automation | Page 2


We are currently tracking a new ransomware variant sweeping across the globe known as Petya. It is currently having an impact on a wide range of industries and organizations, including critical infrastructure such as energy, banking, and transportation systems. This is a new generation of ransomware designed to take advantage of timely exploits. This current version is targeting the same vulnerabilities that we exploited during the recent Wannacry attack this past May. This latest attack, known as Petya, is something we are referring to as... [Read More]
by RSS Aamir Lakhani  |  Jun 27, 2017  |  Filed in: Security Research
Tired of hearing about IoT? Me too. I am also tired of AI and the constant specter of intelligent robots and computers that are smarter than us, and that for some reason want to harm us. I prefer the movie Her because I believe that is more likely to represent the future of an AI. They wouldn’t want to compete with us and rule the world. Instead, it seems more likely that they would find us to be a curiosity. And they would probably eventually just lose interest in us and leave. We (and the Earth) would not be able to evolve as fast... [Read More]
by RSS James Cabe  |  Jun 13, 2017  |  Filed in: Industry Trends
For enterprises, the very real benefits of moving applications to the cloud also come with significant challenges. Whether their using the public cloud, a private cloud or, as is often the case, a hybrid of the two, it’s necessary to optimize application performance to get the full benefits of cloud technology and enable a better business model. Just as importantly, though, you must be able to secure your people and your information as they traverse your network, from on-premises to the cloud and back, and you must be able to secure... [Read More]
by RSS Matt Pley  |  Jun 12, 2017  |  Filed in: Industry Trends
The most important question related to the recent WannaCry attacks isn’t who the attackers were, or how big the attack was. The question is, “How did this happen in the first place?” The vulnerability exploited by this attack had been patched by Microsoft months before. That patch was part of a widely publicized update that was issued in response to the massive set of NSA cyberespionage tools leaked by the secretive group known as Shadow Brokers. Everyone knew about it. Yet, apparently, few did anything about it. Failure... [Read More]
by RSS James Cabe  |  May 31, 2017  |  Filed in: Industry Trends
​​​​​​​Security strategies need to undergo a radical evolution. Tomorrow’s security devices will need to see and interoperate with each other to recognize changes in the networked environment, anticipate new risks and automatically update and enforce policies. The devices must be able to monitor and share critical information and synchronize responses to detected threats. [Read More]
by RSS Derek Manky  |  May 22, 2017  |  Filed in: Industry Trends
Over the last few months I’ve written about a number of technologies impacting cybersecurity and how in a perhaps idealistic world these security systems can all interact with each other, share information about the devices in our networks, and take mitigating actions, as required. So where does that leave us for improving our overall approach to information security as it relates to rapidly evolving networked systems? [Read More]
by RSS Ken McAlpine  |  May 03, 2017  |  Filed in: Industry Trends
What follows is Part 2 of a two-part interview with Fortinet’s James Cabe on the journey to security automation. Recognizing that most organizations are not prepared to make the jump to automation today, the following presents a realistic timeline to get from an intelligent network to truly automated, intent-based security, and a discussion of what that intent-based security will look like. What is the timeline for getting to automation and intent-based security? When we talk about the evolution of security, we talk about what it should... [Read More]
by RSS John Welton  |  Apr 07, 2017  |  Filed in: Security Q & A
As the threat landscape continues to evolve and the cyberskills gap remains a challenge, automation and intent-based security are becoming timely discussions when thinking about the future of cybersecurity. Fortinet’s James Cabe shares some perspective from the trenches. What follows is Part 1 of a two-part overview of the path to automation, beginning with where we need to be and what it will take to get there. Part 2 will discuss a realistic timeline to get from an intelligent network to truly automated, intent-based security, as well as... [Read More]
by RSS John Welton  |  Apr 07, 2017  |  Filed in: Security Q & A
How do government agencies protect their networks and data from cyber attacks in the face of the growing cyber skills shortage? Integration and automation are the keys. [Read More]
by RSS Katrina Fox  |  Mar 05, 2017  |  Filed in: Industry Trends