network security | Page 2


The Operational Technology (OT) networks (such as industrial control and supervisory control and data acquisition systems [ICS/SCADA]) that run today’s modern society are a collection of devices designed to work together as an integrated and homogenous system. If one of these systems fails, it can have a catastrophic domino effect. For example, electricity requires telecommunications to transfer information on wheeling power from the electrical grid. [Read More]
by RSS Ronald Jules Hebert, Jr.  |  Dec 06, 2017  |  Filed in: Business and Technology, Industry Trends
In general, if a cybercriminal is able to successfully launch an attack at an owner-operated IT infrastructure, they can also launch one at a cloud service provider. In fact, public cloud services have become highly attractive targets for cybercriminals. For them, breaking into a cloud service is like merging onto a superhighway that can deliver their little bundles of evil far and wide, potentially impacting hundreds or thousands of organizations with a single strike. [Read More]
by RSS Jeannette Jarvis  |  Dec 04, 2017  |  Filed in: Industry Trends
Having secure, reliable access to the internet is no longer an option. It’s necessary. This is especially true for schools, as curriculum and resources are increasingly moving online and cyberattacks are becoming more frequent. In fact, data shows that 141 US school districts have reported one or more cyber incidents since 2016. To meet these needs, K-12 schools and districts across the United States are currently in the process of applying for E-rate for Funding Year 2018. The E-rate program from the Universal Service Administration... [Read More]
by RSS Susan Biddle  |  Dec 01, 2017  |  Filed in: Business and Technology, Industry Trends
Securing the entire distributed infrastructure using single set of integrated security protocols and complementary policies require a Security Fabric approach built around interconnected security tools. Such an integrated fabric is able to span the entire network, and then dynamically adapt as network infrastructures adjust to meet changing data and workload needs. And it needs to do all of this at the speed of digital business.  [Read More]
by RSS Ken Xie  |  Nov 30, 2017  |  Filed in: Business and Technology, Industry Trends
We have organized a Capture The Flag event this week. Codenamed Ph0wn, this CTF is really unique because it is dedicated to smart devices. This CTF is free and takes place this Wednesday, November 29, 2017, starting at 6pm at Campus SophiaTech, Sophia Antipolis, France - where our FortiSmart research team is located. Traditional CTFs include challenges on standard infrastructures: PCs, servers, webservers, etc. And from time to time, some CTFs feature hardware challenges. (We should probably cite Hardwear.io CTF , and RHME3 for automotive.)... [Read More]
by RSS Axelle Apvrille, Alain Forcioli  |  Nov 27, 2017  |  Filed in: Security Research
Across industries, your customers are embracing BYOD and BYOA for the many benefits they have been shown to bring in terms of cost reduction, increased employee productivity and efficiency, as well as increased employee retention. However, there are also inherent risks with allowing devices and applications not managed by your customers’ organizations to access their corporate networks and digital resources. [Read More]
by RSS Phil Keeley  |  Nov 21, 2017  |  Filed in: Industry Trends
On Wednesday, November, 1st, Fortinet held a critical panel discussion at The Summit, entitled “Winning the Security Battle for Your Enterprise Requires a New Approach.” [Read More]
by RSS Jennifer McDonald  |  Nov 20, 2017  |  Filed in: Business and Technology, Security Q & A
Fortinet spoke with Fabric-Ready Partner, Ribbon Communications to learn what’s top of mind for its customers, the key IT challenges they are facing and how Versa Networks’ approach to integrated security is helping drive business and customer success. The Fortinet Fabric-Ready Partner Spotlight is a series of blogs that highlights the great work and achievements of Fortinet’s Fabric-Ready technical partners. Tell us a bit about Ribbon’s business and the types of customers that you serve. Ribbon is a company... [Read More]
by RSS Mykola Konrad  |  Nov 09, 2017  |  Filed in: Business and Technology, Security Q & A
In my previous article, I raised a red flag about the diminishing practical returns of “mom and pop” threat research as a proxy for mitigating vulnerabilities and bad consequences. Threat assessment is often both difficult and incomplete, and sometimes best left to those who have timely access to the best possible data (and the even then, left to those with the military and intelligence means to act on it). In that piece, I also begged an obvious question. If chasing threats are not the best allocation of an organization’s... [Read More]
by RSS Phil Quade  |  Nov 09, 2017  |  Filed in: Industry Trends
Welcome back to our monthly review of some of the most interesting security research publications. [Read More]
by RSS Axelle Apvrille  |  Nov 09, 2017  |  Filed in: Security Research