Learn about the five main types of ransomware attacks along with some ransomware best practices to protect yourself or your business from an attack.
There are numerous parallels between the armed forces and cybersecurity. Find out how many of the lessons learned on the battlefield can easily be applied by security teams to protect an organization more effectively from cyberattacks.
As recent cyberattacks have demonstrated increased risk to both IT and OT environments, resilience readiness today has evolved. Read more.
The problem with the future-as baseball legend Yogi Berra, the founders of the Internet, and any CISO or CTO can assure you-is that, increasingly, it ain't what it used to be.
With industry-specific compliance requirements driving security spending and deployment, it’s natural to assume that best practices for securing access to sensitive data are different from vertical to vertical. However, that assumption may be changing.
FortiGuard Labs Threat Research
The 13th annual Hacks In Taiwan Conference (HITCON) took place August 25th and 26th at Academia Sinica, Taiwan’s national academy located in Taipei. Elite cyber security researchers from across the world gather at this annual conference to share their research and exchange ideas about the global threat landscape. Approximately 1000 people registered for the conference and, according to one of the HITCON crewmembers we met, one third of the attendees were undergraduates and fresh graduates. This is a good sign, given...