Fortinet Unveils World's First SD-WAN ASIC
Fortinet has announced world’s first SD-WAN ASIC designed to enable security-driven WAN Edge networking.
It’s a powerful solution to a growing problem that no other vendor has even attempted because it is simply too large of an undertaking for most vendors. But with over 15 years of security ASIC development experience, solving business-critical issues with custom designed silicon chips is in Fortinet’s DNA.Read more ...
Fortinet Expands its Security Fabric
The latest release of FortiOS delivers over 300 new innovations across the Security Fabric for protection from IoT to the edge, network core and to multi-clouds.
The FortiOS 6.2 release continues the evolution of the Security Fabric with new innovations that span Fortinet’s products and solutions portfolio, enabling organisations to achieve a security-driven network required for the edge and multi-cloud environments created by digital transformation.Watch the video
FortiGuard Labs Weekly Threat Intelligence Brief
FortiGuard Labs uses its industry leading global infrastructure of threat sensors, honeypots, and collectors to provide you with the largest source of data of any pure play network security vendor. Data is collected from all of these sources on a continual basis and analysed by Fortinet’s world-wide team of analysts to provide you with a weekly recap of the incidents and threats you care the most about.
Check out the archive of weekly Threat Intelligence Briefs, or sign up to receive these briefs every Friday.Read more
Our Role in Closing the Cybersecurity Skills Gap
As the cybersecurity skills gap continues to widen, it is creating what some now consider to be one of the top cybersecurity risks for many organizations. According to a recent workforce development, 59% of organisations have unfilled cybersecurity positions, with Frost & Sullivan forecasting a shortfall of 1.5 million by 2020.
This critical shortage in the cybersecurity workforce has resulted in security operations teams who are overworked and understaffed, which can often result in either neglecting to adhere to cybersecurity best practices, or careless errors in caring for network and security resources.Read the full article
New Attacks ... and Old Attacks Made New
Although cybercriminals depend on innovation in order to stay ahead of security safeguards, they are still subject to keeping costs under control while maximizing ROI. As a result, genuinely new attacks are not only rare, they are vastly outnumbered by reconfigured malware and the resurrection of old attacks in a new wrapper.
Fortinet’s last Global Threat Landscape Report again gave proof to this, showing that the use of existing malware or the misuse of FOSS (free/open source software) security tools to target organizations grew by 10% over the quarter. At the same time, unique exploits only increased by 5%.Read more
The State of Operational Technology & Cybersecurity
Operational technology (OT) refers to the hardware and software used to run industrial control systems (ICS), such as SCADA, that serve as the foundation of various areas of critical infrastructure. This includes industries that are essential to public safety and well-being, including power plants, manufacturing, water utilities, healthcare, transit, and more.
OT differs from traditional IT systems due to the processes and systems that must be incorporated to effectively manage production and resource development systems, including engines, valves, sensors, and even robotics, that are common to critical infrastructure environments but may be absent from traditional IT stacks.Read the article