Fortinet's quarterly Global Threat Landscape Report reveals threats are increasing and evolving to become more sophisticated. Unique threat variants and families are on the rise, while botnet infections continue to infect organizations.
More and more Smart TVs are connected to the Internet than ever before, with an estimated 760 million of them now connected globally. As new threats increasingly target IoT devices, such as Smart TVs, that include always-on connectivity and high-performance GPUs that can be hijacked for malicious purposes, FortiGuard Labs took the opportunity to look at the current security status of these devices.
The biggest security challenge facing individuals and businesses today isn’t scale. It’s hyperconnectivity. The various devices and applications being used in homes or at organizations have now become so intertwined that it’s hard to keep them separate. The cloud allows users to access data and information from any device with a Wi-Fi connection or data plan, and IT consumerization encourages those same users to download new applications and storage solutions to use and share across a wide variety of devices.
Cloud adoption is on a steady upward march. It's not uncommon to hear that laggard organizations, even those that are highly regulated and historically slow to adopt new tech, are leveraging SaaS applications or a private cloud. But one thing that has surprised some pundits: As digital transformation pushes CIOs forward, your customers are not moving workflows to a single massive public cloud. They're hedging, spreading workloads across several cloud environments. RightScale's latest State of the Cloud Survey reports that 85 percent of enterprises currently use a multicloud strategy. As to the mix, IDC predicts that public cloud will account for almost 32 percent of all IT infrastructure spending in 2020, while private cloud will represent a little less than 20 percent.
As data becomes the new currency of the digital marketplace, one of the biggest security challenges organizations face is the number and kinds of endpoint devices that need access to the network. Smartphones, laptops, Chromebooks, tablets, and IoT devices of every function and size, and belonging to both employees and consumers, now regularly connect to some segment of the network to access data.
I am currently at Troopers, a well-known German hacking conference in Heidelberg. I had heard many positive reports on about this conference, especially their awesome hardware badge, and am glad I finally got to speak there. My talk was on hacking a smart toothbrush, and why it's important to secure any connected device, even those - like toothbrushes - that seem harmless. If you missed my talk, my slides will soon be online:, check the Fortiguard Research Centre. Now, let's focus on some of today's talks.
Cybersecurity protection is growing at an exponential rate to match the evolution of the digital business environment. Much of this development is being driven by security pioneers and innovators like Dr. Krutartha Patel (Ph.D), a Solutions Architect at Fortinet Australia, who works tirelessly to keep businesses like yours safe from the latest threats.
We love our technology. No one can imagine life without their smartphone today. But there’s so much more than this available on the market now. We have wearable technology such as a smart watches, tablets and laptops, voice activated devices such as Amazon Echo or Google Home, and even smart appliances like refigerators, lighting, air-conditioning, entertainment, and security systems. All of these are known collectively as the IoT (the Internet of Things).
Bluetooth is one of the most widely deployed and used connectivity protocols in the world. Everything from electronic devices to smartphones uses it, as do a growing number of IoT devices. Now, a new Bluetooth exploit, known as BlueBorne, exploits a Bluetooth, making literally billions of devices potentially vulnerable to attack. BlueBorne is a hybrid Trojan-Worm malware that spreads thru the Bluetooth protocol. Because it includes worm-like properties, any infected system is also a potential carrier, and will actively search for vulnerable hosts....