Blog Archive


May 23rd, 2017 Automating Security Operations: What It Takes to Defend Against Something Like WannaCry by Douglas Jose Pereira
May 23rd, 2017 Executive Insights: An Interview with Phil Quade by John Welton
May 22nd, 2017 Byline: Artificial Intelligence: Cybersecurity Friend or Foe? by Derek Manky
May 19th, 2017 Internet2: A Collaborative Power That Needs to be Secured by Susan Biddle
May 18th, 2017 Perspective: The Aftermath of the WannaCry Attack by Bill McGee
May 17th, 2017 Spring Parade for Refreshed Android Marcher by Dario Durando, Kenny Yang, David Maciejak
May 17th, 2017 New Loki Variant Being Spread via PDF File by Xiaopeng Zhang and Hua Liu
May 17th, 2017 WannaCry FAQ - Take-aways and Learnings by Aamir Lakhani
May 17th, 2017 Zero Patch IoT Environment by Axelle Apvrille
May 16th, 2017 No Tears for WannaCry: Five Steps Every CISO Should Consider for Protecting Your Organization from Ransomware by Phil Quade
May 15th, 2017 Critical Update: WannaCry Ransomware by Aamir Lakhani
May 15th, 2017 WannaCry: Evolving History from Beta to 2.0 by Kyle Yang
May 15th, 2017 Service Provider Security in the Age of Digital Transformation by Richard Orgias
May 12th, 2017 The Cybersecurity Threats Presented by Financial Services Remote Employees by Bill Hogan
May 12th, 2017 Protecting Your Organization from the WCry Ransomware by Aamir Lakhani
May 11th, 2017 White House Announces New Cybersecurity Executive Order by Phil Quade
May 11th, 2017 Deep Analysis of Esteemaudit by Dehui Yin
May 11th, 2017 Byline: Security Platform vs. Security Fabric by John Maddison
May 10th, 2017 Security Research News in Brief - April 2017 Edition by Axelle Apvrille
May 9th, 2017 Deep Analysis of New Emotet Variant – Part 2 by Xiaopeng Zhang
May 8th, 2017 The Open Security Requirement in the Age of the Cloud by Amy Thompson
May 8th, 2017 Software, Software all Around but Not a Tool to Use by James Cabe
May 5th, 2017 Why Today’s Financial Organizations Should Deploy Internal Segmentation Firewalls by Bill Hogan
May 4th, 2017 Multiple Joomla! Core XSS Vulnerabilities Are Discovered by Zhouyuan Yang
May 4th, 2017 Video Gallery: Fortinet Employees Spotlight SIEM and Secure Access at HIMSS17 by Susan Biddle
May 3rd, 2017 Deep Analysis of New Emotet Variant – Part 1 by Xiaopeng Zhang
May 3rd, 2017 Byline: Will Automated Next Gen Cybersecurity be Based on Intent? by Ken McAlpine
May 2nd, 2017 Bricker Bot – A Silver Lining to Force Accountability for IoT Security? by Douglas Jose Pereira dos Santos
May 1st, 2017 FortiGuard Labs Telemetry – Cloud Application Usage Observations by Gavin Chow
Apr 28th, 2017 Executive Insights: Achieving Digital Trust in a World of Data by Drew Del Matto
Apr 27th, 2017 Staying Compliant in Financial Services and How Cybersecurity Solutions Can Help by Bill Hogan
Apr 26th, 2017 BankBot, the Prequel by Dario Durando & David Maciejak
Apr 26th, 2017 Video Gallery: Fortinet Systems Engineers Discuss Healthcare Security Trends at HIMSS17 by Susan Biddle
Apr 25th, 2017 The Critical Need for MSSPs by Steven Yurkunas
Apr 24th, 2017 Fortinet Supports INTERPOL-led Cybercrime Operation across the Association of Southeast Asian Nations (ASEAN) by Bill McGee
