atp | Page 2


Recently, I wrote about the three vectors of a healthcare cyber attack. This is the second of a three-part series examining each vector in depth. Over the past couple of months, I’ve written about the three vectors of a healthcare cyber attack. Most recently, I looked in depth at the first vector, what we usually think of as “traditional attacks and malware”. These sorts of attacks continue to make headlines, but as healthcare evolves and increasing numbers of medical devices begin feeding data directly into health information... [Read More]
by RSS Ryan Witt  |  Apr 10, 2015  |  Filed in: Industry Trends & News
Are we losing the fight against malware and the hackers who are making every day a zero day? ***** MAY CONTAIN SPOILERS ***** Few authors are as skilled as GRRM when it comes to killing off important characters. Clearly, that oft-uttered phrase from the eastern continent, “valar morghulis”, is not just an empty bit of High Valyrian for the Game of Thrones author. For the two or three of you out there who haven’t heard of fierce tween, Arya Stark, utter the phrase valar morghulis, it literally translates to “All... [Read More]
by RSS Chris Dawson  |  Apr 10, 2015  |  Filed in: Industry Trends & News
We had to run with the analogy. Because, well, it's a wall. Made of ice. “I am the sword in the darkness. I am the watcher on the walls. I am the fire that burns against the cold, the light that brings the dawn, the horn that wakes the sleepers, the shield that guards the realms of men.” Sends chills, right? The Oath of the Night’s Watch (the version from the book, of course). It’s right up there with “One Ring to rule them all...and in the darkness bind them”. But you knew we couldn’t leave... [Read More]
by RSS Chris Dawson  |  Apr 03, 2015  |  Filed in: Industry Trends & News
Protection from advanced cyber threats requires a holistic approach to security - Including powerful sandboxing technologies. When we talk about sandboxes, we’re not talking about that big pile of dirt and germs you played in as a kid, although the name is certainly apt given the sorts of threats and infections that get bounced around in sandbox appliances. Sandboxes are either physical or virtual appliances that actually allow potentially malicious code to run in a safe environment where their behavior can be observed directly. Sandboxing... [Read More]
by RSS Chris Dawson  |  Mar 04, 2015  |  Filed in: Industry Trends & News
Just take a look at the latest news headlines and you’ll get a strong picture of just how pervasive and, in many ways, elusive the world of cyber security has become. Each week it seems there are reports of new, more insidious attacks. So the idea of “knowing your enemy” isn’t simply a catchy phrase for the team that I now have the privilege of working with. They are called the FortiGuard Labs and when I started at Fortinet just six weeks ago, I quickly realized they are this company’s best-kept secret. Let’s be clear, FortiGuard isn’t... [Read More]
by RSS Karin Shopen  |  Oct 30, 2014  |  Filed in: Industry Trends & News