Follow Us
  • Follow us on Twitter
Sign In Sign Up
Sign In Sign Up
Welcome to the Conversation

Welcome to the Conversation

Join C-level IT security executives, industry analysts and solution providers and discuss tactics and best practice for taking on Enterprise IT Security Threats. 
Share
. | Comment

Are Your Point Solutions Creating Vulnerabilities in Your Network?

Are Your Point Solutions Creating Vulnerabilities in Your Network?

Organizations are continually adopting new technologies to innovate, become more efficient and increase profitability...
Read More
Share
. | Comment

How Do You Communicate Security Strategy to the C-Suite?

How Do You Communicate Security Strategy to the C-Suite?

As the spate of high-profile breaches continues to hit big names like Wendy's, Snapchat, the IRS and US Department of Justice, no one is immune. The C-suite is taking notice but that doesn't mean executive management is willing write a blank check. To get funding for security initiatives, IT must be able to communicate the true risk to the organization in business terms the C-suite understands - and that's not easy.
Read More
Share
. | Comment

Is Complexity the Enemy of Security?
Is Complexity the Enemy of Security? How have you simplified your #cybersecurity solutions? #IoTsecurity

Is Complexity the Enemy of Security?

Security in large organizations today is akin to the fable about the blind men and the elephant. When your security tool touches just one area of the business - be it mobile, cloud, Internet of Things (IoT), endpoints or the data center - none have visibility across the whole attack surface. And that leaves the entire enterprise vulnerable to attack.
Read More
Share
. | Comment
Comment ID :
233111
Date:
2016/07/11 11:46:05
Comment:
#fortinet The challenge today is IoT creates another risk for my organization.
Full Name:
CMX Moderator
Member Is Author:
Profile Picture:
https://pbs.twimg.com/profile_images/876096679/opus_normal.jpg
Profile URL:
@theopus

Fortinet Announces Acquisition of AccelOps

Fortinet Announces Acquisition of AccelOps

Sixty-percent of all security breaches result in stolen data starting within minutes of the breach and go undetected due to ineffective threat monitoring and security event correlation. In addition, the lack of a holistic view across organizations' entire distributed, multi-vendor networks and the growing quantity and complexity of threat information create big-data security challenges. With the acquisition of AccelOps, Fortinet extends its Security Fabric to address these challenges by combining security and compliance monitoring with advanced analytics for multi-vendor security solutions, enabling automated and actionable security intelligence from IoT to the cloud.
Share
. | Comment

Bayrob - An Ancient Evil Awakens, Are You Prepared for This?

Bayrob - An Ancient Evil Awakens, Are You Prepared for This?

While ransomware has attracted much attention from security researchers lately, other malware hasn't stopped. They are quietly seizing their own place in the attack market. This article analyses one of them - "Bayrob". Our analysis is based on a new variant of Bayrob. We will discuss its background and describe some of its most interesting features, including the purpose of several different processes/services, code obfuscation, data encryption, and its C&C communication. BackgroundThe family of ...

Share
. | Comment

The Couple Soon Discovered that a Stranger had Hacked their Baby Monitor.

The Couple Soon Discovered that a Stranger had Hacked their Baby Monitor.

What is your plan to protect your entire network from baby monitors to, big data? Her blood ran cold. The couple soon discovered that a stranger had hacked their baby monitor. Late at night, he would take over commands--and even the night-vision lens--to whisper disturbing messages to their toddler. Since CBS 2 in New York reported this story in 2015.... 

Share
. | Comment

Even a HUGE Wall May Not Be Enough

Even a HUGE Wall May Not Be Enough

Q: Why are conventional firewalls no longer enough? A: They never were to begin with. We caught up with Don Kopanoff at HIMSS 2016 to talk about the current state of security - and for him, it's all about the rising complexity of threat...

Share
. | Comment

Is Perimeter-Only Focused Security Obsolete?

Is Perimeter-Only Focused Security Obsolete?

Few enterprises can confidently say where their corporate network ends and where their customers, business partners and service providers begin, making perimeter-only focused security obsolete.

