Skip to content

Latest news

Catch up on all the latest

Fortinet and Oracle Cloud Infrastructure Partnership Offers Customers Reliable Cloud Security and Performance

Fortinet and Oracle Cloud Infrastructure Partnership Offers Customers Reliable Cloud Security and Performance

The new Oracle Cloud Infrastructure (OCI) Flexible Network Load Balancer is ideal for increasing the security and reliability of workloads and applications running in OCI. Fortinet’s FortiGate Next Generation Firewall…
Countering Ransomware: A Shared Responsibility

Countering Ransomware: A Shared Responsibility

Industry Perspectives  The recent series of high-profile ransomware attacks underscores how vulnerable critical infrastructure is and the impact cybersecurity can have on American society. This is not a new development, according to…
Fortinet Selected as 2020 Google Cloud Technology Partner of the Year for Security

Fortinet Selected as 2020 Google Cloud Technology Partner of the Year for Security

The consequences of these challenges are not for the faint-of-heart. In a recent study conducted by ESG of 383 IT and cybersecurity professionals, only 12% of organizations reported not experiencing an attack…
Beating Cybercriminals at Their Own Game with AI Technology

Beating Cybercriminals at Their Own Game with AI Technology

Artificial intelligence (AI) technology is a powerful technology, and because of this, it holds great potential for exploitation by cybercriminals. Considering this, the only way that security leaders can stay ahead…
ATC Spotlight: A Cybersecurity Training Conversation with Exclusive Networks France

ATC Spotlight: A Cybersecurity Training Conversation with Exclusive Networks France

Through Fortinet’s Training Advancement Agenda (TAA) and NSE Training Institute’s ATC Program, Fortinet is helping close the cybersecurity skills gap. Fortinet’s network of accredited training organizations in 83 countries and…
Defining Cybersecurity Challenges Associated with 5G Implementation

Defining Cybersecurity Challenges Associated with 5G Implementation

The fifth-generation, or 5G, mobile network has changed how people and devices connect, providing faster data speeds, low latency, greater reliability, increased network capacity, enhanced availability, and better user experiences. As…
Ensuring a Positive Digital Experience for Users with a Digital Experience Monitoring (DEM) Solution

Ensuring a Positive Digital Experience for Users with a Digital Experience Monitoring (DEM) Solution

CISO on CISO Perspectives As the digital landscape continues to rapidly evolve, superior user experience is more important than ever before. But with a growing number of network edges and increased reliance on disjointed tools for LAN, WAN, cloud and security…
Security in the Pharmaceutical Value Chain – An Enabler of Change

Security in the Pharmaceutical Value Chain – An Enabler of Change

Industry Perspectives Technological innovations have provided pharmaceutical companies with data sharing, real time information and an unprecedented level of supply chain visibility. However, the ever-changing nature of their supply chains can…
Gartner has Named Fortinet a Visionary in the 2021 Magic Quadrant for Security Information and Event Management

Gartner has Named Fortinet a Visionary in the 2021 Magic Quadrant for Security Information and Event Management

2021 Gartner Magic Quadrant for Security Information and Event Management  According to Gartner, “Security and risk management leaders increasingly want SIEM solutions with attack detection, investigation, response and compliance capabilities,…
Fortinet Acquires Application Security Innovator Sken.ai to Accelerate DevSecOps

Fortinet Acquires Application Security Innovator Sken.ai to Accelerate DevSecOps

Application Security in a DevSecOps World Over the years, application development has moved from a “waterfall mode” to an “agile mode”. The waterfall mode is a sequential approach where changes…
Examining the Role of Zero Trust Access in OT Security

Examining the Role of Zero Trust Access in OT Security

Industry Perspectives As operational technology (OT) networks become increasingly connected to the rest of an organization’s network infrastructure, they become a growing target for increasingly sophisticated cyber criminals. In fact, Fortinet’s 2020…
6 Important Best Practices for Preparing for Data Breaches and Security Incidents

6 Important Best Practices for Preparing for Data Breaches and Security Incidents

Security incidents and data breaches can have very disruptive and devastating effects on an organization. In fact, according to the Ponemon Institute’s annual Cost of a Data Breach Report, the average…
Security Must Accompany 5G Implementation, Not Follow It

Security Must Accompany 5G Implementation, Not Follow It

5G is accelerating opportunities for enterprises and mobile network operators (MNOs) alike to innovate and transform their IT infrastructure, applications, communications, and user experience. A multitude of industrial applications are…
Bridging the Homework Gap with Secure, Reliable Connectivity

Bridging the Homework Gap with Secure, Reliable Connectivity

High-speed internet and technology have played an increasingly large role in student success over the past few decades. These resources are necessary for students to complete homework, conduct research, communicate…
Enabling the Convergence of Networking and Security

