Results for attack surface

Business and Technology

Proactively Reduce Risk Across Your Attack Surface

To avoid incidents, IT teams need consolidated visibility and automation to be able to monitor and assess the current state of their security.

By David Lorti February 22, 2024

CISO Collective

Best Practices for Security Hardening

Dive into identifying the risks and vulnerabilities that make security hardening necessary. Also, obtain some guidelines on how organizations can start hardening their systems today.

By Joe Robertson February 24, 2023

FortiGuard Labs Threat Research

Threat Predictions for 2023: New Attack Surfaces and Threats Emerge as Cybercrime Expands

As cybercrime converges with advanced persistent threat methods, cybercriminals are finding ways to weaponize new technologies at scale to enable more disruption and destruction. Read our 2023 threat predictions to learn more.

By FortiGuard Labs November 07, 2022

Industry Trends | FortiGuard Labs Threat Research

Key Findings from the 2H 2021 FortiGuard Labs Threat Report

Findings in the semiannual FortiGuard Labs threat report indicate that cyber criminals are developing attacks faster than ever. Discover the tactics that are being used.

By Derek Manky February 23, 2022

FortiGuard Labs Threat Research

Anatomy of Scalable Vector Graphics (SVG) Attack Surface on the Web

Learn about the common attack surfaces for SVG images observed by the FortiGuard Labs team as they assess web applications with embedded SVG images.

By Thanh Nguyen Nguyen November 07, 2019

Partners | Business and Technology

360 Protection: Provides The Most Comprehensive Protection With Advanced Support

This complete protection service helps organizations of all sizes manage complexity in their networks while delivering full protection across the entire attack surface.

By Satish Veerapuneni April 09, 2019

Industry Trends

How CISOs Can Maintain Corporate Privacy as Employees Adopt Emerging Technologies

The use of new technologies in corporate environments without forethought into their security implications has become a major pain point for CISOs. Learn the key risks these technologies present and how CISOs can minimize them.

By Derek Manky October 22, 2018

Industry Trends

Executive Insights: Surviving Your Digital Transformation

Digital Transformation Without an Equivalent Security Transformation is Leaving Organizations More Vulnerable 2018 is lining up to be the year of Digital Transformation. Just about every organization looking to remain viable in the growing digital marketplace has some sort of digital transformation in progress or one in the planning stages for this year. These projects range from implementing basic applications to better interact with online consumers, to converging OT and IT networks, or even pushing their entire infrastructure to the cloud.

By John Maddison February 19, 2018

Industry Trends

Cybersecurity for the Fourth Industrial Revolution

The World Economic Forum and other business analysts increasingly recognize that the world is currently undergoing its fourth industrial revolution. The first industrial revolution kicked off in the 18th and 19th centuries with the harnessing of steam and waterpower to replace human labor and mechanize transportation. In the second industrial revolution, assembly line and conveyor belt manufacturing methods enabled mass production, radically increasing the quantities and lowering the price of goods available in the marketplace. From the 1970s to the year 2000, the third industrial revolution’s proliferation of computers and automation technologies revolutionized almost every economic process—from manufacturing, to management, to mass media and entertainment.

By Alvin Rodrigues February 12, 2018

Industry Trends

Executive Insights: 2017 Threat Trends – Looking at Our Threat Reports

2017 was another landmark year for cybersecurity. In reviewing our quarterly Threat Landscape reports, it is clear that 2017 has been notable primarily for three things: the rapid digital transformation and expansion of the potential attack surface, the increasing sophistication of cyber attacks, and a lapse in basic cybersecurity hygiene, largely being driven by digital transformation coupled with the growing cybersecurity skills gap.

By John Maddison December 29, 2017