Reading Time: 3 minutes When we think of hackers, data breaches, and malware, certain cyber security brands may come to mind to counter the fear and anxiety caused by these threats. Although it’s e ...
Reading Time: 3 minutes The risk of cyber security threats in US companies remains a big concern as incidents of data breaches, malware infections, and other forms of cybercrime continue to escalate. ...
Hear about key findings from our State of Operational Technology and Cybersecurity Report, learn more about the types of threats facing operational technology, and discover how OT teams can mitigate them.
On March 25, 2019, Apple released macOS Mojave 10.14.4 and iOS 12.2. These two updates fixed a number of security vulnerabilities, including CVE-2019-8507 in QuartzCore (aka CoreAnimation), which was reported to Apple on January 3, 2019 using our FortiGuard Labs responsible disclosure process. Find out more in this detailed analysis of the macOS vulnerability CVE-2019-8507.
A single, holistic security strategy comprised of interconnected solutions provides a comprehensive approach that is not only manageable and cost effective, but also fluid enough to adapt as networks undergo constant change.
Working as a cybersecurity warrior has its perks. We’re on the front lines of an increasingly critical and dynamic battlefield, pitting increasingly sophisticated threats against increasingly sophisticated defenses. We’re doing important work, and it can be very rewarding.
It’s been a year since Gartner released its report on remote browser isolation. At the time, the report was forward thinking—controversial even—as it suggested that enterprises can no longer assume that their traditional detect-and-respond security strategy is enough to stop all web-based malware attacks. Analyst Neil MacDonald argued that enterprises should stop trying to detect every attack and instead focus on “containing the ability of the attacker to cause damage and reduce the surface area for attack.”