Through Fortinet's Training Advancement Agenda (TAA) and NSE Training Institute's ATC Program, Fortinet is helping close the cybersecurity skills gap
"Fortinet's network of accredited training organizations in 83 countries and territories around the world are delivering both classroom and online training with the same top-quality instruction offered directly by Fortinet. Exclusive Networks France is a Fortinet Premier Authorized Training Center (ATC) accredited to deliver Fortinet NSE 4, 5 and 7 training courses.
Exclusive Networks, with 50+ offices across five continents and presence in over 100 countries, is a value-added distributor for cybersecurity and cloud solutions, as well as offering a host of market services from pre- and post-sales technical support to leasing, training, professional services and global project management. We recently connected with Jean-Marc Muselli, Services and Technical Director at Exclusive Networks France to discuss Exclusive Network's training business in France and their long running relationship with Fortinet..."
Artificial intelligence (AI) technology is a powerful technology, and because of this, it holds great potential for exploitation by cybercriminals
"Considering this, the only way that security leaders can stay ahead of bad actors is by gaining a true understanding of how this technology can be weaponized. Then, they can begin to develop effective strategies for confronting AI threats head-on.
Malicious Uses of AI Technology
As AI grows in adoption and sophistication, cybercriminals are looking for ways to seize upon its potential. The Electronic Frontier Foundation was already warning about potential malicious uses of AI back in 2018, including threats to digital, physical, and political security. And now, AI precursors combined with swarm technology can be used to infiltrate a network and steal data..."
The fifth-generation, or 5G, mobile network has changed how people and devices connect, providing faster data speeds, low latency, greater reliability, increased network capacity, enhanced availability, and better user experiences
"As with any new technology, however, 5G deployment brings new security challenges, particularly network security risks. By understanding the cybersecurity challenges associated with 5G implementation, organizations can effectively optimize their investments and secure their data.
Cybersecurity Challenges Associated with 5G Implementation
5G implementations offer malicious actors a new way to infiltrate organizations' systems, networks, and applications. According to the Cybersecurity and Infrastructure Security Agency (CISA), 5G deployments face six distinct security risks that organizations should be aware of..."
In this article we examine the ransomware used in the recent Kaseya attack
"We will see what happens when a machine is infected by this ransomware by looking at some of the visible Indicators of Compromise, such as modified wallpaper, several '<random string>-readme.txt' files in different folders, and changes in the filenames with <random string> extensions. We will also discuss in more details how DLL side-loading was implemented along with other malware tricks that the ransomware used.
Fortunately, FortiEDR detects and blocks the DLL side-loading event when the ransomware executes the valid application, such as MsMpEng.exe, while it loads the malicious payload, mpsvc.dll. As a result, customers will not be able to see all of the related IOCs because the malware is prevented from running..."
As the digital landscape continues to rapidly evolve, superior user experience is more important than ever before
"But with a growing number of network edges and increased reliance on disjointed tools for LAN, WAN, cloud and security monitoring, consistent user experience and visibility is becoming more of a challenge for some networking and security teams.
Fortinet CISOs Jonathan Nguyen-Duy, Alain Sanchez, and Renee Tarun discuss the challenges CISOs are facing when it comes to ensuring positive user experience and how a Digital Experience Monitoring solution can help..."
See all Archived Fortinet News articles
See all articles from this issue