Enabling the Convergence of Networking and Security

In today’s world, working from anywhere is the new normal. But while this work model has become necessary, it has also created new concerns regarding edge security. Due to an…
Safeguarding Valuable Productivity and Reducing Downtime with Fortinet Email Security

Safeguarding Valuable Productivity and Reducing Downtime with Fortinet Email Security

In IT, availability and the cost of downtime is top of mind. In fact, it’s a surefire bet that any downtime caused by an unplanned disruption or outage will get…
Security in the Brave New World of Connected Medicine

Security in the Brave New World of Connected Medicine

Industry Perspectives Connected Medicine is having a growing impact on all of our lives. It’s an exciting combination of data, technology and pharmaceutical expertise. It is significant for the pharmaceutical industry, because of…
Fortinet and TAA Compliance: Exceeding Best Practices

Fortinet and TAA Compliance: Exceeding Best Practices

Like many companies that sell to the United States Federal government, Fortinet adheres to the rules related to the Trade Agreements Act (TAA). The TAA was enacted in 1979 to foster fair…
Strategies and Use Cases for Private Cloud Security

Strategies and Use Cases for Private Cloud Security

When cloud migration originally started, some organizations often adopted public cloud services because the costs for operating, designing, and maintaining private cloud deployments seemed unsustainable. However, as cyber criminals increasingly…
Enabling Self-Healing SD-WAN from the WAN Edge to the Cloud Edge

Enabling Self-Healing SD-WAN from the WAN Edge to the Cloud Edge

The Internet is at times unpredictable and unreliable, and no matter how robust your WAN infrastructure is, brownout and blackout outages are sometimes unavoidable. Unreliable connectivity is especially a challenge for large…
Hybrid and Multi-Cloud in the Era of Work from Anywhere

Hybrid and Multi-Cloud in the Era of Work from Anywhere

CISO on CISO Perspectives In the last year, organizations have come to rely more on hybrid and multi-cloud environments to help support their evolving digital transformation requirements. According to a recent report…
Retail Cybersecurity in an Evolving Threat Landscape

Retail Cybersecurity in an Evolving Threat Landscape

Industry Perspectives As a result of the COVID-19 pandemic, global online retail sales increased in 2020. According to statistics, consumers spent $861.12 billion online with US retailers in 2020, a 44% year-over-year…
Highlighting the Value of an Integrated Security Platform

Highlighting the Value of an Integrated Security Platform

As organizations strive to modernize their networks, the latter will continue to expand and become increasingly complex. This will lead to a deeper fragmentation of traditional edges, like the data…
NSE Training Institute’s Security Academy and Veterans Programs Support Local Community

NSE Training Institute’s Security Academy and Veterans Programs Support Local Community

FortinetLife Perspectives Fortinet is committed to building an inclusive and diverse workplace that empowers individuals to reach their full potential. As a leader in cybersecurity training, Fortinet’s NSE Training Institute and Training Advancement…
Navigating the Threat Landscape As Social Engineering Lures Change

Navigating the Threat Landscape As Social Engineering Lures Change

FortiGuard Labs Perspectives The cyber threat landscape during the pandemic was one of the busiest eras for cybercriminals. The sudden shift to telework caught many off-guard and left their networks at…
FortiPenTest Exploit Engine – A New Security Arsenal for your Network Application Assessment

FortiPenTest Exploit Engine – A New Security Arsenal for your Network Application Assessment

FortiPenTest Exploit Engine      Penetration testing helps organizations identify weaknesses and security gaps so they can put mitigation in place before attackers can exploit them. Given that the average cost…
Cloud Security 2021: Latest Trends and Insights

Cloud Security 2021: Latest Trends and Insights

With cloud security continuing to be a hot topic in 2021, Fortinet and Cybersecurity Insiders decided to ask cybersecurity professionals around the world and across all industries for their latest insight.…
The Network is Transforming and So Should Visibility and Control

The Network is Transforming and So Should Visibility and Control

The network has changed more in the last few years than in the 40 years before it. Much of this transformation is due to fundamental shifts in the enterprise’s focus…
Examining Top IoT Security Threats and Attack Vectors

Examining Top IoT Security Threats and Attack Vectors

Internet of things (IoT) adoption is nothing new, as both organizations and individuals have embraced these devices for a long time. However, the built-in security of this technology isn’t necessarily always strong…
Security Is Key for the Success of 5G

Security Is Key for the Success of 5G

5G has been a particularly hot topic lately, sparking significant debates and being considered as polarizing to some extent. However, countries all over the world are rolling out their 5G…