Search the Portal

Recent Articles

DEC5
From Insight to Action: What the 2025 SANS ICS/OT Security Report Means for You

Learn how to turn critical findings from the SANS State of ICS/OT Security 2025 report into practical steps to strengthen your industrial cyber resilience.

Fortinet Blog
DEC4
UDPGangster Campaigns Target Multiple Countries

FortiGuard Labs uncovers UDPGangster campaigns linked to MuddyWater, using macro-laden phishing lures, evasion techniques, and UDP backdoors to target multiple countries

Fortinet Blog
DEC3
SD-WAN Is the Foundation of Every Successful SASE Strategy

Discover why Secure SD-WAN is the essential foundation for SASE, enabling unified management, stronger security, and optimized cloud performance.

Fortinet Blog
DEC3
Fortinet Named a Challenger in the 2025 Gartner® Magic Quadrant™ for Email Security Report

Fortinet named a Challenger in the Gartner Magic Quadrant for Email Security

Fortinet Blog
DEC2
Fortinet at AWS re:Invent 2025: Expanding What’s Possible in Cloud Security

At AWS re:Invent, Fortinet is proud to support several key AWS launches that make securing the cloud simpler, smarter, and more integrated than ever.

Fortinet Blog
DEC2
New eBPF Filters for Symbiote and BPFdoor Malware

FortiGuard Labs discovered new Symbiote and BPFDoor variants exploiting eBPF filters to enhance stealth through IPv6 support, UDP traffic, and dynamic port hopping for covert C2 communication.

Fortinet Blog
NOV26
ShadowV2 Casts a Shadow Over IoT Devices | FortiGuard Lab

ShadowV2, a new Mirai-based botnet targeting IoT devices, surfaced during the recent AWS outage. FortiGuard Labs examines its propagation, DDoS capabilities, and global footprint.

Fortinet Blog
NOV25
Cyberthreats Targeting the 2025 Holiday Season: What CISOs Need to Know

Cybercriminal activity is surging ahead of the 2025 holiday season. Deceptive domains, stolen accounts, and e-commerce attacks are accelerating. Here’s what leaders need to know.

Fortinet Blog
NOV21
Inside the Industrialization of Cybercrime: What to Expect in 2026

Fortinet’s 2026 Cyberthreat Predictions Report examines how cybercrime is evolving into an industrialized, AI-driven ecosystem and how CISOs can adapt by unifying threat intelligence, exposure management, and machine-speed defense.

Fortinet Blog
NOV19
Fortinet Strengthens AWS Network Security with AI-Driven IPS Rule Enhancements

Fortinet introduces Managed IPS Rules for AWS Network Firewall, enhanced by FortiGuard AI-Powered Security Services, to deliver continuously updated, automated intrusion prevention and simplified cloud security.

Fortinet Blog
MAY2024
6 Types of DLP Solutions - and How to Pick the Right One

Shopping for Data Loss Prevention (DLP) software is a far cry from your weekly grocery run – there’s a little more legwork involved than deciding between name brand or store brand.

Forcepoint News by Bryan Arnott
MAY2024
How DSPM, Cloud DLP, and Risk-Adaptive Protection (RAP) Simplify Data Security

The way businesses operate is more complex than ever before. Data continues to move from traditional on-premises locations to cloud environments, people are accessing data from anywhere, and keeping pace with various data regulatory requirements is a challenge.

Forcepoint News by Carlos Carvajal
MAY2024
The Importance of Data Posture and How to Evaluate It

We’re all taught the core tenets of good posture. Straighten up, chin in, shoulders back – and act relaxed. Data posture, while sure to be just as much of a balancing act, isn’t as straightforward a concept. However, it’s a critical one because it often dictates how susceptible a business is to data security risks. Luckily, technology is making it...

Forcepoint News by Carlos Carvajal
MAY2024
Protecting Data Everywhere from the Cloud with Forcepoint ONE Data Security

Today we introduced Forcepoint ONE Data Security our new enterprise-grade, cloud-managed service for protecting the use of sensitive data consistently from SaaS apps to the endpoint and everywhere in between.

Forcepoint News by Jim Fulton
APR2024
DSPM vs. CSPM: What Are the Differences and How to Decide?

One of the most promising recent trends in data security technology is Data Security Posture Management (DSPM), which promises organizations the ability to identify and classify sensitive data to mitigate data risk using extensive automation. With so much data being moved to the cloud, it’s understandable that Cloud Security Posture Management (CSPM) has also gained momentum. Organizations must have tools...

Forcepoint News by Tim Herr
APR2024
Forcepoint Brings AI-Powered DSPM to Customers

Today, we’re pleased to introduce Forcepoint DSPM to our customers. It's a Data Security Posture Management solution that’s one of the foundations of our Data Security Everywhere approach to enabling people to be more productive, working anywhere with data everywhere. Forcepoint DSPM uses AI to enhance data security by quickly and accurately identifying and remediating data security risks before they...

Forcepoint News by Jim Fulton
APR2024
Data Security Everywhere: Tame Dark Data with Discovery and Classification

Many organizations have adopted a cloud-first mentality, primarily due to the flexibility that it offers employees who need to access data from anywhere. But there’s a downside. Depending on public, private or hybrid clouds and countless cloud applications means your organization’s data gets scattered across multiple locations.

Forcepoint News by Kevin Oliveira
APR2024
Forcepoint Introduces New Partner Enablement Framework

Today, here at Forcepoint, we’re excited to roll out our new partner enablement framework. This new framework introduces Specializations and Advanced Specializations . These will allow our partners to better align with Forcepoint’s top focus areas and align their learning journey to areas that best fit with their business focus and capabilities.

Forcepoint News by stacie-corcoran
APR2024
9 Data Security Best Practices to Prevent Breaches

Just about every day we see another headline about a data breach. One of the more unfortunate parts about this seemingly endless news cycle is that in many cases, these incidents are entirely preventable.

Forcepoint News by Bryan Arnott
APR2024
We Asked People if They Used AI Tools with Security in Mind

Tools like ChatGPT, Gemini and Copilot have proven to be valuable aids for the workforce, supporting teams with everything from speeding up the monotonous to pushing strategy into action.

Forcepoint News by rachel-russell