The Patch Tuesday cycle has begun once again and the team at Fortinet has announced some of the conditions surrounding several of the Windows and Office related patches that have been released by Microsoft. Please review your environments and patch your systems accordingly.
Though a bit sales’y, this is a nice overview of 5 core cyber threats all security professionals should be pondering. Enjoy!
Though unabashedly sales centric, this blog post by Fortinet provides a good overview of the intentions and goals associated with CIPA (Children’s Internet Protection Act). It is well worth a read as both a parent and a potential technology provider in the K-12 space.
Is anyone honestly surprised by this revelation? Let us not forget the photographs provided back during the Prism discussions of NSA employees opening Cisco hardware boxes, altering firmware and repackaging devices. Regardless one which side of the Snowden debate you find yourself, I think we can all agree that vulnerabilities and backdoors create weaknesses in products and services, despite the best or worst intentions of the people who placed them there.
Marketing value aside, this is good, sound advice from the team at Fortinet. Please take a moment to review the recommendations in this article and consider the value of segmentation and monitoring for your B2B connections.
For everyone in the Healthcare space, this is a good conversation with Don Kopanoff of Fortinet on cyber threats associated with Healthcare.
This is a very thorough and sound post by the team over at Fortinet on ransomware, the do’s and don’t’s, and some best practices. It is well worth a read.
The CTAP program at Fortinet is a great initiative designed to help organizations better understand the threats in their environments and the value a UTM can bring to overall network security. I love that Fortinet has consolidated this data in the form of this landscape report. It is quite eye opening.
This linked article from Fortinet details their response to the reported vulnerability in FortiOS concerning SSH and admin passwords. Please pay cloase attention to the FortiOS versions involved and make note that SSH must be enabled on an active interface via a firewall rule for this vulnerability to be leveraged.
This is a detailed explanation by the team at Fortinet of a new variant of CryptoWall. Please take note. This article also includes the hash variables necessary for IPS and other content filters.