Apr 21st, 2017 Protecting Higher Education Data in Today’s Digital World by Susan Biddle
Apr 20th, 2017 Remote Password Change Vulnerability in HPE Vertica Analytic Database by Honggang Ren
Apr 20th, 2017 Join Fortinet at the 2017 Internet2 Global Summit: Industry Experts Will Examine the Importance of Cybersecurity in Higher Education. by Susan Biddle
Apr 20th, 2017 Fortinet Fabric-Ready Partner Spotlight: Attivo Networks by Darlene Gannon
Apr 19th, 2017 Byline: IoT - Not as New As You Think by Phil Quade
Apr 18th, 2017 Video Gallery: Tom Stafford and Josh Kinsler Recap Key Takeaways from HIMSS17 by Susan Biddle
Apr 18th, 2017 Fortinet Again Receives 5-Star Rating from CRN by Amy Thompson
Apr 17th, 2017 Extending the Security Fabric into Cloud IaaS by John Maddison
Apr 14th, 2017 4 Financial Services Cybersecurity Pain Points and How Security Fabric Can Assist by Bill Hogan
Apr 13th, 2017 WebAssembly 101: Bringing Bytecode to the Web by David Maciejak
Apr 13th, 2017 IRS Notification? No, It is a Scam by Xiaopeng Zhang
Apr 13th, 2017 Certification Marks for IoT Devices – A Suggestion to the FTC and California by Hemant Jain
Apr 11th, 2017 Fortinet Extends the Security Fabric into the Cloud by John Maddison
Apr 10th, 2017 The True Value of Data by Keith Rayle
Apr 10th, 2017 Can your Firewall do This? by Rajoo Nagar
Apr 7th, 2017 Q&A: It’s Time To Automate Security. Part 2 by John Welton
Apr 7th, 2017 Q&A: It’s Time To Automate Security. Part 1 by John Welton
Apr 7th, 2017 Securing The Enterprise Perimeter by Prasanna Tapkire
Apr 6th, 2017 Fortinet Fabric-Ready Partner Spotlight: Silver Peak Systems by Darlene Gannon
Apr 5th, 2017 How to repair a DEX file, in which some key methods are erased with NOPs by Kai Lu
Apr 5th, 2017 In-Depth Look at New Variant of MONSOON APT Backdoor, Part 2 by Jasper Manuel and Artem Semenchenko
Apr 5th, 2017 In-Depth Look at New Variant of MONSOON APT Backdoor, Part 1 by Jasper Manuel and Artem Semenchenko
Apr 5th, 2017 Video Gallery: Ladi Adefala and Hussein Syed Discuss Healthcare Security Following HIMSS17 by Susan Biddle
Apr 4th, 2017 Empowering Distributed Enterprises with Secured SD-WAN by Nirav Shah and Bill McGee
Apr 3rd, 2017 When Choosing a Security Solution, Start with the Market Leader by Bill McGee
Apr 3rd, 2017 Fortinet Security Fabric: Protecting the Unique Environment of Industrial Control Systems by Nirav Shah
Apr 2nd, 2017 Insomni'hack 2017 by Axelle Apvrille
Mar 31st, 2017 Data Driven Security – James Cabe’s Interview with Intel Chip Chat by John Welton
Mar 31st, 2017 Channel Focus: Solving Security’s Growing Pains with Scalability by Amy Thompson
Mar 30th, 2017 It Is Tax (and Fraud) Time Again. Are You Ready? by Anthony Giandomenico
Mar 29th, 2017 Microsoft Word File Spreads Malware Targeting Both Mac OS X and Windows (Part II) by Chris Navarrete & Xiaopeng Zhang
Mar 28th, 2017 Fortinet Secures Workloads on AWS by Dave Morrissey
Mar 28th, 2017 Cybercriminals Are Building an Army of Things Creating a Tipping Point for Cybersecurity by Derek Manky
