Security

‘Distributed guessing’ attack lets hackers verify Visa card details

Armed with a card number, researchers tricked websites into helping them guess the expiry date and CVV.

Fortinet FortiGate Virtual Machine now available for Google Cloud Platform

FortiGate virtual appliance provides Google Cloud enterprise customers with secure workload and application mobility.

Solutions approach to rule India’s security market: Rajesh Maurya, Fortinet

Hiring specialized people as a security thinker is crucial for modern businesses, says Rajesh Maurya, regional vice president at Fortinet.

What is an intrusion detection system (IDS)? A valued capability with serious management challenges

An IDS monitors network traffic, searching for suspicious activity and known threats and sending up alerts when it finds such items. The function remains critical in the modern enterprise, but maybe not as a standalone solution.

Fortinet offers essential cyber-safety tips on Safer Internet Day

Starting as an initiative of the EU SafeBorders, over the years Safer Internet Day has grown beyond its traditional geographic zone and is now celebrated in about 130 countries worldwide.

General Data Protection Regulation (GDPR) requirements, deadlines and facts

GDPR is a regulation that requires businesses to protect the personal data and privacy of EU citizens for transactions that occur within EU member states. And non-compliance could cost companies dearly. Here’s what every company that does business in Europe needs to know about GDPR.

Security lessons from the 2018 Pyeongchang Winter Olympics

Shiny buttons that go "ping!" considered harmful.

Intel says it's been hit with 32 separate lawsuits over Spectre, Meltdown

Intel's annual report claims that both customers and shareholders have filed numerous suits claiming they've been harmed by what Intel has or hasn't done regarding Spectre and Meltdown.

US, UK, Aussie blame Russia for 2017 NotPetya attacks

After being held responsible for the attack on the Winter Olympics, Russia is under the spotlight yet again for another cyberattack.

7 threat modeling mistakes you’re probably making

The relative lack of maturity around threat modeling can cause big problems for organizations seeking to adopt the practice to bolster their network and services security.

Mastering email security with DMARC, SPF and DKIM

The three main email security protocols complement one another, so implementing them all provides the best protection. That’s easier said than done, but these tips can help.