Collaborating Authors

Fortinet Predicts Advanced AI and Counter Threat Intelligence Will Evolve Shifting the Cybercriminal TimesTech


Bangalore, India – November 25, 2019- Michael Joseph, Director System Engineering, India & SAARC, Fortinet "Much of the success of cyber adversaries has been due to the ability to take advantage of the expanding attack surface and the resulting security gaps due to digital transformation. Most recently, their attack methodologies have become more sophisticated by integrating the precursors of AI and swarm technology. Luckily, this trajectory is about to shift, if more organizations use the same sorts of strategies to defend their networks that criminals are using to target them. This requires a unified approach that is broad, integrated, and automated to enable protection and visibility across network segments as well as various edges, from IoT to dynamic-clouds." Fortinet, a global leader in broad, integrated, and automated cybersecurity solutions, today unveiled predictions from the FortiGuard Labs team about the threat landscape for 2020 and beyond.

Europe is prepared to rule over 5G cybersecurity


The European Commission's digital commissioner has warned the mobile industry to expect it to act over security concerns attached to Chinese network equipment makers. The Commission is considering a defacto ban on kit made by Chinese companies including Huawei in the face of security and espionage concerns, per Reuters. Appearing on stage at the Mobile World Congress tradeshow in Barcelona today, Mariya Gabriel, European commissioner for digital economy and society, flagged network "cybersecurity" during her scheduled keynote, warning delegates it's stating the obvious for her to say that "when 5G services become mission critical 5G networks need to be secure". Geopolitical concerns between the West and China are being accelerated and pushed to the fore as the era of 5G network upgrades approach, as well as by ongoing tensions between the U.S. and China over trade. "I'm well away of the unrest among all of you key actors in the telecoms sectors caused by the ongoing discussions around the cybersecurity of 5G," Gabriel continued, fleshing out the Commission's current thinking.

IoT devices can be hacked in minutes, warn researchers


Each internet-connected lightbulb is another entrance for hackers looking to break into your network. A number of internet-connected devices are so lacking in even the most basic cybersecurity protocols that it's possible to hack them in as little as three minutes, allowing cyberattackers to steal data, conduct espionage on enterprise activities, or even cause physical damage. The poor security in Internet of Things products -- including IP connected security systems, connected climate control and energy meters, smart video conferencing systems, connected printers, VoIP phones, smart fridges, and even smart lightbulbs -- pose an inherent risk to the security of organisations which deploy them, researchers have warned. The dangers of such devices are outlined in ForeScout's IoT Enterprise Risk Report, which is based upon research by ethical hacker Samy Kamkar -- and it doesn't make good reading for IoT product vendors or organisations which have deployed such items. Not only do these devices pose significant risks due to a lack of rudimentary security, but many were found to be operating with out-of-date firmware.

Disposable IoT ready to open new opportunities


The Internet of Things (IoT) has transformed how industries operate and how people interact with one another. We have seen an impressive array of new IoT deployments from an explosion of smart city applications across the U.S., to sensors implanted in the horns of critically-endangered rhinos in Africa. IoT devices outnumbered the world's population for the first time this year. Technological advancements in end-devices produced low-power transceivers and simple provisioning mechanisms. It is expected that the consumer segment is the largest user of connected "things" representing 63 percent of the overall number of applications in use.