Blog Archive


Aug 18th, 2017 Gartner Peer Insights for Enterprise Firewalls: See What Healthcare Leaders Are Saying About Fortinet by Trish Borrmann
Aug 18th, 2017 The Role of E-Rate in Protecting the Digital K-12 Learning Environment by Susan Biddle
Aug 17th, 2017 Locky Launches a More Massive Spam Campaign with New “Lukitus” Variant by Joie Salvio, Rommel Joven and Floser Bacurio
Aug 17th, 2017 Analyzing Android malware using a FortiSandbox by Axelle Apvrille
Aug 17th, 2017 Automating Defenses Against Assembly-Line Attacks by Derek Manky
Aug 16th, 2017 Securing Critical Infrastructure Takes a Village…and Automation by Phil Quade
Aug 15th, 2017 FortiManager 5.6: Centralized Control for Today’s Networks by Justin Lei
Aug 15th, 2017 A Quick Look at a New KONNI RAT Variant by Jasper Manuel
Aug 14th, 2017 Locky Strikes Another Blow, Diablo6 Variant Starts Spreading Through Spam by Floser Bacurio, Joie Salvio, Rommel Joven
Aug 14th, 2017 The Problem With Performance Testing by Alex Samonte
Aug 14th, 2017 How the Healthcare Cloud is Revolutionizing Patient Care by Susan Biddle
Aug 11th, 2017 The Primary Factors Driving Cybersecurity Investments in Education by Susan Biddle
Aug 10th, 2017 Delivering Fortinet Security to AWS GovCloud Customers by Cynthia Hsieh
Aug 10th, 2017 How Your Own People Pose a Threat to Financial Services Cybersecurity by Bill Hogan
Aug 9th, 2017 Fireside Chat with Panasonic Avionics: Talking Security for In-flight Infotainment by John Maddison
Aug 8th, 2017 Adding Web Application Firewalls to your Security Strategy by Mark Byers
Aug 8th, 2017 Mid-year 2017 Predictions Update by Derek Manky
Aug 7th, 2017 Tornado warning: Commingling of public and IoT clouds? by James Cabe
Aug 7th, 2017 Rise of the Funnel Cloud: When Good Clouds Go Bad by James Cabe
Aug 5th, 2017 Analysis of New GlobeImposter Ransomware Variant by Xiaopeng Zhang
Aug 4th, 2017 How the World Wide Web Has Revolutionized Key Industries While Creating a Land of Opportunity for Adversaries by Anthony Giandomenico
Aug 4th, 2017 Partnering with an MSSP for a More Secure Digital Business by Matt Pley
Aug 3rd, 2017 How Financial Services Network Security Strategies Have Recently Evolved by Bill Hogan
Aug 2nd, 2017 Securing the Internet of Medical Things: What to Do Now by Susan Biddle
Aug 1st, 2017 FortiCloud Now Manages FortiGate UTM Appliances by Peter Newton
Jul 31st, 2017 Bringing Your Cloud Visibility Back Into Focus by Darlene Gannon
Jul 30th, 2017 NSE Experts Academy CTF by Axelle Apvrille
Jul 28th, 2017 How FortiSIEM Works to Keep Schools Safe by Susan Biddle
Jul 27th, 2017 For Cybercrime, Innovation is the Land of Opportunity by Anthony Giandomenico
Jul 27th, 2017 Thoughts from Black Hat on Threat Intelligence and Automation by Derek Manky
Jul 26th, 2017 Evolving Towards Intent-Based Security by Phil Quade
Jul 26th, 2017 NSS Labs NGFW Report: Fortinet Receives 4th Consecutive Recommended Rating by John Maddison
Jul 24th, 2017 The Need for Threat Intelligence by Neil Matz
Jul 21st, 2017 The Evolution of the Firewall by Phil Quade
Jul 20th, 2017 Byline: It’s Time to Get Serious About Web Application Security by John Maddison
Jul 19th, 2017 Why Top Healthcare Institutions are Moving Toward Integrated Security Solutions by Susan Biddle
Jul 18th, 2017 Black Hat Executive Interviews: Q&A with Phil Quade, Fortinet CISO by Darlene Gannon
Jul 17th, 2017 Byline: What’s Your Network’s Threat IQ? 3 Steps Toward Actionable, Real-Time Threat Intel by Derek Manky
Jul 14th, 2017 Visit Fortinet at Black Hat 2017 by Mike Morgan
Jul 14th, 2017 Securing the Digital World, Part II by Ken Xie
Jul 13th, 2017 Byline: Know Your Enemy: Understanding Threat Actors by Anthony Giandomenico
Jul 12th, 2017 Incomplete Patch: More Joomla! Core XSS Vulnerabilities Are Found by Zhouyuan Yang
Jul 12th, 2017 Information Governance for Healthcare Institutions by Darlene Gannon
Jul 12th, 2017 Securing the Digital World, Part I by Ken Xie
Jul 12th, 2017 Don’t Take It from Us – FortiGate Enterprise Network Firewall Customer Reviews by Trish Borrmann
Jul 11th, 2017 FortiGate Moves to the Leader’s Quadrant by John Maddison
Jul 11th, 2017 Outsmarting the Next Ransomware with Advanced Threat Protections by Amy Thompson
Jul 10th, 2017 Considering the Cloud? Five Questions to Ask by Aamir Lakhani
Jul 9th, 2017 Key Differences Between Petya and NotPetya by Raul Alvarez
Jul 9th, 2017 Petya's Master Boot Record Infection by Gabriel Hung and Margarette Joven