The T2 2017 conference took place on October 26 and 27, 2017 at the Radisson Blu seaside hotel in Helsinki, Finland. As in every edition, a CTF (Capture The Flag) competition is organized prior the conference, with the winner receiving a free ticket. This year, a private bug bounty was held by LähiTapiola, a well-known insurance company in Finland, under the supervision of T2 organizers through the HackerOne platform. As there were zero submissions, it was decided to reward Harri Kuosmanen, who was the LähiTapiola HackDay CTF winner. The... [Read More]
by RSS Francois Ropert    |  Nov 06, 2017  |  Filed in: Security Research
Businesses today face an ever-evolving threatscape with growing pressure to rethink security strategies for long-term sustainability. As a result, corporate finance teams are more actively partnering with IT to ensure the organization’s security strategies protect critical financial data. Fortinet’s Araldo Menegon discusses the issues and trends affecting corporate finance teams today. Q&A with Araldo Menegon, Global Managing Director Financial Services at Fortinet Isn’t security managed by corporate IT? Why do finance... [Read More]
by RSS Darlene Gannon  |  Jun 22, 2016  |  Filed in: Industry Trends
Over the years, network security solutions and deployment has been built on the assumption that threats originate outside the enterprise network – trust was put in the internal network, while security was mostly deployed at the perimeter to provide protection from the outside threats and hackers. While security infrastructure has evolved to reflect the evolution of threats and technology, its deployment remained focus around the perimeter. However, breach analysis information shows that a significant number of threats have been entirely overlo [Read More]
by RSS Ronen Shpirer  |  Jun 06, 2016  |  Filed in: Industry Trends
Tags: infosec isfw
Locky, the professional grade ransomware has been causing headaches and damages to victim’s wallet for quite sometime. It uses the document-based macros for ransomware distribution, encrypts files on the victims’ computers with an additional‘.locky’ as extension which is what the ransomware is named after. Locky is professionally written, massively spread, costly if infected, most importantly it is evolving. It has been stable for the past year with no major version upgrade until recently. Our VEX system captured a new variant... [Read More]
by RSS Donna Wang  |  May 04, 2016  |  Filed in: Security Research
I’ve spent a lot of time over my career talking about education. K12, higher ed, virtual and blended learning, educational technology, you name it. I’ve even looked extensively at continuing education and professional development. As my focus has turned more to enterprise technologies and security over the last several years, I still couldn’t help but see many of the challenges we face in IT through an educational lens. After all, security pros and hackers aren’t born with deep security and networking expertise - why should... [Read More]
by RSS Chris Dawson  |  May 04, 2015  |  Filed in: Industry Trends
Just spend a few minutes walking the show floor at this year’s RSA and you’ll begin noticing the buzz words that get the crowds excited. Threat Intelligence, or at least the idea of meaningful understanding of known and unknown threats and what to do with them, certainly can be a big differentiator in the cyber security market. Digital Strategist Jonas Tichenor is joined by the CEO of Exodus, Logan Brown, to talk about how his company sets itself apart with experienced hackers working to make networks safer. [Read More]
by RSS Jonas Tichenor  |  Apr 23, 2015  |  Filed in: Industry Trends
There was a very clear and present sound on the convention floor this year at HIMSS in Chicago, Illinois, a buzz that resonated particularly with the team at Fortinet and it was the need for a multi-layered strategy around cybersecurity and the healthcare industry. Many who attended say they are just waiting for the next big headline news attack that shakes the very core of patient data and how doctors care for their patients in new and innovative ways. Fortinet’s presence at HIMSS also signaled to many, a shift in the industry towards the... [Read More]
by RSS Jonas Tichenor  |  Apr 16, 2015  |  Filed in: Industry Trends
Recently, I wrote about the three vectors of a healthcare cyber attack. This is the third of a three-part series examining each vector in depth with some new perspectives here at HIMSS. Recently, I’ve been writing about the three vectors of a healthcare cyber attack. Last week, I introduced the idea of the Internet of Medical Things when I talked about connected medical devices. These devices sit in hospitals and doctors’ offices, clinics and nursing homes. They range from IV pumps to CT scanners. They are, however, just the tip of... [Read More]
by RSS Ryan Witt  |  Apr 16, 2015  |  Filed in: Industry Trends
Game of Thrones was already the most pirated TV show of 2014. 2015 isn’t shaping up much better - but there’s a bigger security story here. Game of Thrones has its share of pirates, illicit traders, and thieves. They make their way across the Narrow Sea and elsewhere with temerity throughout the series. But the show, unlike the books, has a different sort of piracy problem. And a problem with leaks worse than a Braavosi cog. Season 4 of Game of Thrones was reportedly the most pirated television show of 2014 and one of the show’s... [Read More]
by RSS Chris Dawson  |  Apr 15, 2015  |  Filed in: Industry Trends
If the world of cybersecurity has learned anything this year its this. Hackers have a new and robust target base, the healthcare industry. Fortinet is making a big splash at this years HIMSS Conference in Chicago, Illinois with a refreshing approach to securing medical devices and patient data. Digital Strategist Jonas Tichenor caught up with Fortinet's Vice President of Healthcare Ryan Witt to talk about what's trending on the convention floor.   [Read More]
by RSS Jonas Tichenor  |  Apr 15, 2015  |  Filed in: Industry Trends