Investigate technologies that employ automation to analyze suspicious attachments, Web sites, and other avenues of attack. Fortinet delivers proactive malware identification and an unparalleled depth of analysis capabilities. This includes machine learning analysis capabilities backed up by a dedicated team of human analysts. Ask how FortiGuard Cyber Threat Intelligence services can be leveraged with the Fortinet Security Fabric to provide the strongest malware protection available in the industry. [Read More]
by RSS Keith Rayle  |  Apr 10, 2017  |  Filed in: Industry Trends
Look at any M&A due diligence checklist and you’ll see the same things: financials, customer information, sales, real estate, intellectual property, contracts—and the list goes on. One thing you may not see is information security, and that can be a crucial mistake. Like any other critical component of running a business, security needs to be right at the top of the list for M&A due diligence. When combining two companies, they often have different and sometimes even incompatible systems and data. That can create opportunities... [Read More]
by RSS Drew Del Matto  |  Dec 12, 2016  |  Filed in: Industry Trends
[Read More]
by RSS Michael Perna  |  Oct 04, 2014  |  Filed in: Industry Trends
Edward Snowden has revealed new information concerning the cryptographic capabilities of the NSA and GCHQ (TheGuardian, ProRepublica, leaking documents...). The CryptoGirl was bound to look into that topic ;) Let's go straight to the point and answer simple questions. Is cryptography unsecure? No, I don't think so. Basically, cryptography is maths (prime numbers, finite fields, polynomials...), and maths are solid science with proofs and demonstrations. Cryptographic algorithms are only seldom broken (e.g MD5). What's quite often "broken" are... [Read More]
by RSS Axelle Apvrille  |  Sep 06, 2013  |  Filed in: Security Research
Popular social media/sharing site Tumblr posted a quick note on their official blog indicating that their iOS app wasn't using SSL to pass login and password details when their users were logging in via the app. An astute reader of popular tech news site The Register initially reported the issue. What does this mean for you? If you've used Tumblr's app on your iPhone, iPad or iPod Touch anywhere other than at home - say a public WiFi hotspot at the airport or elsewhere - it's entirely possible that someone sniffing that network could have captured... [Read More]
by RSS Richard Henderson  |  Jul 17, 2013  |  Filed in: Industry Trends