Fortinet

FortinetSecurity

FortiVets: Remembering – and Hiring – our Veterans

Credit to Author: Stephan Tallent| Date: Fri, 26 May 2017 09:19:10 -0700

Many Americans see Memorial Day in the US as the holiday that kicks off summer. Stores are loaded with shiny new grills, bags of charcoal, and rows of filled propane tanks. Patio furniture is being dusted off while refrigerators are stuffed with marinating steaks, bowls of potato salad, and chilled beer waiting for friends and family for the traditional weekend barbeque. But Memorial Day is about much more than grilling a burger with a cold beverage in your hand. Memorial Day in the United States, observed every year on the last Monday of May,…

Read More
FortinetSecurity

Trends Affecting Managed Security Service Providers

Credit to Author: Bill McGee| Date: Thu, 25 May 2017 09:06:35 -0700

Given the very public explosion of ransomware, and an ever-growing list of other cyber threats, IT services providers are increasingly looking for ways to meet the insatiable demand for cybersecurity. In this article we will look at some of the trends and challenges facing the MSSP community. How has the cost and shortage of security talent empowered the MSS domain? There are two forces driving the growth of MSS – complexity and cost. The complexity of threats and regulations continues to grow, with no change in sight. On the cost side, there…

Read More
FortinetSecurity

Automating Security Operations: What It Takes to Defend Against Something Like WannaCry

Credit to Author: Douglas Jose Pereira| Date: Tue, 23 May 2017 15:37:42 -0700

A major challenge facing security vendors today is that most solutions and products are developed based on knowledge of previous threats that already exist. This makes many security solutions reactive by their very design, which is not a tenable strategy for facing the volume of new attacks and strategies arising today. This arms race of identifying new threats, then reacting has been the primary strategy since the dawn of malware: A new virus is identified and then security vendors write the antivirus signature to block it; a polymorphic virus…

Read More
FortinetSecurity

What It Takes to Successfully Defend Against WannaCry and Everything Else

Credit to Author: Douglas Jose Pereira| Date: Tue, 23 May 2017 12:23:43 -0700

A major challenge facing security vendors today is that most solutions and products are developed based on knowledge of previous threats that already exist. This makes many security solutions reactive by their very design, which is not a tenable strategy for facing the volume of new attacks and strategies arising today. This arms race of identifying new threats, then reacting has been the primary strategy since the dawn of malware: A new virus is identified and then security vendors write the antivirus signature to block it; a polymorphic virus…

Read More
FortinetSecurity

Byline: Artificial Intelligence: Cybersecurity Friend or Foe?

Credit to Author: Derek Manky| Date: Mon, 22 May 2017 07:41:32 -0700

​​​​​​​Security strategies need to undergo a radical evolution. Tomorrow’s security devices will need to see and interoperate with each other to recognize changes in the networked environment, anticipate new risks and automatically update and enforce policies. The devices must be able to monitor and share critical information and synchronize responses to detected threats.

Read More
FortinetSecurity

The Cybersecurity Threats Presented by Financial Services Remote Employees

Credit to Author: Bill Hogan| Date: Fri, 12 May 2017 11:18:00 -0700

Security and IT professionals at large enterprises across all industries are faced with the daily task of having to secure an expanding attack surface. Vulnerable points of entry used to live within the organization’s walls, where firewalls and inline security tools could protect them. But networks have now evolved into a constantly evolving, borderless environment thanks to cloud usage, the Internet of Things (IoT), and an increasingly mobile workforce. Technological advances, paired with a surge of digitally savvy employees flooding the…

Read More
FortinetSecurity

Internet2: A Collaborative Power That Needs to be Secured

Credit to Author: Susan Biddle| Date: Fri, 19 May 2017 09:23:01 -0700

For what started as a research network that was largely owned and operated by top universities, the Internet as we know it today has become much more. In 1969, ARPANET carried the first data packets between two separate nodes. During its genesis, ARPANET included the University of California, Los Angeles and the Stanford Research Institute before adding the University of Utah and University of California, Santa Barbara. What began as a 4-node network in 1969 had swelled to include 213 hosts by 1981. From there, it took off.  The Internet’s…

Read More