Fortinet

FortinetSecurity

Software, Software all Around but Not a Tool to Use

Credit to Author: James Cabe| Date: Mon, 08 May 2017 12:51:02 -0700

For the past 3-4 years, there has been a lot of buzz in the Information Technology market around the Software Defined delivery of applications. In terms of meta-technology evolution, software is being used to create and deliver software. Yes, it is as confusing as it sounds. The Software Defined revolution has caught on in three distinct areas: data center and cloud, connectivity to applications, and the agile deployment or creation of services. Amazon Web Services has recently redefined the new SDDC, or Software Defined Datacenter space,…

Read More
FortinetSecurity

The Open Security Requirement in the Age of the Cloud

Credit to Author: Amy Thompson| Date: Mon, 08 May 2017 12:46:12 -0700

In a 2015 article posted by Forbes, it was reported that 87 percent of people hadn’t heard of the term “Internet of Things” (IoT). At that time, Gartner Inc. estimated that there were 4.9 billion connected devices in use. Fast forward to 2017, and Gartner now reports that number has grown  to 8.4 billion, with a look ahead to 2020 predicting that 20.4 billion connected devices will be in use. The IoT has gained traction in day-to-day life by adding new applications and capabilities at a rapid rate, and as this technology begins…

Read More
FortinetSecurity

Why Today’s Financial Organizations Should Deploy Internal Segmentation Firewalls

Credit to Author: Bill Hogan| Date: Fri, 05 May 2017 09:21:31 -0700

As is the case across most of today’s industries, the latest IT technological advances like the cloud, Internet of Things (IoT), and mobility have all blurred the lines between traditional network boundaries, making them harder to secure by the day. Security challenges are escalating in part because there are an increasing number of network access points that can open doors to sensitive financial data. For example, many devices inside of today’s financial networks, such as routers and switches, are not security aware. Once these devices…

Read More
FortinetSecurity

Multiple Joomla! Core XSS Vulnerabilities Are Discovered

Credit to Author: Zhouyuan Yang| Date: Thu, 04 May 2017 17:05:00 -0700

Joomla! is one of the world's most popular content management system (CMS) solutions. It enables users to build custom Web sites and powerful online applications. More than 3 percent of Web sites are running Joomla!, and it accounts for more than 9 percent of CMS market share. As of November 2016, Joomla! had been downloaded over 78 million times. Over 7,800 free and commercial extensions are also currently available from the official Joomla! Extension Directory, and more are available from other sources. This year, as a FortiGuard researcher…

Read More
FortinetSecurity

Video Gallery: Fortinet Employees Spotlight SIEM and Secure Access at HIMSS17

Credit to Author: Susan Biddle| Date: Thu, 04 May 2017 08:49:44 -0700

This past February, thousands of healthcare IT professionals gathered in Orlando for the 2017 HIMSS conference to get an expansive view of the current healthcare landscape. Fortinet was also in attendance, presenting as well as walking the floors of the conference to connect with other vendors and discuss how their solutions can help clinicians and IT professionals keep their organization’s network secure. During our time at HIMSS, we spoke with customers, prospects, and of course, Fortinet employees. In this video gallery we will hear…

Read More
FortinetSecurity

Deep Analysis of New Emotet Variant

Credit to Author: Xiaopeng Zhang| Date: Wed, 03 May 2017 10:50:33 -0700

Background Last week, FortiGuard Labs captured a JS file that functions as a malware downloader to spread a new variant of the Emotet Trojan. Its original file name is Invoice__779__Apr___25___2017___lang___gb___GB779.js.  A JS file, as you may be aware, is a JavaScript file that can be executed by a Window Script Host (wscript.exe) simply by double-clicking on it. In this blog we will analyze how this new malware works by walking through it step by step in chronological order. A JS file used to spread malware The original JS code…

Read More
FortinetSecurity

Byline: Will Automated Next Gen Cybersecurity be Based on Intent?

Credit to Author: Ken McAlpine| Date: Wed, 03 May 2017 08:22:17 -0700

Over the last few months I’ve written about a number of technologies impacting cybersecurity and how in a perhaps idealistic world these security systems can all interact with each other, share information about the devices in our networks, and take mitigating actions, as required. So where does that leave us for improving our overall approach to information security as it relates to rapidly evolving networked systems?

Read More
FortinetSecurity

Bricker Bot – A Silver Lining to Force Accountability for IoT Security?

Credit to Author: Douglas Jose Pereira dos Santos| Date: Tue, 02 May 2017 13:33:56 -0700

The Bricker bot made the news a couple of weeks ago as being responsible for knocking unsecured IoT devices offline, rather than hijacking them into other botnets and using them for a DDoS attack like the massive event we saw last year against DYN. This is the third botnet that targets insecure IoT devices, but the only one that is destructive. The second, dubbed Hajime, breaks the into IoT devices, but instead of bricking them, it makes them more secure by disabling remote access to the device from the internet. Of course, Mirai was the first,…

Read More