Cyber threats


In my previous article, I raised a red flag about the diminishing practical returns of “mom and pop” threat research as a proxy for mitigating vulnerabilities and bad consequences. Threat assessment is often both difficult and incomplete, and sometimes best left to those who have timely access to the best possible data (and the even then, left to those with the military and intelligence means to act on it). In that piece, I also begged an obvious question. If chasing threats are not the best allocation of an organization’s... [Read More]
by RSS Phil Quade  |  Nov 09, 2017  |  Filed in: Industry Trends
Fortinet recently sat down with Derek Manky, Global Security Strategist at Fortinet, to learn about the biggest cybersecurity threats to healthcare in 2017. [Read More]
by RSS Derek Manky  |  Feb 06, 2017  |  Filed in: Industry Trends
This post originally appeared as a byline in Dark Reading. For cyber intelligence sharing to work, organizations need two things: to trust each other, and better processes to collect, exchange, and act on information quickly. As cyberthreats become more sophisticated and expand to the Cloud and the Internet of Things, the sharing of meaningful threat intel between trusted organizations has become more critical than ever before.  At Fortinet this year, our teams witnessed the benefits of info sharing first hand as part of a joint... [Read More]
by RSS Derek Manky  |  Nov 17, 2016  |  Filed in: Industry Trends
With cybercrime such a big concern these days, cooperation and information sharing between public and private organizations has never been more important. We recently talked with Derek Manky, Global Security Strategist at Fortinet, to get his thoughts on the difficulty, and importance, of trusted networks for sharing information in the world of cybersecurity.   NOTE: This week NIAS'16 will bring together over 1,000 cyber security professionals and decision-makers (including Fortinet) to discuss NATO's future requirements for... [Read More]
by RSS John Welton  |  Sep 06, 2016  |  Filed in: Business and Technology, Security Q & A