Key Considerations for a Secure Cloud Migration

This is a summary of an article, “6 Considerations for Secure Cloud Migration,” written by Fortinet’s Lior Cohen that appeared on the DevOps website on April 11, 2019. According to a 2018 Cloud Computing Survey by IDG, 73% of organizations already have at least one application or some portion of their Continue Reading

New Attacks and Old Attacks Made New

This blog is a summary of an article written by Fortinet’s Derek Manky that appeared on the Dark Reading website on April 16, 2019, entitled “New Attacks (and Old Attacks Made New).” Although cybercriminals depend on innovation in order to stay ahead of security safeguards, they are still subject to Continue Reading

Intent-Based Segmentation: Beyond Zero Trust

This blog is a summary of the article, “Zero Trust is Not Enough: The Case for Intent-Based Segmentation,” written by Fortinet’s Jonathan Nguyen-Duy, and published on the Network Computing website on March 22, 2019. Networks designed with implicit trust, even if small, simplifies allowing data and applications to move around Continue Reading

Snap startup time improvements

Several months ago, we shared an article titled I have a need, a need for snap that detailed the application performance results of snaps compared to their classic repo counterparts. We tested GIMP and VLC on both Ubuntu and Fedora, with some rather interesting findings. The one aspect of the Continue Reading

AI-based Fuzzing Could Change Security

This blog is a summary of an article written by Fortinet’s Derek Manky that appeared as a byline article on the Threatpost website on December 7, 2018. Many developers, along with professional threat researchers, employ a technique known as fuzzing that is designed to discover vulnerabilities in hardware and software interfaces Continue Reading

Getting Ready for Swarm-as-a-Service

This blog is a summary of an article written by Fortinet’s Derek Manky that appeared on the ThreatPost website on January 31, 2019. The digital world has created unprecedented opportunities – both for good and for ill. Advances in swarm technology, for example, have powerful implications in the fields of Continue Reading

Will Emerging Threats Tip the Scales?

This is a summary of an article that first appeared in SecurityWeek on December 07, 2018. Digital devices and infrastructures continue to be woven deeper into every aspect of our lives, whether through connected homes, cars, and mobile devices, or by expanding their role in business, government, and even critical Continue Reading

For Cybercriminals, IoT Devices are Big Business, Part Two

In part one of this article, Anthony Giandomenico described how cybercrime has become not only a business, but a big business, designed to generate revenue with predesigned attacks focused on attack vectors that are easy to exploit: IoT devices. Opportunity is also the land of innovation Because cybercriminals are focusing more Continue Reading

Key Differences Between Petya and NotPetya

There have already been a lot of write-ups for the NotPetya malware. This article is just a supplement for what is already out there. Our focus is to highlight some key differences between a previous strain of the Petya ransomware and the malware that scared everyone a few weeks ago, Continue Reading

>