How to effortlessly modernise your cloud

Ubuntu is available in Cloud Server Linux. Contact us to find out our latest offers! Companies across all industries have now adopted the cloud computing paradigm, with many leveraging OpenStack to manage private clouds. But what happens when first generation environments become obsolete, non-upgradeable and exposed to security vulnerabilities? The Continue Reading

Benefits of Using CASBs in Financial Services

The cloud and cloud-based applications have revolutionized business operations across industries. The proven business benefits of cloud adoption have made multi-cloud environments the preferred method for data storage and computing, with 81 percent of organizations indicating they have adopted a hybrid cloud solution.  How Financial Services Firms Can Benefit from Continue Reading

Gartner Peer Insights for Enterprise Firewalls: See What Government Leaders are Saying About Fortinet

Government entities provide critical services that ensure stability across the nation for organizations and the population, such as transportation systems, water, energy, and healthcare. In order to provide these services, respond to queries, and react to an ever-changing global landscape effectively and efficiently, government organizations must rely on IT systems Continue Reading

Rehashed RAT Used in APT Campaign Against Vietnamese Organizations

Recently, FortiGuard Labs came across several malicious documents that exploit the vulnerability CVE-2012-0158. To evade suspicion from the victim, these RTF files drop decoy documents containing politically themed texts about a variety of Vietnamese government-related information. It was believed in a recent report that the hacking campaign where these documents Continue Reading

CIPA Compliance and Cybersecurity: You Can’t Have One Without the Other

Cybersecurity measures are being adopted and fine-tuned across industries to ensure sensitive data is protected against cybercriminals and evolving attack vectors. However, some industries, such as education, are held more accountable for data protection than others. The federal government requires schools to have certain protective features in place under the Continue Reading

CIO Agenda – Increase Productivity – everywhere for everybody!

One of the key challenges in companies today is the need for seamless digital collaboration across devices, storage systems and geographical locations with internal and external users. The increasing mobile workforce needs enterprise-grade tools for secure collaboration that is compliant with current rules and regulations, but still as easy to Continue Reading

Why the Financial Sector Needs to Focus on Automating Threat Intelligence

Cybercriminals have challenged security professionals across industries to create updated and sophisticated security protocols to match the volume of equally sophisticated malware attack vectors being directed at them. This is especially true for cybersecurity at financial institutions. A recent study has found that the financial services sector is attacked 65 Continue Reading

A Technical Analysis of the Petya Ransomworm

Yesterday, a new ransomware wreaked havoc across the world. This new malware variant, which combines the functionality of ransomware with the behaviors of a worm, is being called Petya, Petrwrap, and even NotPetya, since researchers are still investigating as to whether its ability to modify the Master Boot Record of Continue Reading

New Ransomworm Follows WannaCry Exploits

We are currently tracking a new ransomware variant sweeping across the globe known as Petya. It is currently having an impact on a wide range of industries and organizations, including critical infrastructure such as energy, banking, and transportation systems. This is a new generation of ransomware designed to take timely Continue Reading

Announcing the DeveloperWeek NY 2017 Hackathon Challenge Winners!

June 26, 2017 by James Jackson   Every year, developers from across the country join Wowza in Brooklyn, New York for the 2017 DeveloperWeek Hackathon. The hackathon brings together people of varying experience and skill levels for a chance to socialize, learn, build something great—and win prizes of $250 in gift cards and $250 Continue Reading

An Inside Look at CVE-2017-0199 – HTA and Scriptlet File Handler Vulnerability

FortiGuard Labs recently came across a new strain of samples exploiting the CVE-2017-0199 vulnerability. This vulnerability was fixed by Microsoft and the patch was released in April 2017. Due to its simplicity, it can be easily exploited by attackers. It has also been found in-the-wild by other vendors. We have Continue Reading

Infographic: Protecting Today’s Financial Services Industry in a Digital Environment

Consumers around the world across a variety of industries are adopting digital technologies to improve their daily lives, and they expect organizations to support this behavior. In the financial services sector, they’re using technologies like digital banking and insurance apps for tasks that used to be completed offline. While the Continue Reading

Why Today’s Financial Organizations Should Deploy Internal Segmentation Firewalls

As is the case across most of today’s industries, the latest IT technological advances like the cloud, Internet of Things (IoT), and mobility have all blurred the lines between traditional network boundaries, making them harder to secure by the day. Security challenges are escalating in part because there are an Continue Reading

Replication Features in MySQL 8.0.1

MySQL 8.0.1 has just been released with a wonderful set of features across the board. Specifically in replication, there is plenty of new and exciting functionality as well as performance improvements.  In this post I am going to summarize the replication features of this development milestone release. The Group Replication Continue Reading

Panama expands Cloudflare network to 50 countries

A man, a plan, a canal, a data center. Over 5 million Internet properties are now faster across Panama, as Cloudflare turned up its newest data center in Panama City. This is our 102nd data center globally, and brings us to a special milestone as our network now spans 50 Continue Reading

Q&A: Defining a Holistic Strategy for Customers

Collaboration and partnership are hot topics in the industry today across the IT stack. Fortinet’s John Maddison offers some perspective following our Security Fabric and Fabric Ready announcements earlier this year. Can you talk about why “open” is such a critical element of our GTM selling strategy? An “open” strategy demonstrates the Continue Reading

Q&A: Threat Intelligence and the Threat Landscape

 Providing holistic, actionable security intelligence across the entire IT infrastructure is critical for the future of cybersecurity. Fortinet’s Matti Blecher offers his perspective here. Can you give us a glimpse into the threat landscape from a threat intelligence point of view? What are customers facing today? One of the biggest Continue Reading

A Security Fabric Needs to Be Local AND Global

Security today relies on total visibility across the distributed network, as well deep insight into threats gathered and correlated from across the globe. But visibility isn’t enough. It needs to be combined with an integrated security architecture, such as the Fortinet Security Fabric, that can actively convert that visibility into Continue Reading

Badges Badges Badges: Reporting CICO Job Status across the Web

Badges Badges Badges: Reporting CICO Job Status across the Web Friday , 24, June 2016 bstinson ci, cico, t_functional Testing your software project is important. Effectively communicating your test results to those that consume your project comes in a close second. Recently we enabled the Embeddable Build Status plugin in https://ci.centos.org which provides Continue Reading

The Myth of the ”Platform” Security Strategy

We all know about the challenges of having far too many security vendors deployed across our networks.  In Fortinet’s most recent research, surveying over 1,000 CSOs across ten countries about their top concerns, 59% of respondents stated that the greatest challenge to achieving automated and consistent security policies across their Continue Reading

>