Blogs

Blogs


Key Takeaways: Transitioning to a remote workforce has its challenges in terms of logistics to get people up and running from their home offices. Organizations also need to prioritize reducing this new attack surface by consistently protecting their users and data across all platforms. Most Fortinet customers already have many of the tools they need to implement a security architecture that can provide an efficient and secure transition to a remote workforce. If it isn’t already, your ...
0 comments
Whether you are upskilling, reskilling or educating yourself to help close the cybersecurity skills gap, it doesn’t matter. Fortinet has three no-cost courses available to anyone who is interested in educating themselves on potential threats and how to manage them. Free FortiGate Essentials Training Course In this new, stand-alone course, you will learn how to operate and administrate some fundamental FortiGate NGFW features. By the end of the course, you will acquire a solid understanding ...
0 comments
Today’s businesses are fully aware of the consequences of a successful cyber attack, and yet they continue to struggle to put together a cyber security strategy that can deal with them effectively. And when you ask these organizations what their biggest challenge is to responding to threats in a timely manner, the most common response is likely tied to an overburdened SecOps team that cannot fully investigate every threat alert or encounter. Industry’s First On-Premise Deep Learning AI model ...
0 comments
Executive Summary:   Challenge: Hiring skilled employees that can adequately protect the business from evolving threats Orchestrating point solutions together & having consistent security protections across different environments Too many alerts   Risk: Breaches caused from disgruntled ex-employees Exploitation from lack of visibility in patch management Security gaps from inconsistent security protections caused by the lack of communication between point products ...
0 comments
We'd like to inform you that Accelerate 2020 Barcelona has been cancelled due to the health and safety concerns associated with the coronavirus.  What to expect; actions to take: Registration fees paid by credit card will be fully refunded over the next 5 - 7 days. All registrations will be canceled. No further action will be required. Contact your airline to cancel your flights. If you booked your hotel reservation through the Accelerate Barcelona Housing Bureau (B.Networks), be assured ...
0 comments

Automagic Cloud Security

Thanks to the cloud, companies of any sizes are able to take advantage of nearly unlimited resources almost instantaneously. With the increase in cloud adoption, enterprises are also finding themselves needing to keep up with development. Automation has always been a key component in helping teams improve their operational processes. This is especially true when talking about the cloud. Not only do development team need to leverage automation, but security and networking needs to move with it. Serverless ...
0 comments

Visible Security

The cliché of "threats are evolving" is unavoidable. That is because it is true. With threats constantly changing and becoming increasingly complex, organizations need a strategic vendor that can help them get not only visibility but is operationally smart.   The vendor needs to have solutions that enable organizations to operate more efficiently while navigating complexity and big data. To improve on your security strategies, companies should implement solutions that can ingest data quickly ...
0 comments
The FortiSwitch 400 series welcomes a new addition in the FortiSwitch 424E-Fiber . This is the first fiber only switch by Fortinet offering 24 slots which you can populate with  a variety of long and short range fiber transceivers. Four 10GbE capable uplinks round out this new switch which is now available for order. In addition to our newest FortiSwitch 424E-Fiber, we have refreshed our 424 series switch with new hardware. The new FortiSwitch 424E, 424E-POE and 424E-FPOE are significant ...
0 comments
With reInvent coming up, there are some things that you should watch out for! Amazon's Web Services (AWS) reInvent 2019 is being held in Last Vegas, with professionals in all industries attending. With 60,000 people attending the biggest AWS conference of the year, you can expect some big announcements from Amazon in regard to their different services.   Join Fortinet this year to see demonstrations on protecting and monitoring your assets on the cloud, integration with AWS' solutions, and advance ...
0 comments

Don't you hate it when…

Don't you hate it when you have a really good, strong, fun password and then the associated program/business gets breached and you have to change it? Personally, I hate thinking of new passwords, and likely I am not alone. It can be hard to think of a password that meets strong password policies and is easy to remember. Often folks take the easy way out and implement something super easy to remember but less secure. In fact, here is a list of the 1000 most common passwords (be sure you don't use ...
0 comments
Cyber Monday draws millions of shoppers online for deals and savings, but this day also provides opportunities for an attacker to steal personal information.    The Cybersecurity and Infrastructure Security Agency (CISA) reminds users to remain vigilant when browsing or shopping online.   CISA encourages Cyber Monday shoppers to review the following online shopping safety tips :   Do business with reputable vendors. Before providing any information, make sure that you are interacting ...
0 comments
Watch theCUBE interview with FortiGuard Labs Derek Manky - 2020 Threat Landscape Predictions
0 comments

