cloud | Page 4


Managed security is a hot topic, but it's not without its challenges. Much has been written about how cyber security risks are on the rise and becoming more complex, and how organizations are grappling with warding off attacks while staying in compliance with regulations. Enter managed security service providers (MSSPs), which are often billed as the panacea that helps enhance an organization's security operations. But there are a slew of both business and technical challenges MSSPs have to deal with as they determine the right tools... [Read More]
by RSS Esther Shein  |  Apr 23, 2015  |  Filed in: Industry Trends & News
Recently, I wrote about the three vectors of a healthcare cyber attack. This is the second of a three-part series examining each vector in depth. Over the past couple of months, I’ve written about the three vectors of a healthcare cyber attack. Most recently, I looked in depth at the first vector, what we usually think of as “traditional attacks and malware”. These sorts of attacks continue to make headlines, but as healthcare evolves and increasing numbers of medical devices begin feeding data directly into health information... [Read More]
by RSS Ryan Witt  |  Apr 10, 2015  |  Filed in: Industry Trends & News
The AWS Marketplace makes it easy to secure virtual environments - And now it’s easier to comply with German data governance laws. Amazon Web Services (AWS) has revolutionized the way that many businesses approach application and infrastructure deployment. Creating compute and storage instances in the cloud is so easy and cost-effective that many organizations look to services like AWS before they build out their own data centers. Others are using innovative hybrid models in which the cloud offers failover or nearly limitless scalability... [Read More]
by RSS Chris Dawson  |  Mar 24, 2015  |  Filed in: Industry Trends & News
Recently, we found a simple malicious downloader that downloads a fake PDF file.  Unlike a normal malicious loader that integrates the PE Loader code into its binary, this loader has stripped this part and has turned to fetching it online. Our FortiGuard Labs Threat Intelligence system can detect the traffic of this downloader, which we are detecting as W32/Upatre.FT!tr, efficiently aiding in the analysis of this malware. Registering Online Once executed, the loader grabs the local victim’s system information, generates them... [Read More]
by RSS He Xu  |  Feb 23, 2015  |  Filed in: Security Research
As increasing numbers of employees work from home, organizations often overlook the security needs of remote workers. Telework predates the BYOD phenomenon by decades. Despite Yahoo!’s move to the contrary, many organizations are shrinking their office spaces and expanding their employees’ ability to work from home. Employees value the flexibility and the lack of a commute, while employers value lower operating costs and workers who happily blur the line between home and professional life, working extended hours long after they might have left... [Read More]
by RSS Chris Dawson  |  Nov 05, 2014  |  Filed in: Industry Trends & News
Today we announced the availability of the first firewall to cross the 1 Terabit per second threshold. That's 1 trillion bits, or 1 with 12 zero's after it (1,000,000,000,000). But why is it needed now and why is it important? The way we do business has changed, and the threat landscape along with it. Mobile computing, public and private cloud services, social media, everything-as-a-Service, and Big Data. These trends mean the firewall cannot become a bottleneck, and the bar has to constantly be raised higher and higher. The new FortiGate-5144C... [Read More]
by RSS Tamir Hardof  |  Jul 23, 2014  |  Filed in: Industry Trends & News
These days, IT complexity is a way of life - and something that most have come to accept as normal. Let's face it, it's well established that the typical enterprise user utilizes a multitude of devices at any given time throughout the work day. These devices are continuously exchanging information from numerous locations while using application data across hybrid cloud infrastructures. As a result, organizations are in the process of perfecting a precarious balancing act that both provides seamless unified access while simultaneously dodging the... [Read More]
by RSS Stefanie Hoffman  |  Oct 31, 2013  |  Filed in: Industry Trends & News