Cookbook - Basic Firewall Policies (5.4)

In this video, you will learn how to create and order multiple security policies in the policy table, to control and limit different types of network traffic. You will create three policies: a basic Internet access policy, which allows users ...

Fortinet Signs Agreement with NATO: Will Sharing and Actionable Threat Intelligence Help Curb Cybersecurity?

Today, within the framework of the NATO Industry Cyber Partnership (NICP), the NATO Communications and Information (NCI) Agency signed an industry partnership agreement with Fortinet. Derek Manky offers some perspective on ...

Patient Identification, Data Security as Important as Ever: Marc Probst

Marc Probst, the chairman of CHIME and Intermountain's CIO, makes a case for more cooperation among providers in the name of better data security. Read More...

3 steps to securing your mobile workforce

Today, every business is mobile. Across enterprises of all sizes, everyone from entrepreneurs and executives to knowledge workers needs to get online and access business data and files using smartphones, laptops and tablets. Employees using their personal devices to access ...

Privacy: Is it dead or just being renegotiated?

It would have been hard to find anybody at this past week's RSA conference who doesn't think privacy is a problem. The topic even had its own track, with more than ...

Fortinet and HP Enterprise Join Forces to Help Organizations with their Security Challenges

In today's world of fast-paced digital business, mid-sized businesses and enterprises face continually complex security requirements and ever-evolving threats and attacks. The pressures on IT and security staff continues to mount, ...

NSA seeks to combine offense and defense in its spy efforts

The National Security Agency tried to drum up support from the security industry for its plans to continue its cybersecurity operations. The NSA has two key missions: foreign intelligence-gathering and information ...

A New Approach to Securing the Enterprise Network today!

With disclosure of yet another high profile data breach happening with alarming regularity, what can an enterprise do to protect itself?

Sandstorm comes to Sophos Email Appliance: The next-gen sandboxing that stops targeted attacks

With 95% of targeted attacks beginning with an email, your secure email gateway is vitally important as your first line of defense. Attackers are more frequently using previously-unknown malware to evade traditional protection. While conventional anti-malware protection is still essential ...

Sophos Home reviews: “Simple,” “amazing” and “awesome”

Sophos Home, our free security solution for the whole family, has been available for a few months now, and the response has been overwhelmingly positive. The home IT heroes and professional sysadmins who've tried Sophos Home have been "very impressed," ...