cyber security


Black Alps 2017 was an inaugural Cyber Security Conference held last November 13 at Y-Parc, Yverdon-les-Bains, Switzerland. With support from previous cyber security events, such as CyberSec Conference and Application Security Forum - Western Switzerland, there is no doubt that Black Alps 2017 is headed for success. The conference lasted for two days, and aimed to discuss the latest threats, mitigations, and advances in cyber security. [Read More]
by RSS Rommel Abraham D Joven  |  Nov 22, 2017  |  Filed in: Security Research
Apache Struts 1 ValidatorForm is a commonly used component in the JAVA EE Web Application that requires validated form fields input by a user, such as a login form, registration form, or other information form. By configuring the validation rules, Apache Struts can validate many different kinds of fields - username, email, credit card number, etc. However, a bug in Apache Struts 1 can be used to manipulate the property of ValidatorForm so as to modify the validation rules, or even worse, cause a denial of service or execute arbitrary code in the... [Read More]
by RSS Dehui Yin  |  Oct 25, 2017  |  Filed in: Security Research
The healthcare sector has undergone dramatic changes in the past several years, primarily spurred by the adoption of new medical technology. Beginning with the adoption of electronic health records (EHRs) and continuing on into the increased use of medical applications, online patient portals, connected devices, and wearables, the healthcare sector has been capitalizing on digital advancements to improve overall patient experiences and outcomes. This effort has been well received by patients and physicians alike, as it simplifies communication... [Read More]
by RSS Susan Biddle  |  Oct 13, 2017  |  Filed in: Industry Trends
The Fourth Industrial Revolution is upon us, with the digital transformation of business largely consisting of automation, AI, and rapid technological innovation. Industrial processes and machines are becoming smarter and more modular. A critical enabler of this transformation is the Internet of Things (IoT). Smart, always-connected devices provide real-time contextual information with low overhead to optimize processes and improve how companies and individuals interact, work, and live. Over a million new IoT devices are connected to the Internet... [Read More]
by RSS Phil Keeley  |  Oct 10, 2017  |  Filed in: Industry Trends
Cybercriminals have increasingly taken notice of schools and universities as profitable targets for cyberattacks. A key reason for this is the types of information schools keep on students, parents, and staff. Typically, upon infiltrating an institution’s network, cybercriminals will probe for, find, and exfiltrate valuable user data. This could be anything from health records, financial information, or any other personally identifiable information, such as social security numbers. Cybercriminals typically then take this data and sell it... [Read More]
by RSS Susan Biddle  |  Oct 06, 2017  |  Filed in: Industry Trends
If the news about ransomware in recent weeks hasn’t gotten your attention, then maybe the fact that its threat magnitude has grown 35X over the past year will jolt you into a state of awareness. Further, ransomware isn’t a threat confined to just a few industries or geographical regions; it is a global problem facing organizations—and even individuals—of all shapes and sizes. The Magnitude of the Threat Upwards of 4,000 ransomware attacks happen daily, infecting between 30,000 and 50,000 devices each month. The financial... [Read More]
by RSS Jeannette Jarvis  |  Oct 05, 2017  |  Filed in: Industry Trends
For anyone reading the news regularly, it’s not hard to grasp that cyber threats are getting more sophisticated and damaging by the day. From a security technology provider’s perspective, I can add that tackling them is a fast mounting challenge for the millions of businesses that come under attack daily.  Modern cybersecurity technologies – assuming you have already put in place the right professionals, policies, and processes − are a must. But organizations deploying them need to look beyond the boxes that sit on... [Read More]
by RSS Michael Xie  |  Oct 04, 2017  |  Filed in: Business and Technology
When the first firewalls were developed and deployed, their primary role was to act as sentinels monitoring traffic moving into, and sometimes out of the network. These devices would look at packets, network addresses, and ports to determine if data should be allowed through or blocked. A good analogy is airline travel. In the first few iterations of the firewall, data was simply checked to see if it had a ticket, and if its credentials were in order it were allowed to board the plane. Then application traffic took off, and first generation firewalls... [Read More]
by RSS Nirav Shah  |  Sep 28, 2017  |  Filed in: Business and Technology
We have seen from the previous two posts on cybersecurity and AI the importance of using advanced technology to stay ahead of cybercriminals. But far too often, a threat transcends the capacity of one particular box, especially when it has been deployed in a discrete place in the network and has been functionally isolated from the rest of the network and other security devices. This is where Fortinet’s innovations around collaboration are paramount. Regardless of the physical location of a doiscovered security event, FortiGuard Labs teams... [Read More]
by RSS Jack Chan  |  Sep 17, 2017  |  Filed in: Industry Trends
In our last post we talked about some of the AI tools (AEE, AutoCPRL, etc.) that Fortinet has developed, and how the specialist teams at FortiGuard Labs around the world collaborate to detect, mitigate, and prevent threats of all shapes and sizes. But all of that happens in the background. How do these innovations and techniques translate into actionable tactics and strategies that decision-makers and CISOs can employ toda, to protect their IP, data, and networks from an increasing number of bad actors and adversaries? The key to cyber security... [Read More]
by RSS Jack Chan  |  Sep 10, 2017  |  Filed in: Industry Trends