Read More
Share
. | Comment

Do You Know Who is Controlling Your Thermostat? #IoT Security

Do You Know Who is Controlling Your Thermostat? #IoT Security

Fortinet unveiled a new Security Fabric designed to arm global enterprises with pervasive and adaptive cybersecurity from the IoT to cloud networks.  To learn more, visit our website, read our blog posts or download our white paper here.

Share
. | Comment

What tactics have you taken to build a secure foundation to protect your internal networks?

What tactics have you taken to build a secure foundation to protect your internal networks?

I don't think a day goes by without hearing about another company that was a victim of a data breach. These companies are not small either. Organizations like the Office of Personnel Management (OPM), The Internal Revenue Service
Share
. | Comment

How Do You Help Your Employees Protect their Digital Identity?

How Do You Help Your Employees Protect their Digital Identity?

The IoT security battle is lost if you're uncertain that the person or thing on the other end of an online transaction is actually who or what it claims to be. Most IoT attacks occur when malicious actors are able to replace an authentic sensor with a compromised device, or when unauthorized remote access is gained and transmits a false signal to a device. To prevent these kinds of attacks, digital identity must establish effective online trust for all connected ...

Share
. | Comment

Who Has Access to Your Lights? Your Automated Plant Feeders? And Your Data?

Who Has Access to Your Lights? Your Automated Plant Feeders? And Your Data?

Market analysts estimate that by 2020 each person will own 26 IP-enabled devices, and over 50 billion IoT devices will come online. Each of these will need to transmit and receive data, run applications, perform transactions, and access services. At...

Share
. | Comment

Secure Access Architecture

Secure Access Architecture

Organizations are changing the way they deploy access networks, connect devices, and enable business applications to address a number of challenges.
Share
. | Comment

What are your top security concerns for 2016?

What are your top security concerns for 2016?

Gartner predicts that there will be more than 20 billion IoT devices by 2020. 2015 was the first year that IoT device attacks rose into the top 10 threat list of leading security firms. The sophistication and entrance points are not to be underestimated!
Read More
Share
. | Comment

Is the Network Border Dead?
Is the network border dead?

Is the Network Border Dead?

With the advent of the cloud, influx of mobile devices and growth of big data, the perimeter as we knew it is all but dead. The new reality is that we are now charged with defending a borderless network. That is by no means to say that we should stop protecting our network at the edge but do so with the understanding that advanced persistent threats (APT) will find their way inside our networks.
Read More
Share
. | Comment
Comment ID :
222698
Date:
2016/04/05 08:37:38
Comment:
Hey John. Great article, but I have to disagree about the border being dead. The edge of my network is very much alive. It’s still around to do the grunt work - terminate VPNs, provide web content filtering and perform WAN acceleration. Enterprise networks still have a concept of “inside” and “outside”. And this border, however porous, deserves the best network security technology available. But like any aging idea, the concept of an “enterprise border” changed by necessity to mean something different. What’s challenging for networkers like me (who “cut our teeth” building classic tiered architectures) is to re-think our designs with the “inside” not including our precious users. Modern users (millennials who expect to work while sipping their skinny vanilla lattes) are pushing IT to adopt a data-centric model of security, where the meaningful work of security surrounds the data. So data, housed either in data centers or clouds, become our “inside”, while trusted users and hackers are treated the same. One of the most important totally-not-dead borders in modern networks is the email gateway. This performs the critical function of protecting our most vulnerable business tool in what has become the favorite vector of the cyber criminal. With 70% of a company’s IP contained in email, this is where network security innovation becomes most important.
Full Name:
Kevin Miller Chief Information Security Officer, Herman Miller, Inc.
Member Is Author:
Profile Picture:
http://3d6f7586f681dc45c9fd-b0a5a20d840133505ddc723e8b5d989c.r44.cf1.rackcdn.com/image_1_.png
Profile URL:
1195421
Comment ID :
223177
Date:
2016/04/06 22:06:40
Comment:
Great points, Kevin. I agree that the challenge is real to keep access open and at the same time, secure. Email does remain the top starting point of malware. As you are aware, having a complete security ecosystem is pivotal to thwart mail threats before they enter the network and continue along the "kill chain" with URL filtering, segmentation, host protection and malware scanning.
Full Name:
John Jacobs
Member Is Author:
Profile Picture:
https://pbs.twimg.com/profile_images/630523066708131840/cVnh8avS_normal.jpg
Profile URL:
@johnthe11th

How Does Your Organization Solve the Cybersecurity Skills Shortage?

