cybersecurity


In light of today’s huge skills gap, security professionals have an obligation to mentor the next generation. Employees of cybersecurity vendors can help shrink the gap by volunteering their time in the classrooms, from elementary school through college. The knowledge and experience of front-line professionals is invaluable, whether to explain to first-graders what malware is or to steer college students toward the right classes to give them a strong foundation for a cybersecurity career. The problem is bigger than any one vendor or educational [Read More]
by RSS Anthony Giandomenico  |  Oct 16, 2017  |  Filed in: Industry Trends
The rhetoric surrounding mainframes and their uses in modern enterprises tends to be largely negative. Mainframes are seen by many as outdated legacy IT systems that are, or will be, obsolete in the near future as businesses increasingly move to the cloud. However, these notions are one-sided. The reality is that mainframe computing remains alive and well within many infrastructure-critical industries, including some of the largest organizations in the world. It’s reported that 71 percent of Fortune 500 companies still run much of their... [Read More]
by RSS Bill Hogan  |  Oct 13, 2017  |  Filed in: Industry Trends
This change is also causing OT and IT to fight over the control of digital ground. While OT is growing, it is primarily growing into the spaces usually controlled by IT as it is being bolted onto the same networks that phones, routers and laptops touch. This is creating a whole range of security challenges that neither group has ever had to deal with in the past and affects the delivery of applications and information that reaches all the way into the executive suite. [Read More]
by RSS James Cabe  |  Oct 12, 2017  |  Filed in: Industry Trends
Because they have traditionally had clear borders and full control of their respective areas, OT and IT people tend to be nearly as territorial as the raccoons. But as the line between IT and OT continues to blur, issues arise that sometimes render these teams unable to work together to implement a common solution, such as security measures, segmentation and monitoring. [Read More]
by RSS James Cabe  |  Oct 12, 2017  |  Filed in: Industry Trends
Surveying over 1,800 IT decision makers, Fortinet found almost half believe security is still not a top priority discussion for the board. At the same time, they also strongly contend that cybersecurity should become a top management priority, with 77% of respondents indicating that the board should put IT security under greater scrutiny. [Read More]
by RSS Patrice Perche  |  Oct 09, 2017  |  Filed in: Business and Technology, Industry Trends
Over the past ten years, technology has transformed healthcare substantially. From electronic health records that simplify the collection and sharing of patient information, to digital consultation and other services provided remotely, to wearable connected medical devices, healthcare is becoming more accessible, accurate, and patient-focused. National Health IT (NHIT) Week, which will take place from October 2nd- 6th, is a collaborative and partner-driven event that aims to increase awareness of the many ways new health IT initiatives stand... [Read More]
by RSS Susan Biddle  |  Oct 02, 2017  |  Filed in: Business and Technology
Government entities provide critical services that ensure stability across the nation for organizations and the population, such as transportation systems, water, energy, and healthcare. In order to provide these services, respond to queries, and react to an ever-changing global landscape effectively and efficiently, government organizations must rely on IT systems and computer networks. However, this technical infrastructure is also under constant attack from cybercriminals who range from amateur hackers and technical hacktivists to hostile... [Read More]
by RSS Trish Borrmann  |  Sep 22, 2017  |  Filed in: Business and Technology
While FortiGuard Labs was preparing for another presentation on our Locky research at the Black Alps cyber security conference this coming November in Switzerland, Fortinet’s Kadena Threat Intelligence System (KTIS)1 caught another Locky variant using a new extension – “ykcol” or “locky” spelled backwards. Locky has been stepping up its game over the past few months after going dark during the first half of 2017. Just like the old days, this new variant is distributed through massive volumes of malicious... [Read More]
by RSS Floser Bacurio, Joie Salvio, Rommel Joven and Jasper Manuel  |  Sep 21, 2017  |  Filed in: Security Research
Network security is a complex subject that requires those in charge to stay on the lookout for the latest industry news and events. Here, you, our channel partners, will find all of the information you need to answer your current and prospective customers’ questions moving into the fall. [Read More]
by RSS Amy Thompson  |  Sep 20, 2017  |  Filed in: Business and Technology
BlueBorne affects devices supporting Bluetooth. As such, the PoC they demoed does not spread over Bluetooth: it takes control of a given Bluetooth victim. Apparently, the researchers said they locally created a botnet. But that was clearly a local inside test, and we have no details regarding the botnet's payload. [Read More]
by RSS Axelle Apvrille  |  Sep 19, 2017  |  Filed in: Security Research