Mar 27th, 2017 The Essential 8: ASD’s strategies to mitigate cyber security incidents by Katrina Fox
Mar 27th, 2017 Threat Perspective: Risky Business, A Look Inside the Threat Actor Studio by John Welton
Mar 24th, 2017 Security Research News in Brief March 2017 Edition by Axelle Apvrille
Mar 24th, 2017 FortiGuard Labs Telemetry – Round up of 2015 and 2016 IoT Threats (Part 4) – DVR/NVR devices by Gavin Chow
Mar 23rd, 2017 iSNS Server Memory Corruption Vulnerability in Microsoft Windows Server by Honggang Ren
Mar 22nd, 2017 Microsoft Word File Spreads Malware Targeting Both Apple Mac OS X and Microsoft Windows by Xiaopeng Zhang & Chris Navarrete
Mar 22nd, 2017 Fortinet Fabric-Ready Partner Spotlight: Versa Networks by Darlene Gannon
Mar 21st, 2017 FortiGuard Labs Discovers Multiple Vulnerabilities in Microsoft Word by Tony Loi and Wayne Chin Yick Low
Mar 21st, 2017 A Closer Look at the Rapid Evolution of EHR Security by Susan Biddle
Mar 20th, 2017 FortiGuard Labs Telemetry – Round up of 2016 IoT Threats (Part 3) – IP Cameras by Gavin Chow
Mar 20th, 2017 Join Fortinet at IBM InterConnect 2017 by Neil Prasad
Mar 17th, 2017 Grabbot is Back to Nab Your Data by David Wang and He Xu
Mar 17th, 2017 Blockchain and Financial System Impact by Keith Rayle
Mar 16th, 2017 5 Network Security Challenges That Will Keep Financial Services CIOs On Alert in 2017 by Brian Forster
Mar 15th, 2017 FortiMail named IDC Email Security Leader by Carl Windsor
Mar 15th, 2017 Teardown of a Recent Variant of Android/Ztorg (Part 1) by Axelle Apvrille
Mar 15th, 2017 Teardown of Android/Ztorg (Part 2) by Axelle Apvrille
Mar 14th, 2017 Fortinet Welcomes New Industry-Leading Technology Partners to Our Security Fabric Ecosystem by John Welton
Mar 13th, 2017 FortiGuard Labs Telemetry: Round up of 2015 and 2016 IoT Threats (Part 2 Home Routers) by Gavin Chow
Mar 10th, 2017 Four Ramifications of Cyber Attacks on Healthcare Systems by Claire Silcock
Mar 9th, 2017 Byline: IoT is Everywhere - Your Security Should Be Too by Jonathan Nguyen-Duy
Mar 8th, 2017 Byline: The Move to Standardization and Open Architectures Enables Cybersecurity Automation For the Government Sector by Steve Kirk
Mar 8th, 2017 Microsoft Excel Files Increasingly Used To Spread Malware by Xiaopeng Zhang
Mar 7th, 2017 Byline: Companies Are Taking the Cyber Skills Gap Into Their Own Hands by Scott Edwards
Mar 6th, 2017 FortiGuard Labs Telemetry – Roundup and Comparison of 2015 and 2016 IoT Threats by Gavin Chow
Mar 5th, 2017 Improving Australia’s Cybersecurity Through Integration and Automation by Katrina Fox
Mar 3rd, 2017 Using a Security Fabric to Meet New York's (and Other) Financial Cybersecurity Regulations by Brian Forster
Mar 3rd, 2017 Byline: Is Your Healthcare Data Safe? Three Questions to Ask by Susan Biddle
Mar 2nd, 2017 Byline: Securing Your Growing Home Network by Anthony Giandomenico
Mar 2nd, 2017 Dot Ransomware: Yet another Commission-based Ransomware-as-a-Service by Rommel Joven
Mar 1st, 2017 Managed Security Service Providers, Choosing the Right Security Vendor by Stephan Tallent
Feb 27th, 2017 Executive Insights: Five Areas for Cybersecurity Innovation in 2017 by Michael Xie