How Does Your Organization Solve the Cybersecurity Skills Shortage?

It's evident that demand for trained and experienced cybersecurity professionals far exceeds supply. With 46% of organizations now claiming that they have a problematic shortage of cybersecurity skills, significantly up from last year at just 2...
Share
. | Comment
Comment ID :
223148
Date:
2016/04/06 13:42:05
Comment:
#fortinet A great way to solve the skills problem for #cybersecurity, check out. http://www.fortinet.com/press_releases/2016/worldwide-network-security-academy.html
Full Name:
CMX Moderator
Member Is Author:
Profile Picture:
https://pbs.twimg.com/profile_images/876096679/opus_normal.jpg
Profile URL:
@theopus

Executive Perspectives :: Bob Vescio, Verizon and Emily Mossburg, Deloitte - C-Suite TV

Executive Perspectives :: Bob Vescio, Verizon and Emily Mossburg, Deloitte - C-Suite TV

Every business is worried about cyber security and how such breaches hinder their daily business operations. Verizon and Deloitte have formed a holistic partnership in order to help keep their customers' data safe. Verizon's Bob Vescio states that more organizations are using 'gut-checking intuition' as a strategy but that alone is not working. ...

Share
. | Comment
Comment ID :
223193
Date:
2016/04/07 10:53:37
Comment:
#fortinet This is a great conversation about #CyberSecurity brought to you by @jeffreyhayzlett. Specifically relevant with latest news.
Full Name:
CMX Moderator
Member Is Author:
Profile Picture:
https://pbs.twimg.com/profile_images/876096679/opus_normal.jpg
Profile URL:
@theopus

How Does Data Inform Your Security Plan?

How Does Data Inform Your Security Plan?

CryptoWall, TeslaCrypt and Locky: A Statistical Perspective

Share
. | Comment
Comment ID :
219686
Date:
2016/03/09 21:59:17
Comment:
#fortinet For more threat statistics, FortiGuard Labs monitors and publishes data on the latest threats and analysis of trends. The data is made public at http://www.fortiguard.com/
Full Name:
CMX Moderator
Member Is Author:
Profile Picture:
https://pbs.twimg.com/profile_images/876096679/opus_normal.jpg
Profile URL:
@theopus

Rosen Hotels & Resorts discloses data breach
Rosen Hotels & Resorts discloses data breach. Where should they go for improved monitoring?

Rosen Hotels & Resorts discloses data breach

Orlando-based Rosen Hotels and Resorts Inc. (RH&R) disclosed a data breach last week that impacted an unknown number of guest credit cards. The upscale hospitality provider says that the cards were compromised by malware on the payment network. How do you respond to ransomeware threats?
Share
. | Comment
Comment ID :
220862
Date:
2016/03/18 09:51:42
Comment:
#fortinet for continued information about threats, we found the Fortinet threat assessment report very helpful http://blog.fortinet.com/post/cyber-threat-assessment-threat-landscape-report
Full Name:
CMX Moderator
Member Is Author:
Profile Picture:
https://pbs.twimg.com/profile_images/876096679/opus_normal.jpg
Profile URL:
@theopus

What are Your Top Security Challenges in 2016?

What are Your Top Security Challenges in 2016?

25 CISOs identify the biggest security challenges as they enter 2016. Who do you agree with?

Share
. | Comment
Comment ID :
219542
Date:
2016/03/09 10:37:28
Comment:
#fortinet the Daily Mail published an article regarding foreign crime gangs stealing millions through hacking. This is a top challenge facing CISO's http://blog.fortinet.com/post/business-email-scam-how-much-does-a-million-dollar-cost
Full Name:
CMX Moderator
Member Is Author:
Profile Picture:
https://pbs.twimg.com/profile_images/876096679/opus_normal.jpg
Profile URL:
@theopus

What Cybersecurity Questions do Boards Ask CISOs?

