January 5, 2022
5 Key principles for securing smart networks
In today’s world—where we increasingly rely on an aggregation of interconnected environments that blur the lines between our professional and personal lives—networks and security must work together as a single system at every layer.
December 28, 2021
Are you prepared for more OT threats?
Operational Technology (OT) systems have been used to manage everything from factories to transportation networks to utilities for years. Most citizens, however, do not consider these mechanisms until there is a problem.
December 16, 2021
Creating a trustworthy digital world
Fortinet is committed to expanding its FortiTrust security as a service portfolio, which offers simplified consumption and unified licensing models designed for the way companies do business in the Work-from-Anywhere Era.
December 14, 2021
Digital safety this holiday season
Set a strong password for every online account, making sure not to repeat the same password across any two platforms. Use a password management app to keep track of different accounts. Don’t forget to use random, non-duplicate User IDs as well if the site allows. Unique usernames with unique passwords are better than just unique passwords.
October 16, 2021
Take a deep dive into the “New Normal”
Many authors have surveyed the impact of COVID-19 on different aspects of the economy and culture, and speculations abound on what the "new normal" will look like for different segments of society and in various types of organizations.
October 12, 2021
The more you know: Get the skills to kill the cyber kill chain
There are many threats, and combatting each kind requires specific skills. If we look at the seven steps of the cyber kill chain—reconnaissance, weaponization, delivery, exploitation, installation, command and control, actions—we can shine the light on the processes and use that as a roadmap to see what kinds of skills we need to develop to thwart each step.
October 5, 2021
The War on Cybercrime and Ransomware: Are You Ready?
In most sophisticated ecosystems, multiple people and functions work together. It works the same way now in cybercrime. In the cybercrime supply chain, the suppliers create and produce things like malware and zero-code exploits, then they license, sell, and share their technology with distributors and affiliates, who then sell their solutions to clients who target those solutions at victims.