<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://feeds.feedblitz.com/feedblitz_rss.xslt"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/"  version="2.0" xmlns:feedburner="http://rssnamespace.org/feedburner/ext/1.0"><channel><title>All Fortinet Blog | Latest Posts</title><description>Explore the latest cybersecurity trends and innovations, leading edge threat intelligence from FortiGuard Labs, Fortinet executive insights, and customer perspectives.</description><link>https://www.fortinet.com/bin/fortinet/allblogsrss</link><lastBuildDate>Fri, 3 Apr 2026 14:01:31 +0000</lastBuildDate><pubDate>Fri, 3 Apr 2026 14:01:31 +0000</pubDate>
<image>
	<url>https://users.feedblitz.com/57868ae052519574c19bd8596eda9141/fortinet-logo.png</url>
	<title>All Fortinet Blog | Latest Posts</title>
	<link>https://www.fortinet.com/bin/fortinet/allblogsrss</link>
</image>
<meta xmlns="http://www.w3.org/1999/xhtml" name="robots" content="noindex" />
<item>
<feedburner:origLink>https://www.fortinet.com/blog/industry-trends/securing-the-physical-world-as-it-comes-online</feedburner:origLink><title>Securing the Physical World as It Comes Online</title><description><![CDATA[Episode 5 of the second season of the Fortinet podcast series Brass Tacks: Talking Cybersecurity examines the growing cyber risk facing operational technology and what leaders must do to secure critical industries as IT and OT systems become increasingly connected.]]>

</description><link>https://feeds.feedblitz.com/~/953175290/0/fortinet/blogs~Securing-the-Physical-World-as-It-Comes-Online</link><pubDate>Fri, 3 Apr 2026 14:00:00 +0000</pubDate><content:encoded><![CDATA[<p>Episode 5 of the second season of the Fortinet podcast series Brass Tacks: Talking Cybersecurity examines the growing cyber risk facing operational technology and what leaders must do to secure critical industries as IT and OT systems become increasingly connected.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/953175290/0/fortinet/blogs">
]]>

</content:encoded><guid isPermaLink="false">tag:feedblitz.com,2026-04-03:52242/https://feeds.feedblitz.com/~/953175290/0/fortinet/blogs/3774de82a2f85ea4427adcb25195b6e8</guid></item>
<item>
<feedburner:origLink>https://www.fortinet.com/blog/security-architecture/why-the-2026-ai-cybersecurity-summit-matters</feedburner:origLink><title>Why the 2026 AI Cybersecurity Summit Matters </title><description><![CDATA[Join Fortinet’s 2026 AI Cybersecurity Summit for practical guidance on securing AI across environments and to explore how security must evolve as AI moves into production.]]>

</description><link>https://feeds.feedblitz.com/~/953171648/0/fortinet/blogs~Why-the-AI-Cybersecurity-Summit-Matters</link><pubDate>Fri, 3 Apr 2026 13:00:00 +0000</pubDate><content:encoded><![CDATA[<p>Join Fortinet’s 2026 AI Cybersecurity Summit for practical guidance on securing AI across environments and to explore how security must evolve as AI moves into production.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/953171648/0/fortinet/blogs">
]]>

</content:encoded><guid isPermaLink="false">tag:feedblitz.com,2026-04-03:52242/https://feeds.feedblitz.com/~/953171648/0/fortinet/blogs/bde99a7a96c4996323229f42d2bb9329</guid></item>
<item>
<feedburner:origLink>https://www.fortinet.com/blog/threat-research/dprk-related-campaigns-with-lnk-and-github-c2</feedburner:origLink><title>DPRK-Related Campaigns with LNK and GitHub C2</title><description><![CDATA[Analysis of DPRK-linked LNK-based attacks using GitHub as covert C2 infrastructure, detailing multi-stage PowerShell execution, persistence mechanisms, and data exfiltration techniques targeting Windows environments.]]>

</description><link>https://feeds.feedblitz.com/~/953053052/0/fortinet/blogs~DPRKRelated-Campaigns-with-LNK-and-GitHub-C</link><pubDate>Thu, 2 Apr 2026 13:00:00 +0000</pubDate><content:encoded><![CDATA[<p>Analysis of DPRK-linked LNK-based attacks using GitHub as covert C2 infrastructure, detailing multi-stage PowerShell execution, persistence mechanisms, and data exfiltration techniques targeting Windows environments.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/953053052/0/fortinet/blogs">
]]>

</content:encoded><guid isPermaLink="false">tag:feedblitz.com,2026-04-02:52242/https://feeds.feedblitz.com/~/953053052/0/fortinet/blogs/ced8ad648a4ecda6cf55f94da9ebceaa</guid></item>
<item>
<feedburner:origLink>https://www.fortinet.com/blog/cloud-security/ai-is-changing-application-threats-faster-than-teams-can-adapt</feedburner:origLink><title>AI Is Changing Application Threats Faster Than Teams Can Adapt</title><description><![CDATA[The 2026 Web Application Security Report reveals a critical gap between AI adoption and application security readiness. Learn how organizations are securing web applications, APIs, and AI-driven workloads.]]>

