Blog Archive | Page 2


Jul 9th, 2017 Unmasking Android Malware: A Deep Dive into a New Rootnik Variant, Part I by Kai Lu
Jul 7th, 2017 Network Security in the Era of the Millennials by Bill McGee
Jul 7th, 2017 Google Chromebook Security: At The Forefront of Education Discussions by Susan Biddle
Jul 6th, 2017 Executive Insights: WannaCry and Petya: The Circus Comes to Town by Michael Xie
Jul 5th, 2017 Visit Fortinet at Microsoft Inspire 2017 by Mike Morgan
Jul 5th, 2017 Fortinet in ETSI Security Week by Nicolas Thomas
Jul 4th, 2017 SSTIC 2017 in a Nutshell by Axelle Apvrille
Jul 3rd, 2017 Byline: Petya, Wannacry, and Mirai - Is This the New Normal? by Derek Manky
Jun 30th, 2017 Questions to Ask When Navigating the E-Rate Program by Susan Biddle
Jun 29th, 2017 Preventing Cloud Blindness by John Maddison
Jun 28th, 2017 A Technical Analysis of the Petya Ransomworm by Margarette Joven
Jun 28th, 2017 In-Depth Analysis of A New Variant of .NET Malware AgentTesla by Xiaopeng Zhang
Jun 28th, 2017 Fortinet UTM: A Gartner’s Magic Quadrant Leader 8 Times in a Row by John Maddison
Jun 27th, 2017 New Ransomworm Follows WannaCry Exploits by Aamir Lakhani
Jun 27th, 2017 The Need for Situational Awareness by Anthony Giandomenico
Jun 26th, 2017 Fortinet FortiWeb Advanced Application Security Integrates with Microsoft Azure Security Center by Cynthia Hseih
Jun 25th, 2017 Google’s 2017 CTF – The “ASCII Art Client” Challenge by Honggang Ren
Jun 23rd, 2017 Hughes-Fortinet Partnership Brings Zero-Touch Simplicity to Distributed Retail Organizations by Daniel Mellinger
Jun 23rd, 2017 Byline: Four Tips for a Cyber-Safe Summer by Anthony Giandomenico
Jun 22nd, 2017 Security Research News in Brief - May 2017 Edition by Axelle Apvrille
Jun 22nd, 2017 The Role of the Healthcare CIO Yesterday, Today, and Tomorrow by Susan Biddle
Jun 21st, 2017 Google’s 2017 CTF Challenge: Mindreader by Kushal Arvind Shah
Jun 20th, 2017 Strengthening the Security Fabric of Blockchain by Hemant Jain
Jun 19th, 2017 Executive Insights: Managing Risk through Digital Trust by Drew Del Matto
Jun 16th, 2017 Why SIEM Solutions Are Essential to Securing Healthcare Networks by Susan Biddle
Jun 15th, 2017 Higher Education: Critical Infrastructure and the Dark Cloud of Cyber Threats by Susan Biddle
Jun 14th, 2017 WINS Server Remote Memory Corruption Vulnerability in Microsoft Windows Server by Honggang Ren
Jun 14th, 2017 Evolving towards a Homogenous Society: The Risk of the New Digital Economy by Derek Manky
Jun 13th, 2017 FortiSIEM for AWS by Dave Morrissey
Jun 13th, 2017 Who's Afraid of the Big, Bad Robot? by James Cabe
Jun 12th, 2017 Cybercrime At Your Service, Mac by Aamir Lakhani
Jun 12th, 2017 Byline: Securing Your Enterprise’s Expansion into the Cloud by Matt Pley
Jun 9th, 2017 MacRansom: Offered as Ransomware as a Service by Rommel Joven and Wayne Chin Yick Low
Jun 8th, 2017 Executive Insights: Innovating for Business Success by Michael Xie
Jun 7th, 2017 Threat Insights: The Future of Smart and Automated Threats by John Welton
Jun 6th, 2017 Research Report: Visibility and Control of Distributed Infrastructures Diminishing as Attack Vectors Grow by John Maddison
Jun 5th, 2017 Join Fortinet at HPE Discover 2017! by Neil Prasad
Jun 5th, 2017 Governmental Entities Bringing Financial Cybersecurity to Center Stage by Bill Hogan
Jun 4th, 2017 An Inside Look at CVE-2017-0199 – HTA and Scriptlet File Handler Vulnerability by Wayne Chin Yick Low
Jun 2nd, 2017 Infographic: Protecting Today’s Financial Services Industry in a Digital Environment by Brian Forster
Jun 1st, 2017 Digital Transformation in Healthcare and How Fabric Security Solutions Can Assist by Jonathan Nguyen-Duy
Jun 1st, 2017 Byline: Healthcare in the Crosshairs by Susan Biddle
May 31st, 2017 Byline: WannaCry is Part of a Bigger Problem by James Cabe
May 30th, 2017 Spear Phishing Fileless Attack with CVE-2017-0199 by Bahare Sabouri and He Xu
May 30th, 2017 The Power of Virtual Cell Wi-Fi by Kaushik Dash, Harish Gnanasambandam, Vikas Banerjee
May 29th, 2017 Byline: What is Next for Cloud Services in the Federal Space? by Aamir Lakhani
May 26th, 2017 FortiVets: Remembering – and Hiring – our Veterans by Stephan Tallent
May 25th, 2017 Trends Affecting Managed Security Service Providers by Bill McGee
May 23rd, 2017 Automating Security Operations: What It Takes to Defend Against Something Like WannaCry by Douglas Jose Pereira
May 23rd, 2017 Executive Insights: An Interview with Phil Quade by John Welton