Forbes CISO Research: Managing Risks with Limited Resources

Business security demands that chief information security officers (CISOs) make difficult decisions in order to protect their organization’s sensitive and proprietary data as well as their brand reputation. Today’s CISOs are tasked with the challenge of allocating limited funds and resources to the highest-return cybersecurity projects which can range from Continue Reading

Threat Report: The Necessity of Cyber Hygiene

This is a summary of an article written for Canadian Security by Fortinet’s Global Security Strategist, Derek Manky. The entire article can be accessed here. Fortinet regularly releases global Threat Landscape Reports, which take stock of billions of live threat events, collected from millions of devices and analyzed by our FortiGuard Continue Reading

Leveraging AI to Win the Cybercrime Arms Race

This is a summary of an article written for SC Magazine by Fortinet’s Global Security Strategist, Derek Manky. The entire article can be accessed here. Cybercriminals and cybersecurity professionals are caught in a perpetual game of one-upmanship when it comes to developing and deploying tools to either defend digital resources Continue Reading

Attack Patterns Uncover Defensive Strategies

This is a summary of an article written for ThreatPost by Fortinet’s Global Security Strategist, Derek Manky. The entire article can be accessed here. In Fortinet’s Q1 2019 Threat Landscape Report, threat analysts at FortiGuard Labs chose to dig into data from the company’s web filtering service. Here is what they Continue Reading

Keep your Mail Server Running Smoothly with Today’s MDaemon Maintenance Update

To ensure MDaemon and its plugins provide the most up-to-date security and best performance, we often provide maintenance updates to help our customers get the most out of their business email and collaboration server. Today, we’ve released MDaemon 19.0.2. With this update, we’ve squashed a few minor bugs and updated Continue Reading

Tapping Veterans’ Unique Skillset to Fill the Cybersecurity Talent Pool

Finding trained security professionals is one of the hardest tasks an organization faces today. Colleges and universities are doing what they can to educate the next crop of cybersecurity professionals, but though graduates may have book knowledge, few have real-world experience and know-how within an enterprise security environment. Part of Continue Reading

Bolstering Endpoint Security

For many organizations, endpoint security remains the weak link in their security strategy. While organizations are able to ensure that endpoint clients are installed on company-owned assets, security becomes more challenging when workers use their personal devices for work-related activities. The organizational risks introduced several years ago by BYOD have been compounded Continue Reading

WordPress 5.1.1 Security and Maintenance Release

WordPress 5.1.1 is now available! This security and maintenance release introduces 10 fixes and enhancements, including changes designed to help hosts prepare users for the minimum PHP version bump coming in 5.2. This release also includes a pair of security fixes that handle how comments are filtered and then stored in Continue Reading

Prepare Now for 5G Security Transformation

5G Security Implications Digital transformation efforts underway at many organizations are just the start. Supporting 5G’s new services and business opportunities will require organizations to significantly reshape many of the traditional relationships between networks, local and mobile computing resources, and end users. These changes will have a tremendous impact on Continue Reading

>