rsa


Welcome back to our monthly review of some of the most interesting security research publications. This month, let's do a bit of crypto... Past editions: April 2017 March 2017 P. Carru, Attack TrustZone with Rowhammer Rowhammer is an attack on DRAM, which consists in repeatedly accessing given rows of the DRAM to cause random bit flips in adjacent rows. Until now, the attack hadn't been demonstrated on ARM's TrustZone: but that's what the author implemented. He demonstrated that, using... [Read More]
by RSS Axelle Apvrille  |  Jun 22, 2017  |  Filed in: Industry Trends
RSA 2017 is a wrap. The final sessions are being recorded, the coat check area is filled with luggage, and the smell of propane is filling the show floors as forklifts begin to deliver packing crates to this year’s crop of security vendors. As expected, the hottest security topics and offerings were related to IoT and the cloud. Threat intelligence and SOCs were also top of mind as companies try to get a handle on the deluge of data and devices flooding their networks. In spite of the veneer of innovation, however, for far too many vendors... [Read More]
by RSS Bill McGee  |  Feb 16, 2017  |  Filed in: Business and Technology
By now, everyone has heard the numbers. IoT is part of a networking revolution that is transforming the world. Experts predict that by 2020 there will be over 33 billion IoT devices deployed, or 4.3 Internet-connected devices for every man, woman, and child on the planet. Of course, IoT is more than just one thing. There are a variety of IoT devices and categories, each with their own implications. Consumer IoT includes the connected devices we are most familiar with, such as smart cars, phones, watches, laptops, connected appliances, and... [Read More]
by RSS John Maddison  |  Feb 15, 2017  |  Filed in: Industry Trends
Information sharing continues to be a topic that remains timely and vital in global cybersecurity. As an industry, it is well understood that turning the tide on cybercrime requires actionable information sharing across networks, borders, and vendors. Fortinet’s Derek Manky offers some perspective ahead of RSA 2017 in San Francisco. Why is information sharing so important today? Sharing information proactively across all verticals and public or private organizations is essential moving forward. Organizations continue to struggle against... [Read More]
by RSS John Welton  |  Feb 10, 2017  |  Filed in: Security Q & A
We are proud to be a Gold Sponsor at this year’s RSA event. We are located at Booth# 3627 in the North Hall. This year we will have an in-booth theater featuring Fortinet experts presenting on such topics as enterprise FW, cloud security, FortiGuard, Advanced Threat Protection, and our Security Operations Center solution. The theater will also feature presentations from a number of our Fabric-Ready Partners showcasing the unique interoperability, scope, and flexibility of the Fortinet Security Fabric. [Read More]
by RSS Bill McGee  |  Feb 08, 2017  |  Filed in: Business and Technology
The RSA Conference: Asia Pacific & Japan 2016 concluded last July 22nd in the majestic Marina Bay Sands hotel here in Singapore. Traditionally, my team helps in the Fortinet exhibit booth to assist with FortiGuard-related inquiries. However this time, I was lucky to have been granted a full conference pass so I got access to the presentations, free snacks, free lunch, and more importantly, free desserts. While I would love to talk more about the desserts, there were many great talks at RSA this year that were enlightening in terms of where... [Read More]
by RSS Roland Dela Paz  |  Aug 04, 2016  |  Filed in: Industry Trends
RSA conference was held last week in Singapore, and Fortinet was a Gold sponsor. This was our first year having an official booth and we ecstatic to have the opportunity to meet other security professionals over the short conference.  A security conference is always a good place to learn about new technologies, get updates on what’s happening in the industry and what other vendors are doing. RSAC is an event held annually to gather and share the latest knowledge and advancements in security. Here are some interesting topics... [Read More]
by RSS Rommel Abraham D. Joven  |  Aug 02, 2015  |  Filed in: Industry Trends
It’s difficult to overemphasize just how vulnerable many healthcare organizations are to cyber attacks. The healthcare industry as a whole simply hasn’t adopted the sorts of protections, best practices, and security awareness as other markets like finance or defense. One has to look no further than the biggest data breaches so far in 2015 - Healthcare is at the top of the list. Why is healthcare such a big target? The Workgroup for Electronic Data Interchange (WEDI) recently published a primer on healthcare cybersecurity and identified... [Read More]
by RSS Ryan Witt  |  Jun 22, 2015  |  Filed in: Industry Trends
When some people look at a map of Westeros they see a land of war, intrigue, and magic. We see a network security schematic. Seriously. Yes, Season 5 of Game of Thrones is almost here. And yes, we’re at least as excited as you are. Will Stannis Baratheon actually take the North? What new adventures will Arya find when she gets to Braavos? What will be the fallout from Tywin Lannister’s death? Can HBO add even more gratuitous sex and violence that wasn’t in the books? Probably not...the books aren’t exactly up for Caldecott... [Read More]
by RSS Chris Dawson  |  Apr 01, 2015  |  Filed in: Industry Trends
CryptoWall is another entry in the popular category of malware known as ransomware. This type of malware holds your data hostage by encrypting your files and then charging a ransom to decrypt the files. The malware displays a message informing the victim that their files have been encrypted and that they have a limited time to pay the ransom before the cost of recovery goes up. To maximize their anonymity, the malware authors use the TOR network and require the ransom to be paid in Bitcoins, a trend that we are seeing more and more often. Figure... [Read More]
by RSS Brian Cheng  |  Aug 05, 2014  |  Filed in: Security Research