Search the Portal

Recent Articles

JUL18
NailaoLocker Ransomware’s “Cheese”

FortiGuard Labs analyzes NailaoLocker ransomware, a unique variant using SM2 encryption and a built-in decryption function. Learn how it works, why it matters, and how Fortinet protects against it.

Fortinet Blog
JUL17
Life at Fortinet: How Early Cybersecurity Education Helps Create the Next Generation of Cyber Professionals

Meet Aldo di Mattia, a director of specialized systems engineering and cybersecurity advisory in Fortinet’s Rome office, shows how Fortinet employees make an impact both at the office and in their local communities.

Fortinet Blog
JUL17
Improving Cloud Intrusion Detection and Triage with FortiCNAPP Composite Alerts

FortiCNAPP Composite Alerts link weak signals into clear timelines—helping security teams detect cloud-native threats earlier and triage them faster.

Fortinet Blog
JUL16
Old Miner, New Tricks

FortiCNAPP Labs uncovers Lcrypt0rx, a likely AI-generated ransomware variant used in updated H2Miner campaigns targeting cloud resources for Monero mining.

Fortinet Blog
JUL15
Stronger Together: How Industry and Law Enforcement Can Fight Global Cybercrime

Learn more about the first INTERPOL Cybercrime Expert Group (#CyberEX) meeting at INTERPOL headquarters in Lyon, France. The group discussed deep and wide-ranging insights on how to combat cybercrime through effective disruption strategies, collaborative investigation efforts, innovative prevention mechanisms, and the empowerment of and partnership with law enforcement.

Fortinet Blog
JUL14
Honoring Our 2025 Academic Partner Award Winners

Each year, Fortinet honors the institutions and individuals making a significant impact in helping students obtain the necessary skills and knowledge to successfully pursue a career in cybersecurity. Learn more.

Fortinet Blog
JUL14
How FortiSandbox 5.0 Detects Dark 101 Ransomware Despite Evasion Techniques

Discover how FortiSandbox 5.0 detects Dark 101 ransomware, even with sandbox evasion tactics. Learn how advanced behavioral analysis blocks file encryption, system tampering, and ransom note deployment.

Fortinet Blog
JUL11
Securing Critical Infrastructure: Why OT Requires a Threat-Informed Defense

Highlights from the Threat-informed defense for OT and 2025 Fortinet Global Threat Landscape report. Learn more.

Fortinet Blog
JUL10
Fortinet Champions MITRE CTID Ambiguous Techniques

Learn more about the project recently delivered to the MITRE CTID community as an advanced approach to the Summiting the Pyramid framework, with the goal of addressing the complex challenge of detecting behaviors where malicious and benign actions converge.

Fortinet Blog
JUL10
Catching Smarter Mice with Even Smarter Cats

Explore how AI is changing the cat-and-mouse dynamic of cybersecurity, from cracking obfuscation and legacy languages to challenging new malware built with Flutter, Rust, and Delphi.

Fortinet Blog
MAY2024
6 Types of DLP Solutions - and How to Pick the Right One

Shopping for Data Loss Prevention (DLP) software is a far cry from your weekly grocery run – there’s a little more legwork involved than deciding between name brand or store brand.

Forcepoint News by Bryan Arnott
MAY2024
How DSPM, Cloud DLP, and Risk-Adaptive Protection (RAP) Simplify Data Security

The way businesses operate is more complex than ever before. Data continues to move from traditional on-premises locations to cloud environments, people are accessing data from anywhere, and keeping pace with various data regulatory requirements is a challenge.

Forcepoint News by Carlos Carvajal
MAY2024
The Importance of Data Posture and How to Evaluate It

We’re all taught the core tenets of good posture. Straighten up, chin in, shoulders back – and act relaxed. Data posture, while sure to be just as much of a balancing act, isn’t as straightforward a concept. However, it’s a critical one because it often dictates how susceptible a business is to data security risks. Luckily, technology is making it...

Forcepoint News by Carlos Carvajal
MAY2024
Protecting Data Everywhere from the Cloud with Forcepoint ONE Data Security

Today we introduced Forcepoint ONE Data Security our new enterprise-grade, cloud-managed service for protecting the use of sensitive data consistently from SaaS apps to the endpoint and everywhere in between.

Forcepoint News by Jim Fulton
APR2024
DSPM vs. CSPM: What Are the Differences and How to Decide?

One of the most promising recent trends in data security technology is Data Security Posture Management (DSPM), which promises organizations the ability to identify and classify sensitive data to mitigate data risk using extensive automation. With so much data being moved to the cloud, it’s understandable that Cloud Security Posture Management (CSPM) has also gained momentum. Organizations must have tools...

Forcepoint News by Tim Herr
APR2024
Forcepoint Brings AI-Powered DSPM to Customers

Today, we’re pleased to introduce Forcepoint DSPM to our customers. It's a Data Security Posture Management solution that’s one of the foundations of our Data Security Everywhere approach to enabling people to be more productive, working anywhere with data everywhere. Forcepoint DSPM uses AI to enhance data security by quickly and accurately identifying and remediating data security risks before they...

Forcepoint News by Jim Fulton
APR2024
Data Security Everywhere: Tame Dark Data with Discovery and Classification

Many organizations have adopted a cloud-first mentality, primarily due to the flexibility that it offers employees who need to access data from anywhere. But there’s a downside. Depending on public, private or hybrid clouds and countless cloud applications means your organization’s data gets scattered across multiple locations.

Forcepoint News by Kevin Oliveira
APR2024
Forcepoint Introduces New Partner Enablement Framework

Today, here at Forcepoint, we’re excited to roll out our new partner enablement framework. This new framework introduces Specializations and Advanced Specializations . These will allow our partners to better align with Forcepoint’s top focus areas and align their learning journey to areas that best fit with their business focus and capabilities.

Forcepoint News by stacie-corcoran
APR2024
9 Data Security Best Practices to Prevent Breaches

Just about every day we see another headline about a data breach. One of the more unfortunate parts about this seemingly endless news cycle is that in many cases, these incidents are entirely preventable.

Forcepoint News by Bryan Arnott
APR2024
We Asked People if They Used AI Tools with Security in Mind

Tools like ChatGPT, Gemini and Copilot have proven to be valuable aids for the workforce, supporting teams with everything from speeding up the monotonous to pushing strategy into action.

Forcepoint News by rachel-russell