How to Cost-Effectively Dynamically Analyze UEFI Malware

A FortiGuard Labs How-To Guide for Cybersecurity Threat Researchers Introduction Unified Extensible Firmware Interface (UEFI) is a specification that defines an interface between platform firmware and an OS. In a nutshell, UEFI replaces the BIOS in previous systems. Since UEFI is required for Secure Boot (ever since the Windows 8 Continue Reading

Closing the Cybersecurity Skills Gap with Programs for Veterans

People have been talking about the cybersecurity skills gap for almost as long as they have been talking about the rise in data breaches. It’s easy to get “gap” fatigue and ignore the problem, but the facts warn against that approach. The 2018 (ISC)2 Cybersecurity Workforce Study reports that the Continue Reading

Using Services to Fill Critical Security Gaps

Adopting Security Services To address these challenges, along with the growing cybersecurity skills gap that is impacting organizations of every size, businesses need to consider adopting security services to supplement or even replace their existing security programs and solutions. This approach can tighten security, fill critical gaps, and address issues Continue Reading

A Layered Approach to Cybersecurity: People, Processes, and Technology

A Layered Approach to Cybersecurity Many think of a layered approach to cybersecurity in terms of technology and tools. This means having various security controls in place to protect separate entryways. For example, deploying a web application firewall, endpoint protections, and secure email gateways, rather than relying only on traditional perimeter Continue Reading

CIPA Compliance and Cybersecurity: You Can’t Have One Without the Other

Cybersecurity measures are being adopted and fine-tuned across industries to ensure sensitive data is protected against cybercriminals and evolving attack vectors. However, some industries, such as education, are held more accountable for data protection than others. The federal government requires schools to have certain protective features in place under the Continue Reading

White House Announces New Cybersecurity Executive Order

President Trump just signed a new cybersecurity Executive Order that has important implications, not only for federal agencies, but for Critical Infrastructures as well. In addition to noting that it is “the policy of the United States to manage cybersecurity risk as an executive branch enterprise”, the order states that, Continue Reading

Executive Insights: Achieving Digital Trust in a World of Data

Cybersecurity is at a critical tipping point.  With massive volumes of data being generated and analyzed across the globe every day from a variety of sources and devices, an entirely new approach to network security is required. From both a business and technology perspective, traditional security paradigms are struggling to Continue Reading

Staying Compliant in Financial Services and How Cybersecurity Solutions Can Help

Today’s cybersecurity threats target all parts of the network and nearly every device attached to it, making the potential threat landscape virtually boundless. When you pair technically skilled criminals with the attractiveness of financial data, trying to keep information safe is a constant battle. With this in mind, organizations like Continue Reading

Byline: Companies Are Taking the Cyber Skills Gap Into Their Own Hands

The growing cybersecurity skills shortage couldn’t have hit at a worse time. We are in the midst of a global transition to a digital economy. To compete, organizations are continuously correlating, analyzing, and making decisions based on massive amounts of information collected from highly distributed data sources, including IoT (Internet Continue Reading

Information Sharing in Cybersecurity Today Q&A with Derek Manky

Information sharing continues to be a topic that remains timely and vital in global cybersecurity. As an industry, it is well understood that turning the tide on cybercrime requires actionable information sharing across networks, borders, and vendors. Fortinet’s Derek Manky offers some perspective ahead of RSA 2017 in San Francisco. Continue Reading

>