In our last blog, we discussed DDoS, detailing the chronology of the DDoS attack from an early attack used by hackers to gain notoriety and wreak havoc to a sophisticated cybercrime tool used for monetary gain. In this Part II, gathered from information provided by FortiGuard AV analyst Karine de Ponteves, we discuss the latest iteration of DDoS – specifically, how the attack is leveraged to disrupt government and corporate systems to make a political statement and mobilize users to action –…
DDoS: A Brief History
Distributed-denial-of-service (DDoS) attacks have been the tool of choice for cybercriminals since the dawn of the Internet. Why
05 – Power to Control Users
Artist: Terry Devine-King-Solar Storm.
2013 BlackHat Europe
BlackHat Europe was last week, and Fortiguard Labs members were there for the briefings. Again this year, the 2 days event took place in Amsterdam downtown
FortiOS Cookbook – Blocking HTTPS (5.0)
In this video, you’re going to learn how to block HTTPS traffic on your network with FortiGate Web Filtering. HTTPS allows secured access to various websites…
Deloitte Survey Finds Breaches Across Industries
A mid-February 2013 Deloitte Tech Trends poll of 1,749 business executives found more than one in four report their organizations were the victims of at least one cyber attack in the past year. Nine percent report multiple breaches, and 17 percent say they are not confident their organizations could detect an attack
Fortinet Interview at RSA: John Maddison & Richard Stiennon IT – Harvest 2013
Richard Steinonn from IT-Harvest interviews John Maddison, VP of Marketing from Fortinet on the Fortinet differentiators and advantages.
Network World Security Landscape Video Podcast (March)
In this month’s Network World Security Landscape video podcast, reporter Keith Shaw speaks with Fortinet’s Derek Manky on trends he saw at this year’s RSA tradeshow, a new Claco cross platform botnet that’s migrating from the smartphones to PCs, the recent Evernote hack and the recent trend of companies migrating to two factor authentication.
Fortinet Fast & Secure
Distributed Enterprise Unfiied Threat Management Campus Next Generation Firewall (NGFW) Bring Your Own Device (BYOD) World’s Fastest Firewall FortiGuard Thre…
Cloud Security Alliance (CSA) says Data Breach, Loss Top Cloud Threat List
A new survey of industry experts from the Cloud Security Alliance (CSA) finds data breach and data loss at the top of nine critical threats to cloud security. Cloud computing is more mainstream among businesses and government now than ever before. CSA’s “The Notorious Nine: Cloud Computing Top Threats in 2013” report details the development of the cloud service model and how it delivers business-supporting technology more efficiently.