Google Chromebook Security: At The Forefront of Education Discussions

During a 2015 event at the Northwestern Institute for Policy Research, participating panelists discussed the digital revolution and the classroom’s exposure to it. At the time, school districts had begun to adopt 1:1 policies, where each student would have access to laptops or tablets. Google was at the forefront of Continue Reading

The Open Security Requirement in the Age of the Cloud

In a 2015 article posted by Forbes, it was reported that 87 percent of people hadn’t heard of the term “Internet of Things” (IoT). At that time, Gartner Inc. estimated that there were 4.9 billion connected devices in use. Fast forward to 2017, and Gartner now reports that number has Continue Reading

Updates to TSR announcement and disclosure information

With the first TSR release of 2015 we began providing CVSSv2 scores in our full disclosure of resolved security issues in cPanel & WHM. The CVSSv2 scoring system is a free and open standard that attempts to rate the severity of security vulnerabilities (finalized in June 2007). In June 2015 Continue Reading

FortiGuard Labs Telemetry: Round up of 2015 and 2016 IoT Threats (Part 2 Home Routers)

In our last post Round up of 2016 IoT Threats we compared 2015 and 2016 global threat telemetry for IoT devices collected by our FortiGuard Labs. In this post, we will examine why home routers had a such a huge increase in IPS signature hits in 2016, when compared to 2015. Continue Reading

Byline: 4 Key Areas to Consider When Solving the Cybersecurity Talent Gap

Findings from the “2015 PwC US State of Cybercrime Survey” revealed that only 26 percent of those surveyed feel they have the expertise to address the cyber risks associated with the implementation of new technologies. This means that 74 percent of organizations — essentially three-quarters — don’t have the cybersecurity Continue Reading

Fundamental Rules of Healthcare Security

The year 2015 saw an accelerated rate of change in healthcare security – and many of those changes were not encouraging. On one hand, the availability and usefulness of patient data has skyrocketed – good for healthcare providers but also lucrative for those seeking to use it for nefarious purposes. Continue Reading

CVE-2015-4400 : Backdoorbot, Network Configuration Leak on a Connected Doorbell

Summary In March 2015, a Network Configuration Leak vulnerability was disclosed to Ring as part of FortiGuard’s Responsible Disclosure process. The vulnerability existed on their first internet-connected doorbell, Doorbot v1.0 but other posts on the subject show that the vulnerability was ported on newer versions of the connected doorbell as Continue Reading

>