Blog Archive


Sep 22nd, 2017 Gartner Peer Insights for Enterprise Firewalls: See What Government Leaders are Saying About Fortinet by Trish Borrmann
Sep 21st, 2017 Locky Unleashes Multiple Spam Waves with a New Variant “ykcol“ by Floser Bacurio, Joie Salvio, Rommel Joven and Jasper Manuel
Sep 20th, 2017 Evasive Malware Campaign Abuses Free Cloud Service, Targets Korean Speakers by Joie Salvio and Jasper Manuel
Sep 20th, 2017 For Cybercriminals, IoT Devices are Big Business, Part Two by Anthony Giandomenico
Sep 20th, 2017 For Cybercriminals, IoT Devices are Big Business, Part One by Anthony Giandomenico
Sep 20th, 2017 Fortinet Partner Insider by Amy Thompson
Sep 20th, 2017 Five Cyber Threats Every Security Leader Must Know About by John Maddison
Sep 19th, 2017 Rewriting IDAPython Script objc2_xrefs_helper.py for Hopper by Kai Lu
Sep 19th, 2017 BlueBorne: Technical Insight by Axelle Apvrille
Sep 19th, 2017 A Look Into The New Strain Of BankBot by Dario Durando
Sep 18th, 2017 A Wrap Up of ToorCon 19 at San Diego by Kai Lu
Sep 18th, 2017 Fortinet Demonstrates Critical Security Capabilities for Hybrid Cloud Networks at Microsoft Ignite 2017 by Mike Morgan
Sep 18th, 2017 The Apache Struts 2 Vulnerability by Aamir Lakhani
Sep 18th, 2017 Adapting to the New Normal with an Informed Cybersecurity Strategy by Joseph Sykora
Sep 17th, 2017 Integrating Artificial Intelligence into Cybersecurity: Collaboration is the Key….! by Jack Chan
Sep 15th, 2017 How Can SMB Practices Improve Healthcare Cybersecurity? by Susan Biddle
Sep 15th, 2017 Deep Analysis of New Poison Ivy/PlugX Variant - Part II by Xiaopeng Zhang
Sep 14th, 2017 BlueBorne May Affect Billions of Bluetooth Devices by Aamir Lakhani
Sep 14th, 2017 Browser Extensions: A New Threat? by Minh Tran
Sep 14th, 2017 Power, Performance and the Cloud by John Maddison
Sep 13th, 2017 Addressing Security in an IoT World by Toan Trinh
Sep 13th, 2017 IoT Security: Trickier Than You Think by Phil Keeley, Peter Newton
Sep 12th, 2017 IBM Bluemix Cloud Platform and Fortinet Extend Partnership for Open and Scalable Cloud Security Services by Darlene Gannon
Sep 12th, 2017 Why the Financial Sector Needs to Focus on Automating Threat Intelligence by Bill Hogan
Sep 11th, 2017 The Value of Fortinet Products in Education: Customer Reviews in Gartner Peer Insights by Trish Borrmann
Sep 10th, 2017 Integrating Artificial Intelligence into Cybersecurity: AI and Transparency Level the Playing Field by Jack Chan
Sep 8th, 2017 Seven Ways to Ensure a Data Breach Does Not Happen to You by Derek Manky
Sep 8th, 2017 Moving to the Cloud? Top Security Factors to Consider by Jonathan Nguyen-Duy
Sep 7th, 2017 Adapting Network Security for DevOps in Financial Services by Brian Forster
Sep 7th, 2017 Security Research News in Brief - July 2017 Edition by Axelle Apvrille
Sep 6th, 2017 Preparing Your Customers for the Digital Transformation with Fortinet by Joseph Sykora
Sep 6th, 2017 FortiDDoS Launches Support for FortiGuard Domain Reputation Service for IoT and Botnet Based DDoS Attack Mitigation by Hemant Jain
Sep 5th, 2017 A wrap up of HITCON 2017 by Wayne Chin Yick Low and Yongjian Yang
Sep 5th, 2017 Rehashed RAT Used in APT Campaign Against Vietnamese Organizations by Jasper Manuel, Artem Semenchenko
Sep 3rd, 2017 Integrating Artificial Intelligence into Cybersecurity: Protecting IP, Data, and Networks with AI by Jack Chan
Sep 1st, 2017 PowerPoint File Armed with CVE-2017-0199 and UAC Bypass by Rommel Joven and Jasper Manuel
Sep 1st, 2017 Fortinet 361° Security Forum 2017 by Annabelle Sou
Sep 1st, 2017 Living Securely in a Digital World by Anthony Giandomenico
Aug 31st, 2017 CIPA Compliance and Cybersecurity: You Can’t Have One Without the Other by Susan Biddle
Aug 30th, 2017 WLAN Security Challenges that Healthcare Organizations Need to Overcome by Susan Biddle
Aug 29th, 2017 Preparing for GDPR: What the Financial Services Industry Should Know by Bill Hogan
Aug 28th, 2017 Seamless Hybrid Cloud Security is Critical for VMware Cloud on AWS by Warren Wu
Aug 25th, 2017 Gartner Peer Insights for Enterprise Firewalls: See What Financial Services Leaders Are Saying About Fortinet by Trish Borrmann
Aug 24th, 2017 What Does a Ransomware Attack in Healthcare Really Cost? by Susan Biddle
Aug 23rd, 2017 Deep Analysis of New Poison Ivy Variant by Xiaopeng Zhang
Aug 23rd, 2017 We Have Seen the Enemy, and It Is Us by Derek Manky
Aug 22nd, 2017 The GDPR: Adding Teeth to Data Privacy by Drew Del Matto
Aug 21st, 2017 Dissecting Our Q2 Threat Landscape Report by Neil Matz
Aug 18th, 2017 Gartner Peer Insights for Enterprise Firewalls: See What Healthcare Leaders Are Saying About Fortinet by Trish Borrmann
Aug 18th, 2017 The Role of E-Rate in Protecting the Digital K-12 Learning Environment by Susan Biddle