Latest Posts | Page 3


For anyone reading the news regularly, it’s not hard to grasp that cyber threats are getting more sophisticated and damaging by the day. From a security technology provider’s perspective, I can add that tackling them is a fast mounting challenge for the millions of businesses that come under attack daily.  Modern cybersecurity technologies – assuming you have already put in place the right professionals, policies, and processes − are a must. But organizations deploying them need to look beyond the boxes that sit on... [Read More]
by RSS Michael Xie  |  Oct 04, 2017  |  Filed in: Business and Technology
Over the past ten years, technology has transformed healthcare substantially. From electronic health records that simplify the collection and sharing of patient information, to digital consultation and other services provided remotely, to wearable connected medical devices, healthcare is becoming more accessible, accurate, and patient-focused. National Health IT (NHIT) Week, which will take place from October 2nd- 6th, is a collaborative and partner-driven event that aims to increase awareness of the many ways new health IT initiatives stand... [Read More]
by RSS Susan Biddle  |  Oct 02, 2017  |  Filed in: Business and Technology
The FortiGuard Labs team continually tracks phishing and spam campaigns around the world. Sending users macro-enabled documents with a malicious payload is one of the most commonly used malware attack vectors for phishing campaigns. This attack vector has been used by used by such prevalent malware families as Dridex, Fareit, and Hancitor. The key to these sorts of campaigns is luring users into clicking on a malicious file attached to an email message. As a result, malware distributors are always looking for ways to trick users into executing their... [Read More]
by RSS Tien Phung Phan  |  Oct 02, 2017  |  Filed in: Security Research
The need for real-time access to critical data is driving today’s digital transformation. The volume of data being generated, the proliferation of data mining applications, and consumer expectations about access to information are all increasing the value of data and making effective data management and orchestration increasingly critical. Which makes securing that data more important than ever. Which is why Fortinet is a Signature Sponsor at this year’s Oracle OpenWorld 2017 conference, being held October 1-5 at the Moscone... [Read More]
by RSS Traci Anderson  |  Sep 30, 2017  |  Filed in: Business and Technology
Prosperous nations sometimes take for granted the safe and reliable critical infrastructures that underpin our economies, governments, and personal well-being.  Similar to how we marvel today at the Roman Empire’s aqueducts, the 3rd millennium will likely do the same with today’s critical infrastructures.  That is, if they don’t lead to our downfall. Our Strength, Our Weakness The common understanding of the phrase ‘all roads lead to Rome’ is that there are many different ways to reach a goal. ... [Read More]
by RSS Phil Quade  |  Sep 29, 2017  |  Filed in: Industry Trends
When the first firewalls were developed and deployed, their primary role was to act as sentinels monitoring traffic moving into, and sometimes out of the network. These devices would look at packets, network addresses, and ports to determine if data should be allowed through or blocked. A good analogy is airline travel. In the first few iterations of the firewall, data was simply checked to see if it had a ticket, and if its credentials were in order it were allowed to board the plane. Then application traffic took off, and first generation firewalls... [Read More]
by RSS Nirav Shah  |  Sep 28, 2017  |  Filed in: Business and Technology
In the new digital economy, businesses that are able to adapt will be the most competitive and successful. This will require adopting new technologies, networking systems, and strategies. But many of the emerging technologies and strategies that are being deployed across our networks come with a set of unknowns that are having a huge impact on security. The reason is that traditional approaches to security were never really designed to protect dynamic, borderless, and hyper-connected environments. Many Factors Are in Play For example,... [Read More]
by RSS Matthew Pley  |  Sep 27, 2017  |  Filed in: Industry Trends
The financial services sector is one industry benefiting from cloud adoption, not only from the increased services they can provide consumers, but also through cloud-enabled solutions. Bank employees require access to SaaS solutions and CRMs enabled by the public cloud that simplify daily tasks, such as Fiserv and Salesforce. These solutions use cloud computing and storage to optimize operations, putting adopters at a distinct advantage in several key areas. [Read More]
by RSS Bill Hogan  |  Sep 26, 2017  |  Filed in: Industry Trends
Government entities provide critical services that ensure stability across the nation for organizations and the population, such as transportation systems, water, energy, and healthcare. In order to provide these services, respond to queries, and react to an ever-changing global landscape effectively and efficiently, government organizations must rely on IT systems and computer networks. However, this technical infrastructure is also under constant attack from cybercriminals who range from amateur hackers and technical hacktivists to hostile... [Read More]
by RSS Trish Borrmann  |  Sep 22, 2017  |  Filed in: Business and Technology
While FortiGuard Labs was preparing for another presentation on our Locky research at the Black Alps cyber security conference this coming November in Switzerland, Fortinet’s Kadena Threat Intelligence System (KTIS)1 caught another Locky variant using a new extension – “ykcol” or “locky” spelled backwards. Locky has been stepping up its game over the past few months after going dark during the first half of 2017. Just like the old days, this new variant is distributed through massive volumes of malicious... [Read More]
by RSS Floser Bacurio, Joie Salvio, Rommel Joven and Jasper Manuel  |  Sep 21, 2017  |  Filed in: Security Research