collective power and intelligence of Fortinet’s portfolio of security solutions to collect and correlate threat intelligence, actively detect and isolate threats, and automate a coordinated response across the entire network. Such an approach allows organizations to extend visibility deep into their infrastructure, and more importantly, into their data, so they know where it is, who and what have access to it. It also allows them to demonstrate compliance…

Read More
FortinetSecurity

Gartner Peer Insights for Enterprise Firewalls: See What Healthcare Leaders Are Saying About Fortinet

Credit to Author: Trish Borrmann | Date: Fri, 18 Aug 2017 13:00:00 +0000

The healthcare industry requires technology that can keep pace with the speed at which medicine is evolving in order to provide patients with the best possible care. Additionally, this technology must meet HIPAA compliance standards to secure protected health information (PHI) from the growing number cyberattacks targeting the healthcare industry. This comes at a time when more devices than ever are accessing healthcare providers’ networks, including the proliferation of connected medical devices in the Internet of Medical Things (IoMT), and…

Read More
FortinetSecurity

The Role of E-Rate in Protecting the Digital K-12 Learning Environment

Credit to Author: Susan Biddle| Date: Fri, 18 Aug 2017 12:58:00 +0000

The K-12 learning environment has moved beyond the physical walls of the classroom thanks to behavioral shifts and digital connectivity. However, robust and speedy network services that are designed to keep student and faculty data secure come with a price tag. The cost of ongoing connectivity and keeping networks secure is a constant barrier for most school districts, but thankfully, the E-rate program gives them an opportunity to do just that. Take a look at the graphic below to see how the classroom environment has evolved, the threats…

Read More
FortinetSecurity

Locky Launches a More Massive Spam Campaign with New “Lukitus” Variant

Credit to Author: Joie Salvio, Rommel Joven and Floser Bacurio| Date: Thu, 17 Aug 2017 21:37:00 +0000

It has just been a week since the variation of Locky named Diablo6 appeared. Now it has launched another campaign more massive than the previous. This time, it uses “.lukitus”, which means “locking” in Finnish, as the extension for the encrypted files. The FortiGuard Lion Team was the first to discover this variant with the help of Fortinet’s advanced  Kadena Threat Intelligence System [1](KTIS) Fig. 1 Encrypted files with .lukitus extension Fig. 2 Familiar Locky ransom note Same Locky, More Spam This…

Read More
FortinetSecurity

Analyzing Android malware using a FortiSandbox

Credit to Author: Axelle Apvrille| Date: Thu, 17 Aug 2017 13:00:00 +0000

In this blog post we will analyze a couple of Android malware samples in the Android VM of the FortiSandbox. We'll also share a few interesting and useful tricks. Running a sample in the VM To run a given sample in the Android VM, you should log into the FortiSandbox, make sure an Android VM is available, and then "Scan Input" / Submit a New File. Next, if the objective is to run the malware in the sandbox, you must make sure to skip "static scan," "AV scan," and "Cloud Query"…

Read More
FortinetSecurity

Securing Critical Infrastructure Takes a Village…and Automation

Credit to Author: Phil Quade| Date: Wed, 16 Aug 2017 12:55:00 +0000

Malicious cyber activity targeted at the nation’s critical infrastructure – including water systems, transportation, energy, finance, and emergency services – are particularly worrisome because the interruption of those services can have devastating effects on our economy, impact the well being of our citizens, and even cause the loss of life.

Read More