Latest Posts


As the number of connected devices on networks and subsequent threats increase at a rate that is practically immeasurable, many organizations are making the mistake of fighting fire with fire. They are meeting complexity with complexity -- a moment-to-moment tactical response that reduces their cybersecurity to an inefficient collection of vendors, protocols and operating systems. [Read More]
by RSS Michael Xie  |  Jan 18, 2018  |  Filed in: Industry Trends
In this blog post, we will get into the details of the implementation of Spectre, the exploit that targets the vulnerbilities found in CPUs built by AMD, ARM, and Intel. We assume you are familiar with the concept of the attack, and you can inspect the Proof of Concept source code provided in the Appendix of the paper linked above. You might also find it easier to read this blog post with the source code side by side. [Read More]
by RSS Axelle Apvrille  |  Jan 17, 2018  |  Filed in: Security Research
There is an incredible urgency for organizations, especially those undergoing digital transformation, to reprioritize security hygiene and identify emerging risks. However, as the volume, velocity, and automation of attacks continues to increase, it is also becoming increasingly important to align patching prioritization to what is happening in the wild so you can better focus your limited resources on the most critical and emerging risks. [Read More]
by RSS Anthony Giandomenico  |  Jan 17, 2018  |  Filed in: Industry Trends, Security Research
ShipServ, in a recent move to a more cloud-based IT infrastructure, adopted several Fortinet products to protect the company’s networks. I recently talked to Dominic Aslan, ShipServ’s vice president of IT operations, about the company’s move to the cloud and its use of Fortinet tools. [Read More]
by RSS John Maddison  |  Jan 16, 2018  |  Filed in: Business and Technology
Tags:
The challenge is that most all email security vendors say the same thing: “99.9% catch rate, no false positives, easy to manage” and so forth, which is why Fortinet is firmly committed to regular participation in independent testing. Consider, for example, the Advanced Threat Defense certification testing conducted by ICSA Labs. [Read More]
by RSS David Finger  |  Jan 16, 2018  |  Filed in: Business and Technology
A recent Cyber Threat Alliance blog by Michael Daniel discussed the evolution of ransomware and the IoT. Read this post to learn more. [Read More]
by RSS Jeannette Jarvis  |  Jan 15, 2018  |  Filed in: Industry Trends, Security Research
Fortinet is excited to be meeting with our partners at this year’s Accelerate conference, which promises to be the largest one yet. Around 2,000 thought leaders, IT and security experts, partners, and customers will convene in Las Vegas from February 26th – March 1st to attend keynotes and breakout sessions, network, and collaborate. [Read More]
by RSS Jon Bove  |  Jan 15, 2018  |  Filed in: Business and Technology
Welcome back to our monthly review of some of the most interesting security research publications. [Read More]
by RSS Axelle Aprville  |  Jan 14, 2018  |  Filed in: Security Research
Learn the critical cybersecurity challenges plaguing K-12 schools today and how to mitigate them with this five-point cybersecurity checklist. [Read More]
by RSS Sowjanya O'Neill  |  Jan 12, 2018  |  Filed in: Business and Technology
  Introduction 2018 truly is starting off with a bang: fundamental CPU flaws dubbed Meltdown and Spectre were found affecting pretty much all modern processors developed since the Pentium Pro (1995). These flaws root in two critical CPU features: Out of Order Execution and Speculative Execution, which are crucial for performance. Since this is an important feature and not a bug, it is inherently hard to fix. Furthermore, for performance reasons, speculative execution is almost always implemented in hardware, so “fixes”... [Read More]
by RSS Minh Tran  |  Jan 12, 2018  |  Filed in: Security Research