Fortinet’s CISO, Phil Quade, recently sat down for an interview with Dan Woods from Early Adopter Research to discuss top of mind trends for CISOs, including cloud security and portfolio pruning.
Fortinet announced, a new series of high-performance FortiGate NGFWs that enable organizations to implement intent-based segmentation deep into their security architecture.
In conjunction with the Cyber Threat Alliance, Symantec today released their blog post on an APT (advanced persistent threat) group codenamed "Thrip.” As part of our membership with the Cyber Threat Alliance (CTA), we have received these indicators ahead of publication to ensure that FortiGuard customers are protected from this latest disclosure.
The lack of control you have over your “edge” network makes your entire network vulnerable. This is why an integrated and cohesive approach to cybersecurity is critical to defend these new headless and BYOD device environments. And the reality is that if you really want security at the wireless access portion of your network, you need a topology that extends network security all the way to the endpoint device.
Frequent reports of large data breaches are alarming for everyone. Customers worry about the implications of having their financial and personal information hijacked. The organizations that were compromised worry about both the near-term and the long-term effects on their business. And other organizations worry if they will be next.
Q: Why are conventional firewalls no longer enough? A: They never were to begin with. We caught up with Don Kopanoff at HIMSS 2016 to talk about the current state of security – and for him, it’s all about the rising complexity of threats. Last year, for example, upwards of 90 percent of identified viruses were unknown to the firewalls they infiltrated – meaning that if a firewall’s definitions aren’t aggressively updated, each passing day presents a new vulnerability. The increasing reliance on distributed...
In my last blog post, we walked through, at a high level, who the various threat actors are, and looked at a blended attack chain to get an idea of how “bad guys” are stealing data or causing disruption. (https://blog.fortinet.com/post/threat-intelligence-understanding-your-threat-actors-101-part-1-of-3) As a quick reminder, we also discussed the seven phases of the attack chain: reconnaissance, weaponization, delivery, exploit, command and control, internal reconnaissance, and maintaining. In this blog I’ll focus on how...