threat intelligence | Page 3


In my last blog we discussed some high level defensive tactics we can take within each phase of the attack chain, once we understand the attacker’s attack methodologies, in order to build a more intelligent defensive posture.  (https://blog.fortinet.com/post/threat-intelligence-cyber-defense-part-2-of-3)Now in this final blog in this series, I will take a look at how we can go a bit deeper within each phase of the attack to get more granular with our cyber defense.  As we all know, we live in a cyber world where we can never guarantee 100% security.... [Read More]
by RSS Anthony Giandomenico  |  Jun 08, 2016  |  Filed in: Industry Trends
One of the biggest security challenges organizations face is being able to see enough of the network to identify today’s most advanced, multi-vector threats. Ideally, you need to be able to see across the distributed network, including cloud deployments and devices from multiple network and security vendors, correlate detected local activity with global threat intelligence and expected behaviors, and coordinate a response across the entire portfolio of installed security solutions. [Read More]
by RSS John Maddison  |  Jun 07, 2016  |  Filed in: Business and Technology
In my last blog post, we walked through, at a high level, who the various threat actors are, and looked at a blended attack chain to get an idea of how “bad guys” are stealing data or causing disruption.  (https://blog.fortinet.com/post/threat-intelligence-understanding-your-threat-actors-101-part-1-of-3) As a quick reminder, we also discussed the seven phases of the attack chain: reconnaissance, weaponization, delivery, exploit, command and control, internal reconnaissance, and maintaining. In this blog I’ll focus on how... [Read More]
by RSS Anthony Giandomenico  |  May 17, 2016  |  Filed in: Industry Trends
My last blog gave you a “big picture” overview of how understanding External Threat Intelligence, the Cyber Battlefield, and your own Strengths and Weaknesses can give you a measurement of how effective or ineffective your security posture is. I will continue to explore these security posture issues over the next few weeks. This blog is the first of 3 in which I will focus in more detail on External Threat Intelligence and individuals and groups who are motivated to do you and your organization harm. Threat Actor Categories There... [Read More]
by RSS Anthony Giandomenico  |  Apr 14, 2016  |  Filed in: Industry Trends
This year’s RSA Conference 2016 marks its 25th anniversary, where the world’s top security organizations and their customers meet to see, discuss, and learn about the latest and greatest in the world of network security.   In that spirit, I’m here on the show floor in front of our amazing (and giant!) FortiExpress chatting with some of our employees, customers, and partners about their thoughts on the RSA Conference today and going forward - as well as some of their favorite memories.   First off, I spoke... [Read More]
by RSS Richard Henderson  |  Mar 02, 2016  |  Filed in: Industry Trends
There is a greater mission on the part of every security vendor to make the world safer and more secure for people to interact, do business, and communicate ideas.    Today is a big day for us. Today the Cyber Threat Alliance, founded May 30, 2014, published its first collaborative research project -- an analysis of the CryptoWall version 3 campaign (learn more about this project here). The CryptoWall research report represents the successful culmination of a big project, a 90-day proof of concept effort among the founding members... [Read More]
by RSS Derek Manky  |  Oct 29, 2015  |  Filed in: Industry Trends
Not long ago, ransomware was a problem for consumers. Early versions hit unsuspecting users as early as 2005 but, while alarming, weren’t especially difficult to defeat. Even 10 years ago, the enterprise was a very different place than it is today, with BYOD in its infancy and far greater separation between work and personal environments. Ransomware authors also had not really begun to leverage the social engineering tactics that made infection much more likely, even for relatively savvy users.   Fast-forward to 2015 and attackers... [Read More]
by RSS Chris Dawson  |  Oct 29, 2015  |  Filed in: Industry Trends
An exciting announcement made at RSA 2015 was the strategic partnership between Fortinet and Exodus Intelligence (featured recently on the cover of Time magazine). This relationship is designed to facilitate information sharing between the two organizations, to further protect enterprises across the globe from looming cyber threats. The combination of Fortinet’s FortiGuard Labs' broad threat research coverage and the unique expertise Exodus provides on the latest emerging zero-day threats, brings a significant benefit in gaining premptive... [Read More]
by RSS Jonas Tichenor  |  May 06, 2015  |  Filed in: Industry Trends
There is so much marketing buzz around Threat Intelligence (TI) these days. The problem is, TI is a such a broad term and with the multitude of TI services offered in the market, many businesses are oftentimes confused as to what services to purchase and if they should even be looking at Threat Intelligence Services to begin with. Once the decision is made regarding the need for TI, how then do they go about choosing the right service for their organization? What constitutes a good threat feed? Is Threat Intelligence just for big business or can... [Read More]
by RSS Michael Perna  |  Apr 28, 2015  |  Filed in: Industry Trends
Just spend a few minutes walking the show floor at this year’s RSA and you’ll begin noticing the buzz words that get the crowds excited. Threat Intelligence, or at least the idea of meaningful understanding of known and unknown threats and what to do with them, certainly can be a big differentiator in the cyber security market. Digital Strategist Jonas Tichenor is joined by the CEO of Exodus, Logan Brown, to talk about how his company sets itself apart with experienced hackers working to make networks safer. [Read More]
by RSS Jonas Tichenor  |  Apr 23, 2015  |  Filed in: Industry Trends