Multi-edge convergence

Multi-edge convergence is a term which describe enterprises moving to a complex architecture that requires converging multiple services into a single location. This means that the traditional approach of having the best of breed for networking, security, and other services can no longer compete in today hyper-competitive market. Rather than shying away from converging their infrastructure to work together, enterprises should embrace the idea of multi-edge convergence where multiple services are ...
0 comments
The best defense to protect your organization from cyber threats is to promptly apply security updates. But it is difficult to patch timely for a variety of reasons. Organizations generally have a mixed OS environment which may include legacy and leading edge applications and technologies, each platform needing to test an update before releasing to production. When you count in that some months there are over one hundred security updates released across various platforms, and it can easily be overwhelming. ...
0 comments
Each week FortiGuard Labs releases a Threat Brief to present some of the more notable hot topics and threats from the week's threat landscape.   This week we start off discussing our cyber threat landscape predictions from FortiGuard's Chief of Security Insights and Global Threat Intelligence, Derek Manky. Derek's predictions include:   Intelligent swarms of customizable bots grouped by specific attack-functions, designed to share and learn from each other in real-time, could attack ...
0 comments
With many of the enterprises moving to the cloud and many resources existing now in many different environments to keep product development agile and competitive, today's organizations need to be aware of securing one of their most important public-facing assets, web servers. Web servers are often a prime target for attackers simply because they are public facing and closest to the cloud edge. They often involve a large amount of transactions and data. Securing these servers involves being very ...
2 comments
FortiGuard Labs Weekly Threat Brief summarizes the latest hot threat activity and insights from across this week's cyber threat landscape.  Here is a recap of what we are covering in this week’s Threat Brief: This week Fortinet released our quarterly Threat Landscape Report . This report distills our intelligence and analysis garnered from billions of events per day into our own unique perspective of the threat landscape. Here are a few of the topics we discuss in this report: Older vulnerabilities ...
0 comments
In case you were unable to attend Microsoft Ignite last week, here is what happened at the event and how to use lessons learned from this event moving forward to help your company improve security and reduce risk within your environment.   Microsoft Ignite was held in Orlando, Florida this year with professionals ranging in all industries attending. As the biggest event for Microsoft this year with upwards of 30,000 attendees attending the event. Security vendors including Fortinet attended ...
0 comments
Fortinet is releasing version 8.5 of our FortiWLM software.  This version adds the capability to monitor the statistics and RF health of FortiGate managed wireless APs.   A FortiGate can now be added to FortiWLM in the ‘Add Controller’ configuration screen.  Switching between the FortiGate and FortiWLC context can be done via a drop down menu at the top of the screen.  When in FortiGate mode, the Monitor, Operate, and Administration tabs are accessible.  Configure and Reports are not available ...
0 comments
It is scary enough to think about all the bad things that wander outside our own houses. And our organizations have invested heavily to protect ourselves from these outsiders. Everyone—from the CEO, to the CFO, to the CIO and CISO, to the board of directors, wants to know what we are doing about them. But what lurks within our “houses” should be just—if not more so—disconcerting. Indeed, the sad reality is that a large percentage of exposed data, vulnerabilities, and compromised systems ...
0 comments
This week Fortinet released our Q3 Global Threat Landscape report. Every second of every day, FortiGuard Labs is collecting data gathered from millions of devices and sensors around the world. We distill that threat intelligence into our quarterly threat report where we can provide our unique narrative of the threat world. Spikes at the Network Edge - In this issue we explore recent unexpected spikes in attacks targeting edge services with remote code execution exploits. Cybercriminals are more ...
0 comments
Each week, FortiGuard Labs publishes a weekly Threat Brief discussing memorable threat activity during the week. Here is a recap of what we cover in this week's Threat Brief:    Attacks against the BlueKeep vulnerability have started. Fortunately, these attacks are not deemed wormable, at least yet, but they instead exploit the BlueKeep vulnerability to simply install cryptocurrency mining malware on infected systems.   Our FortiGuard Labs researchers have been assessing web applications ...
0 comments
FortiGuard Labs published a weekly Threat Brief discussing memorable threat topics and activity discussed and analyzed during the week.  Here is a recap of some of that activity: Mobile threats continue to increase in volume and impact. In this week's threat brief we outline five critical elements needed to enhance your mobile cyber security awareness program. This is critical as 14% of all cyber threats overall are detected on Android devices. In fact, this week we saw some prominent mobile ...
0 comments
Today Fortinet announced the fastest, most powerful, desktop SD-WAN appliance to date: the FortiGate 60F featuring our SOC4 security processor. This extends Fortinet’s commitment to providing Security-Driven Networking solutions by including this technology in our popular FortiGate 60 family, which has sold over 1.5 million units to date. Encrypted traffic represents a multi-faceted problem for most networks: With many cloud applications using secure tunnels, any SD-WAN solution that does ...
0 comments
Each week, FortiGuard Labs publishes a Threat Brief that profiles notable hot topics and threats that were discovered or discussed during the week. Here is a recap of what we are covering in this week’s Threat Brief: Read about our FortiGuard Labs researchers analysis of several new spam samples caught in our proprietary spam monitoring system associated with a Remcos RAT campaign. Our researchers noticed an interesting tweet where they found a file that is part of a new BadPatch campaign ...
0 comments

Fortinet Blog