Latest Posts


Over the last couple of years, cyberattacks have evolved in both scale and effectiveness, affecting organizations across all industries and geographic regions. Successful cyberattacks are a growing industry-wide problem in spite of billions being spent on cybersecurity solutions. Part of the reason is that new techniques- and in fact a mature supporting cybercrime ecosystem- for penetration and evading detection have reduced the effectiveness of many traditional defenses. The lingering effects of a successful attack often have devastating consequences,... [Read More]
by RSS Michael Xie  |  Oct 17, 2017  |  Filed in: Business and Technology
On Monday morning it was announced that WPA2, WiFi’s most popular encryption standard, had been cracked. A new attack method called KRACK (for Key Reinstallation AttaCK) is now able to break WPA2 encryption, allowing a hacker to read information passing between a device and its wireless access point using a variation of a common – and usually highly detectable – man-in-the-middle attack. If successful, this vulnerability can potentially allow a hacker to spy on your data as well as gain access to unsecured devices sharing the... [Read More]
by RSS Bill McGee  |  Oct 16, 2017  |  Filed in: Business and Technology, Security Research
In light of today’s huge skills gap, security professionals have an obligation to mentor the next generation. Employees of cybersecurity vendors can help shrink the gap by volunteering their time in the classrooms, from elementary school through college. The knowledge and experience of front-line professionals is invaluable, whether to explain to first-graders what malware is or to steer college students toward the right classes to give them a strong foundation for a cybersecurity career. The problem is bigger than any one vendor or educational [Read More]
by RSS Anthony Giandomenico  |  Oct 16, 2017  |  Filed in: Industry Trends
From October 15th – 18th, the 2017 Internet2 Technology Exchange will take place in San Francisco, CA. The Technology Exchange brings together leaders from the research, education, and technology communities to discuss and find solutions to the technical challenges that threaten the missions of their organizations. The robust Internet2 community comprises 317 US higher education institutions, 81 leading corporations, 64 affiliate and federal affiliate members, 43 regional and state education networks, and more than... [Read More]
by RSS Susan Biddle  |  Oct 15, 2017  |  Filed in: Business and Technology
The rhetoric surrounding mainframes and their uses in modern enterprises tends to be largely negative. Mainframes are seen by many as outdated legacy IT systems that are, or will be, obsolete in the near future as businesses increasingly move to the cloud. However, these notions are one-sided. The reality is that mainframe computing remains alive and well within many infrastructure-critical industries, including some of the largest organizations in the world. It’s reported that 71 percent of Fortune 500 companies still run much of their... [Read More]
by RSS Bill Hogan  |  Oct 13, 2017  |  Filed in: Industry Trends
The healthcare sector has undergone dramatic changes in the past several years, primarily spurred by the adoption of new medical technology. Beginning with the adoption of electronic health records (EHRs) and continuing on into the increased use of medical applications, online patient portals, connected devices, and wearables, the healthcare sector has been capitalizing on digital advancements to improve overall patient experiences and outcomes. This effort has been well received by patients and physicians alike, as it simplifies communication... [Read More]
by RSS Susan Biddle  |  Oct 13, 2017  |  Filed in: Industry Trends
Recently, FortiGuard Labs found a phishing campaign targeting French Nationals. In this campaign, a PDF file with an embedded javascript is used to download the payload from a Google Drive shared link. As it turns out, the downloaded file is an HTA (HTML Application) file, a format that is becoming more and more common as a malware launch point. It is usually used as a downloader for the actual binary payload. However in this campaign,... [Read More]
by RSS Joie Salvio and Rommel Joven  |  Oct 12, 2017  |  Filed in: Security Research
This change is also causing OT and IT to fight over the control of digital ground. While OT is growing, it is primarily growing into the spaces usually controlled by IT as it is being bolted onto the same networks that phones, routers and laptops touch. This is creating a whole range of security challenges that neither group has ever had to deal with in the past and affects the delivery of applications and information that reaches all the way into the executive suite. [Read More]
by RSS James Cabe  |  Oct 12, 2017  |  Filed in: Industry Trends
Because they have traditionally had clear borders and full control of their respective areas, OT and IT people tend to be nearly as territorial as the raccoons. But as the line between IT and OT continues to blur, issues arise that sometimes render these teams unable to work together to implement a common solution, such as security measures, segmentation and monitoring. [Read More]
by RSS James Cabe  |  Oct 12, 2017  |  Filed in: Industry Trends
This week, Fortinet hosted Fast and Secure in Dallas, Texas. Almost 200 Service Providers, influencers, and decision makers attended this event to discuss the impact that the transition to a digital economy and new digital business models are having on their business. We sat down with Matt Pley, Fortinet’s Vice President of Cloud, Carriers, Service Providers, & Strategic Accounts to get his key takeaways from the event. [Read More]
by RSS Matt Pley, John Welton  |  Oct 11, 2017  |  Filed in: Business and Technology