Our Blog
Home / Blog

T-RAT 2.0: Malware control via smartphone
Malware sellers want to attract customers with convenience features. Now criminals can remote control malware during their bathroom routine by just using a smartphone and Telegram app. Advertisments on Russian forums The researcher @3xp0rtblog discovered T-RAT 2.0...

10 Tips to Protect Your Company´s Data in 2021
The amount, complexity, and relevance of the data that companies handle has increased exponentially. Today the data stored by organizations can contain information from buying and selling transactions, market analysis, ideas for future technological innovations,...

How DLP Helps Financial Institutions Protect Their Data
Finance is one of the most heavily regulated sectors when it comes to privacy and data protection. Due to the highly sensitive nature of the data, financial institutions collect and process, specialized legislation like the Sarbanes-Oxley Act (SOX) and...

FortiOS 7.0: Consistent Security Across All Networks, Endpoints, and Clouds
Today’s networks continue to expand, further fragmenting the traditional edges at the data center, WAN, and LAN with things like off-network devices, distributed compute, multi-cloud, converged OT networks, LTE and 5G, the internet, and most recently, the home edge –...

What blockchain means for enterprises and how to keep it secure
Blockchain has created new economies based on cheaper and faster transaction record keeping. But can it survive the audit of cybersecurity folk?Back in 2009, the first generation of blockchain technology promised value via its use as a ledger for cryptocurrency...