Scott Berger has his pulse on the IT security industry, and he talked with us at HIMSS 2016 to share some insights on the value of Fortinet’s Next-Generation Firewall into a VMware NSX Environment, the rise of internal segmentation firewalls an...
Market analysts estimate that by 2020 each person will own 26 IP-enabled devices, and over 50 billion IoT devices will come online. Each of these will need to transmit and receive data, run applications, perform transactions, and access services. At...
It has been famously said that, “the wheels of justice turn slowly.” That’s partly because the process most governments use when creating regulations and laws encourages debate, the careful examination of all sides of an issue, and...
Codegate CTF is an annual global white hat hacking competition held annually in Seoul, South Korea since 2008. This year, I participated Codegate CTF Final competition as a member of CLGT-Meepwn, a CTF team consisting of vnsecurity.net's members...
Q&A with Brian Forster
The financial services sector is a high-value target for hackers, and therefore always under attack. While it’s critical to ensure effective security, financial services must also be able to conduct business in...
Fareit is a family of malware designed to steal confidential information. It has been around for several years, and typically steals system information and application credentials stored on infected systems.
Recently, our FortiGuard Lab captured a n...
Guest post by Brian Yeaman, Yeaman + Associates
2016 will be a lot like 2015 – a steadily escalating number of data breaches across healthcare requiring new solutions. We’re seeing now that many of the good things about medical-record po...
This is the first in a series of blogs written as a companion to my forthcoming book, RIoT Control – Understanding and Managing Risk and the Internet of Things
Overview – The Internet of Things
Analysts estimate that over 50 billion new...
Locky, the professional grade ransomware has been causing headaches and damages to victim’s wallet for quite sometime. It uses the document-based macros for ransomware distribution, encrypts files on the victims’ computers with an additio...
FortiMail Awarded VBSpam+ Certification. Again.
Email is still the primary form of critical, formal business communication. It also continues to be the primary conduit for malware, phishing attacks, and data loss.
Here’s why: no matter how mu...
Networks are evolving rapidly. The proliferation of devices, users, applications, and services has made the network edge more porous, while at the same time expanding the attack surface. And these remote devices and applications are now commonly acce...
Twenty billion new connected devices in the coming year. The Internet of Medical Things (IoMT) is growing massively.
And so are the threats.
Roger Bailey Healthcare Solutions Architect at Fortinet spoke with us at HIMSS 2016 about the emerging &ldq...
It’s been said that the definition of technology innovation is creating significant positive change. This month marks a milestone in Fortinet’s efforts to create an entire culture dedicated to this sort of entrepreneurial innovation, with...
Fortinet just announced the new tightly integrated Security Fabric, and the ninth generation of their content security processing ASIC, the CP9. The environment that spurs this sort of unprecedented innovation is focused on the following driving fact...