Here’s what you need to know about today’s data protection and management trends and issues
- March 24, 2023
- Author: Khali Henderson
When hackers became better at attacking our people than our networks, email became the central front in the war on cybercrime. It’s still where most problems begin.
- March 23, 2023
- Author: Khali Henderson
LockBit group’s high-profile attack on SpaceX highlights the importance of implementing strong ransomware protection strategies.
- March 22, 2023
- Author: Allison Bergamo
This is an invaluable opportunity to learn how Fortinet customers such as Alaska Airlines, Exxon Mobil, WM and more leverage Fortinet solutions to tackle their toughest security challenges.
- March 14, 2023
- Author: Allison Bergamo
Over the past few years, K-12 school districts have raced to implement remote learning and embrace digital transformation. However, many districts have also been targeted by cybercriminals.
- March 10, 2023
- Author: Allison Bergamo
Combining a cybersecurity mesh architecture with AIOps can provide a level of automated detection and response that can’t be achieved in traditionally siloed environments
- February 23, 2023
- Author: Allison Bergamo
We asked ChatGPT, “What should CISOs consider when employees use ChatGPT?” Here's what this generative AI app had to say.
- February 23, 2023
- Author: Allison Bergamo
Budget constraints, layoffs and an increasing shortage of cybersecurity talent are just a few reasons why you should explore SOC solutions for your clients.
- February 9, 2023
- Author: Allison Bergamo
Learn how you can reduce your clients’ operational risk and increase their network and cybersecurity resiliency.
- February 8, 2023
- Author: Allison Bergamo
The CEOs of your client companies are relying on your expert guidance. Be prepared to answer these three security questions in any board meeting.
- January 30, 2023
- Author: Allison Bergamo
Fortinet's 2022 State of Operational Technology and Cybersecurity Report found that organizations are not moving fast enough to fully protect their OT assets. Here are 7 of the best OT security practices you can implement for your clients.
- 1 of 8
- next ›