Results for attack surface

Threat Research

Anatomy of Scalable Vector Graphics (SVG) Attack Surface on the Web

Learn about the common attack surfaces for SVG images observed by the FortiGuard Labs team as they assess web applications with embedded SVG images.

By Thanh Nguyen NguyenNovember 07, 2019

Partners | Business and Technology

360 Protection: Provides The Most Comprehensive Protection With Advanced Support

This complete protection service helps organizations of all sizes manage complexity in their networks while delivering full protection across the entire attack surface.

By Satish VeerapuneniApril 09, 2019

Industry Trends

How CISOs Can Maintain Corporate Privacy as Employees Adopt Emerging Technologies

The use of new technologies in corporate environments without forethought into their security implications has become a major pain point for CISOs. Learn the key risks these technologies present and how CISOs can minimize them.

By Derek MankyOctober 22, 2018

Industry Trends

Executive Insights: Surviving Your Digital Transformation

Digital Transformation Without an Equivalent Security Transformation is Leaving Organizations More Vulnerable 2018 is lining up to be the year of Digital Transformation. Just about every organization looking to remain viable in the growing digital marketplace has some sort of digital transformation in progress or one in the planning stages for this year. These projects range from implementing basic applications to better interact with online consumers, to converging OT and IT networks, or even pushing their entire infrastructure to the cloud.

By John MaddisonFebruary 19, 2018

Industry Trends

Cybersecurity for the Fourth Industrial Revolution

The World Economic Forum and other business analysts increasingly recognize that the world is currently undergoing its fourth industrial revolution. The first industrial revolution kicked off in the 18th and 19th centuries with the harnessing of steam and waterpower to replace human labor and mechanize transportation. In the second industrial revolution, assembly line and conveyor belt manufacturing methods enabled mass production, radically increasing the quantities and lowering the price of goods available in the marketplace. From the 1970s to the year 2000, the third industrial revolution’s proliferation of computers and automation technologies revolutionized almost every economic process—from manufacturing, to management, to mass media and entertainment.

By Alvin RodriguesFebruary 12, 2018

Industry Trends

Executive Insights: 2017 Threat Trends – Looking at Our Threat Reports

2017 was another landmark year for cybersecurity. In reviewing our quarterly Threat Landscape reports, it is clear that 2017 has been notable primarily for three things: the rapid digital transformation and expansion of the potential attack surface, the increasing sophistication of cyber attacks, and a lapse in basic cybersecurity hygiene, largely being driven by digital transformation coupled with the growing cybersecurity skills gap.

By John MaddisonDecember 29, 2017