Blog Archive


Jul 24th, 2017 The Need for Threat Intelligence by Neil Matz
Jul 21st, 2017 The Evolution of the Firewall by Phil Quade
Jul 20th, 2017 Byline: It’s Time to Get Serious About Web Application Security by John Maddison
Jul 19th, 2017 Why Top Healthcare Institutions are Moving Toward Integrated Security Solutions by Susan Biddle
Jul 18th, 2017 Black Hat Executive Interviews: Q&A with Phil Quade, Fortinet CISO by Darlene Gannon
Jul 17th, 2017 Byline: What’s Your Network’s Threat IQ? 3 Steps Toward Actionable, Real-Time Threat Intel by Derek Manky
Jul 14th, 2017 Securing the Digital World, Part II by Ken Xie
Jul 14th, 2017 Visit Fortinet at Black Hat 2017 by Mike Morgan
Jul 13th, 2017 Byline: Know Your Enemy: Understanding Threat Actors by Anthony Giandomenico
Jul 12th, 2017 Incomplete Patch: More Joomla! Core XSS Vulnerabilities Are Found by Zhouyuan Yang
Jul 12th, 2017 Don’t Take It from Us – FortiGate Enterprise Network Firewall Customer Reviews by Trish Borrmann
Jul 12th, 2017 Securing the Digital World, Part I by Ken Xie
Jul 12th, 2017 Information Governance for Healthcare Institutions by Darlene Gannon
Jul 11th, 2017 FortiGate Moves to the Leader’s Quadrant by John Maddison
Jul 11th, 2017 Outsmarting the Next Ransomware with Advanced Threat Protections by Amy Thompson
Jul 10th, 2017 Considering the Cloud? Five Questions to Ask by Aamir Lakhani
Jul 9th, 2017 Key Differences Between Petya and NotPetya by Raul Alvarez
Jul 9th, 2017 Petya's Master Boot Record Infection by Gabriel Hung and Margarette Joven
Jul 9th, 2017 Unmasking Android Malware: A Deep Dive into a New Rootnik Variant, Part III by Kai Lu
Jul 9th, 2017 Unmasking Android Malware: A Deep Dive into a New Rootnik Variant, Part II by Kai Lu
Jul 9th, 2017 Unmasking Android Malware: A Deep Dive into a New Rootnik Variant, Part I by Kai Lu
Jul 7th, 2017 Google Chromebook Security: At The Forefront of Education Discussions by Susan Biddle
Jul 7th, 2017 Network Security in the Era of the Millennials by Bill McGee
Jul 6th, 2017 WannaCry and Petya: The Circus Comes to Town by Michael Xie
Jul 5th, 2017 Visit Fortinet at Microsoft Inspire 2017 by Mike Morgan
Jul 5th, 2017 Fortinet in ETSI Security Week by Nicolas Thomas
Jul 4th, 2017 SSTIC 2017 in a Nutshell by Axelle Apvrille
Jul 3rd, 2017 Byline: Petya, Wannacry, and Mirai - Is This the New Normal? by Derek Manky
Jun 30th, 2017 Questions to Ask When Navigating the E-Rate Program by Susan Biddle
Jun 29th, 2017 Preventing Cloud Blindness by John Maddison
Jun 28th, 2017 A Technical Analysis of the Petya Ransomworm by Margarette Joven
Jun 28th, 2017 In-Depth Analysis of A New Variant of .NET Malware AgentTesla by Xiaopeng Zhang
Jun 28th, 2017 Fortinet UTM: A Gartner’s Magic Quadrant Leader 8 Times in a Row by John Maddison
Jun 27th, 2017 New Ransomworm Follows WannaCry Exploits by Aamir Lakhani
Jun 27th, 2017 The Need for Situational Awareness by Anthony Giandomenico
Jun 26th, 2017 Fortinet FortiWeb Advanced Application Security Integrates with Microsoft Azure Security Center by Cynthia Hseih
Jun 25th, 2017 Google’s 2017 CTF – The “ASCII Art Client” Challenge by Honggang Ren
Jun 23rd, 2017 Hughes-Fortinet Partnership Brings Zero-Touch Simplicity to Distributed Retail Organizations by Daniel Mellinger
Jun 23rd, 2017 Byline: Four Tips for a Cyber-Safe Summer by Anthony Giandomenico
Jun 22nd, 2017 Security Research News in Brief - May 2017 Edition by Axelle Apvrille
Jun 22nd, 2017 The Role of the Healthcare CIO Yesterday, Today, and Tomorrow by Susan Biddle
Jun 21st, 2017 Google’s 2017 CTF Challenge: Mindreader by Kushal Arvind Shah
Jun 20th, 2017 Strengthening the Security Fabric of Blockchain by Hemant Jain
Jun 19th, 2017 Executive Insights: Managing Risk through Digital Trust by Drew Del Matto
Jun 16th, 2017 Why SIEM Solutions Are Essential to Securing Healthcare Networks by Susan Biddle
Jun 15th, 2017 Higher Education: Critical Infrastructure and the Dark Cloud of Cyber Threats by Susan Biddle
Jun 14th, 2017 WINS Server Remote Memory Corruption Vulnerability in Microsoft Windows Server by Honggang Ren
Jun 14th, 2017 Evolving towards a Homogenous Society: The Risk of the New Digital Economy by Derek Manky
Jun 13th, 2017 FortiSIEM for AWS by Dave Morrissey
Jun 13th, 2017 Who's Afraid of the Big, Bad Robot? by James Cabe