Results for fortiguard labs

Industry Trends

Security Services Bridge Gaps Caused by Fragmented Network Environments

If organizations want to get out ahead of the criminal community that wants to steal, hijack, or ransom that data, they will have to rethink their approach to security. Deploying effective security services help bridge the gap between traditionally isolated security devices.

By John MaddisonMay 29, 2018

Industry Trends

Cryptojacking: are your valuable bitcoins at risk?

Cryptocurrency is all the rage right now. You can’t go anywhere without seeing it online, mentioned in the news, or discussed in groups. With large sums of money exchanging hands daily and news outlets reporting that Bitcoin prices surged over 1,400% during 2017, it’s no surprise that people have been drawn toward the virtual currency space.

By Toan TrinhMarch 11, 2018

Industry Trends | Business and Technology

The Next Generation of Healthcare Cybersecurity

Digital transformation in healthcare has inspired a slew of new, advanced cyberattacks. As a result, healthcare providers must now transform how they approach network security. Learn about the expanding threat landscape and how Fortinet is ushering in this next generation of security.

By Troy RobertsMarch 07, 2018

Industry Trends | Threat Research

Mid-year 2017 Predictions Update

A look back and forward for our 2017 Cybersecurity Predictions. Threats are compounding at digital speeds, while resolutions, like manufacturers building security safeguards into their products, are proceeding at a snail’s pace. We need to start building security into tools and systems on day zero. We need alignment on ways to effectively see and combat new cybercrime. And we need to adopt integrated, collaborative, and automated procedures and technologies end to end to help us see and protect resources.

By Derek MankyAugust 08, 2017

Industry Trends

Evolving towards a Homogenous Society: The Risk of the New Digital Economy

The recent WannaCry attack was interesting for a couple of reasons. First, the speed and scale of the attack was impressive. Over the course of a couple of days, hundreds of thousands of systems were affected and disrupted. Second, it also unveiled a disturbing trend. The attack malware exploited a known vulnerability that not only had been revealed through the highly public release of stolen cyber tools, but Microsoft had also released a patch for the targeted vulnerability over two months before. Which means that the scale of the attack was...

By Derek MankyJune 14, 2017