What Cybersecurity Questions do Boards Ask CISOs?

Boardrooms are filled with executives who don't understand cybersecurity and have questions about its value to business. CISOs need to be prepared for them.
Share
. | Comment

Microsoft Azure Security Center & Fortinet:  Scaling Security & Securing the Cloud

Microsoft Azure Security Center & Fortinet: Scaling Security & Securing the Cloud

What do you get when you combine the world's leading NGFW with the largest scalable infrastructure and add-in unmatched granular visibility, control, threat prevention and DevOps?
Share
. | Comment
Comment ID :
218516
Date:
2016/03/04 13:35:21
Comment:
#fortinet continues to increase the lead in cloud security. Already a FTNT customer and want to start the migration to Azure? One word: seamless.
Full Name:
John Jacobs
Member Is Author:
Profile Picture:
https://pbs.twimg.com/profile_images/630523066708131840/cVnh8avS_normal.jpg
Profile URL:
@johnthe11th

What are Your Top Inner Network Security Challenges?

What are Your Top Inner Network Security Challenges?

Internal Segmentation Firewalls - Securing the Inner Network
Share
. | Comment
Comment ID :
220939
Date:
2016/03/18 11:47:43
Comment:
#fortinet staying on top of this is so important for an organization
Full Name:
CMX Moderator
Member Is Author:
Profile Picture:
https://pbs.twimg.com/profile_images/876096679/opus_normal.jpg
Profile URL:
@theopus

IoT Poses Security Challenge to Enterprise Networks   | SecurityWeek.Com

IoT Poses Security Challenge to Enterprise Networks | SecurityWeek.Com

A new report takes a look at how deeply IoT devices have permeated enterprise networks and what it means for security. What strategies can you execute to avoid the risk of remote exploitation?
Share
. | Comment

Financial Breaches Show 'Trust Model' Is Broken

Financial Breaches Show 'Trust Model' Is Broken

It's a full-blown crisis when a dozen major financial services firms admit to having their networks probed by the same attackers as those behind the JPMorgan Chase breach.
Share
. | Comment

Showcase
  • Download the Fortinet's Security Fabric whitepaper

  • Is Your Refrigerator Running? You Better Catch it! and Other loT Strategies

  • New Rules: The Evolving Threat Landscape in 2016

  • Cowen upgrades Fortinet on better-than-expected win rates; shares gain

  • White Paper: Fortinet Secures Next Generation Healthcare Enterprise

  • End-to-End Security for Next Generation Distributed Healthcare

  • A New Approach to Securing the Enterprise Network

  • Downtown Social Hub Upgrades Access Network to Meet Surge in Patrons

Events
  • The Internet of "Very Bad" Things

  • 'Wi-Fi + Enterprise IoT: Perfect Match or Security Nightmare?'

Fortinet

Powered by ContentMX.

Follow Us
image
© 2025, Fortinet
Sorry. We were unable to process this update. Please try again.
This email address is already in use by another person.
Please confirm your password by entering two matching passwords.
Please enter a password containing at least 6 characters.
Unable to complete this request. Please try again.

Profile

Twitter Connection

Connect Now

Profile Picture URL

Change Profile Image
Loading...


Time Zone


Create a Password





Login

No account yet? Sign Up
Login with Twitter
Invalid email address or password.
Please confirm your password by entering two matching passwords.
Please enter a password containing at least 6 characters.
Unable to complete this request. Please try again.
I forgot my password
We were unable to locate this email address. Please try again.
Unable to complete this request. Please try again.

Forgot your password?

No problem. Simply enter your email below and we will send you a new one.

We are unable to locate this email address. Please try again or sign up now.
Login now

Great!

An email with your new password has been sent. Please login and then create a new password.

Login now

Sign Up

Already a member? Login
Sign Up with Twitter
This email address is already in use by another person.
Unable to complete this request. Please try again.
Please enter a password containing at least 6 characters.

People Who Liked
Loading...


Now Sharing...