Search the Portal

Recent Articles

NOV14
The Journey from Military Service to Cybersecurity

Veterans bring mission-first focus and resilience to cybersecurity. See how BCIT, Cyber Catalyst, and Fortinet are helping them build new digital careers.

Fortinet Blog
NOV13
Fortinet Named Inaugural Google Unified Security Recommended Partner for Network Protection, Powered by FortiSASE and FortiGate NGFW

Fortinet was named the inaugural Google Unified Security Recommended network protection provider.

Fortinet Blog
NOV12
Fortinet Is the Only Vendor Recognized as a Gartner Peer Insights™ Customers’ Choice for Security Service Edge Three Years in a Row

Fortinet Recognized as a Gartner Peer Insights™️ Customers’ Choice for Security Service Edge

Fortinet Blog
NOV11
Fortinet Wins 2025 Red Dot Product Design Award for FortiGate Rugged Series

Fortinet has received the 2025 Red Dot Product Design Award for the FortiGate Rugged Series, recognizing its compact, purpose-built design that brings trusted Fortinet security to the industrial edge.

Fortinet Blog
NOV11
Fortinet Expands Managed SOC-as-a-Service: Accessible Cyber Defense for Every Organization

Fortinet expands managed SOCaaS with AI-driven efficiency, deeper integrations, and FortiSASE alignment, bringing expert-led SOC capabilities to any organization.

Fortinet Blog
NOV4
CISO Predictions for 2026

Explore Fortinet’s 2026 cybersecurity predictions from global CISOs. Discover how AI-driven threats, geopolitical tensions, and emerging technologies, such as quantum computing and satellite networks, are reshaping the CISO’s mission—from securing data to ensuring resilience.

Fortinet Blog
OCT31
Cloud Abuse at Scale

FortiGuard Labs analyzes TruffleNet, a large-scale campaign abusing AWS SES with stolen credentials and linked to Business Email Compromise (BEC).

Fortinet Blog
OCT30
Stolen Credentials and Valid Account Abuse Remain Integral to Financially Motivated Intrusions

FortiGuard IR analysis of H1 2025 shows financially motivated actors increasingly abusing valid accounts and legitimate remote access tools to bypass detection, emphasizing the need for identity-centric defenses.

Fortinet Blog
OCT30
Fortinet Honored by Crime Stoppers International for Global Leadership in Cybercrime Prevention

Crime Stoppers International has recognized Fortinet with two 2025 awards honoring its leadership in cybercrime disruption, intelligence sharing, and community resilience.

Fortinet Blog
OCT29
Cyber Awareness Month: Why AI Literacy Matters for Cybersecurity

Fortinet’s Cybersecurity Skills Gap Report shows AI expertise is in short supply. Learn why AI literacy is critical for professionals and society alike.

Fortinet Blog
MAY2024
6 Types of DLP Solutions - and How to Pick the Right One

Shopping for Data Loss Prevention (DLP) software is a far cry from your weekly grocery run – there’s a little more legwork involved than deciding between name brand or store brand.

Forcepoint News by Bryan Arnott
MAY2024
How DSPM, Cloud DLP, and Risk-Adaptive Protection (RAP) Simplify Data Security

The way businesses operate is more complex than ever before. Data continues to move from traditional on-premises locations to cloud environments, people are accessing data from anywhere, and keeping pace with various data regulatory requirements is a challenge.

Forcepoint News by Carlos Carvajal
MAY2024
The Importance of Data Posture and How to Evaluate It

We’re all taught the core tenets of good posture. Straighten up, chin in, shoulders back – and act relaxed. Data posture, while sure to be just as much of a balancing act, isn’t as straightforward a concept. However, it’s a critical one because it often dictates how susceptible a business is to data security risks. Luckily, technology is making it...

Forcepoint News by Carlos Carvajal
MAY2024
Protecting Data Everywhere from the Cloud with Forcepoint ONE Data Security

Today we introduced Forcepoint ONE Data Security our new enterprise-grade, cloud-managed service for protecting the use of sensitive data consistently from SaaS apps to the endpoint and everywhere in between.

Forcepoint News by Jim Fulton
APR2024
DSPM vs. CSPM: What Are the Differences and How to Decide?

One of the most promising recent trends in data security technology is Data Security Posture Management (DSPM), which promises organizations the ability to identify and classify sensitive data to mitigate data risk using extensive automation. With so much data being moved to the cloud, it’s understandable that Cloud Security Posture Management (CSPM) has also gained momentum. Organizations must have tools...

Forcepoint News by Tim Herr
APR2024
Forcepoint Brings AI-Powered DSPM to Customers

Today, we’re pleased to introduce Forcepoint DSPM to our customers. It's a Data Security Posture Management solution that’s one of the foundations of our Data Security Everywhere approach to enabling people to be more productive, working anywhere with data everywhere. Forcepoint DSPM uses AI to enhance data security by quickly and accurately identifying and remediating data security risks before they...

Forcepoint News by Jim Fulton
APR2024
Data Security Everywhere: Tame Dark Data with Discovery and Classification

Many organizations have adopted a cloud-first mentality, primarily due to the flexibility that it offers employees who need to access data from anywhere. But there’s a downside. Depending on public, private or hybrid clouds and countless cloud applications means your organization’s data gets scattered across multiple locations.

Forcepoint News by Kevin Oliveira
APR2024
Forcepoint Introduces New Partner Enablement Framework

Today, here at Forcepoint, we’re excited to roll out our new partner enablement framework. This new framework introduces Specializations and Advanced Specializations . These will allow our partners to better align with Forcepoint’s top focus areas and align their learning journey to areas that best fit with their business focus and capabilities.

Forcepoint News by stacie-corcoran
APR2024
9 Data Security Best Practices to Prevent Breaches

Just about every day we see another headline about a data breach. One of the more unfortunate parts about this seemingly endless news cycle is that in many cases, these incidents are entirely preventable.

Forcepoint News by Bryan Arnott
APR2024
We Asked People if They Used AI Tools with Security in Mind

Tools like ChatGPT, Gemini and Copilot have proven to be valuable aids for the workforce, supporting teams with everything from speeding up the monotonous to pushing strategy into action.

Forcepoint News by rachel-russell