Bringing endpoint and firewall together is an idea so simple it’s revolutionary

As the information security industry matures, we're beginning to come to terms with the reality that there is no such thing as perfect prevention. Conventional wisdom in information assurance tells us to assemble best-of-breed network and endpoint components into arrays ...

Integrating Retail Customer Experience Through WiFi Analytics

Every smartphone these days is equipped with ways to connect to WiFi. When your phone is looking for networks to join, it's detectable by local routers. In a retail store, there's ...

Fortinet Uncovers Most Prevalent Undetected Cyber Threats Traversing Enterprise Networks

SUNNYVALE, CALIF. - FEBRUARY 24, 2016 Read More...

Nemucod Adds Ransomware Routine

It came to our attention that a new, rather peculiar version of Nemucod has been recently landing on users. Nemucod is a well-known JavaScript malware family that arrives via spam email ...

Tech News Today 1471: Sweat of a Thousand Foreheads

Hosts: Megan Morrone, Jason Howell, and Roberto Baldwin Tonight we talk to Roberto Baldwin about self-driving cars, car sharing, and cars that tell your parents when you're speeding. We discuss the latest tech news, including the FDA-approved heart monitor Apple Watch ...

Sophos and Gartner explain: why synchronized security is the next leap forward

Attackers today are increasingly sophisticated, using multiple techniques and points of entry to bypass defenses and evade detection. In response, most vendors design their products to wrap endpoints and users in layers of security. For example, to defend against web-based ...

5 things you need to know about SSL

An uptick in cyberattacks and greater awareness about government surveillance have prompted calls for tighter security on the Internet, and a big part of that is encrypting the traffic that flows ...

Free Cyber Threat Assessment Analysis for the Healthcare Industry

Fortinet's Cyber Threat Assessment Program (CTAP) is here to help. CTAP will validate your network's current security accuracy, analyze application traffic, assess user productivity, and monitor network performance View: Free Cyber ...

How to stay protected against ransomware

If there's one thing we know about cybercrooks, it's that they are persistent. When they find a formula that works, they'll keep on using and improving upon that formula until it no longer gets the job done. Ransomware that hijacks ...

Sophos UTM Elevated 9.4 is now available!

After a successful beta, we're pleased to announce the initial availability of UTM Elevated 9.4. UTM 9.4 elevates protection against targeted and evasive threats with the addition of Sophos Sandstorm, supports the latest RED 15w and AP 15C hardware, and ...