Our Blog
Home / Blog
What Ever Happened to Shadow IT?
Shadow IT — at one point — kept CIOs and CISOs up at night. But today, it has become less of a looming threat and something that IT teams have come to terms with as a result of larger, unstoppable changes happening in the industry long before the disruption of...
Government Organizations Must Rein in Privileged Users
Just last week, the Department of Veterans Affairs announced a data breach had exposed the personal information of up to 46,000 veterans. While data breaches have many causes, privileged credential abuse is a common one. A recent survey from Forcepoint and the Ponemon...
Choosing a remote workforce protection solution: What the experts are saying
Since the emergence of COVID-19 and the subsequent shift to remote work for countless employees around the globe, the demand for providing protection against cyberattacks and data breaches continues to be high. Remote working has also brought about new challenges for...
How Endpoint Protector Keeps Data Secure on DaaS Platforms
The COVID-19 pandemic took many organizations by surprise. Faced with the need to quickly scale-up their remote work capabilities in a cost-effective way without compromising security and performance, many companies turned to Desktop-as-a-Service (DaaS) as a viable...
Fortinet Tackles the Cyber Skills Gap Through NSE Training Institute and Global Collaborations
Skills Gap Perspectives In a recent ESG and ISSA survey, nearly half of respondents believe that the cybersecurity skills gap is getting worse. There aren’t enough skilled individuals to keep networks secure and, at the same time, employees continue to be the weakest...