</description><link>https://feeds.feedblitz.com/~/952790918/0/fortinet/blogs~AI-Is-Changing-Application-Threats-Faster-Than-Teams-Can-Adapt</link><pubDate>Wed, 1 Apr 2026 15:00:00 +0000</pubDate><content:encoded><![CDATA[<p>The 2026 Web Application Security Report reveals a critical gap between AI adoption and application security readiness. Learn how organizations are securing web applications, APIs, and AI-driven workloads.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/952790918/0/fortinet/blogs">
]]>

</content:encoded><guid isPermaLink="false">tag:feedblitz.com,2026-04-01:52242/https://feeds.feedblitz.com/~/952790918/0/fortinet/blogs/95a88362f328d48364246dbfdc692a7c</guid></item>
<item>
<feedburner:origLink>https://www.fortinet.com/blog/industry-trends/announcing-fortinet-training-institutes-2026-atc-award-winners</feedburner:origLink><title>Announcing the Fortinet Training Institute’s 2026 ATC Award Winners</title><description><![CDATA[Fortinet announces the 2026 Authorized Training Center (ATC) Award winners, recognizing global partners advancing cybersecurity skills, certifications, and workforce readiness.]]>

</description><link>https://feeds.feedblitz.com/~/952790912/0/fortinet/blogs~Announcing-the-Fortinet-Training-Institute%e2%80%99s-ATC-Award-Winners</link><pubDate>Wed, 1 Apr 2026 15:00:00 +0000</pubDate><content:encoded><![CDATA[<p>Fortinet announces the 2026 Authorized Training Center (ATC) Award winners, recognizing global partners advancing cybersecurity skills, certifications, and workforce readiness.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/952790912/0/fortinet/blogs">
]]>

</content:encoded><guid isPermaLink="false">tag:feedblitz.com,2026-04-01:52242/https://feeds.feedblitz.com/~/952790912/0/fortinet/blogs/7961ffd57b39ab0930bfd85479854cd6</guid></item>
<item>
<feedburner:origLink>https://www.fortinet.com/blog/industry-trends/disrupting-cybercrime-networks-at-scale-requires-sustained-global-collaboration</feedburner:origLink><title>Disrupting Cybercrime Networks at Scale Requires Sustained Global Collaboration</title><description><![CDATA[At the RSAC Conference 2026, Fortinet’s Derek Manky joined leaders from the World Economic Forum, INTERPOL, and Microsoft to discuss how sustained global collaboration can enable continuous cybercrime disruption and shift the economics of cybercrime toward accountability.]]>

</description><link>https://feeds.feedblitz.com/~/951960212/0/fortinet/blogs~Disrupting-Cybercrime-Networks-at-Scale-Requires-Sustained-Global-Collaboration</link><pubDate>Fri, 27 Mar 2026 13:00:00 +0000</pubDate><content:encoded><![CDATA[<p>At the RSAC Conference 2026, Fortinet’s Derek Manky joined leaders from the World Economic Forum, INTERPOL, and Microsoft to discuss how sustained global collaboration can enable continuous cybercrime disruption and shift the economics of cybercrime toward accountability.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/951960212/0/fortinet/blogs">
]]>

</content:encoded><guid isPermaLink="false">tag:feedblitz.com,2026-03-27:52242/https://feeds.feedblitz.com/~/951960212/0/fortinet/blogs/f129110b27dbc137e06f3df60e688f61</guid></item>
<item>
<feedburner:origLink>https://www.fortinet.com/blog/industry-trends/the-cyber-talent-you-are-not-hiring-but-should-be</feedburner:origLink><title>The Cyber Talent You’re Not Hiring—But Should Be</title><description><![CDATA[The 2025 Cybersecurity Skills Gap Report shows hiring challenges aren’t just a lack of talent. It’s how narrowly organizations define “qualified.” Learn how skills-first hiring and certification pathways can expand the cyber workforce and reduce risk.]]>

</description><link>https://feeds.feedblitz.com/~/952567301/0/fortinet/blogs~The-Cyber-Talent-You%e2%80%99re-Not-Hiring%e2%80%94But-Should-Be</link><pubDate>Thu, 26 Mar 2026 15:00:00 +0000</pubDate><content:encoded><![CDATA[<p>The 2025 Cybersecurity Skills Gap Report shows hiring challenges aren’t just a lack of talent. It’s how narrowly organizations define “qualified.” Learn how skills-first hiring and certification pathways can expand the cyber workforce and reduce risk.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/952567301/0/fortinet/blogs">
]]>

</content:encoded><guid isPermaLink="false">tag:feedblitz.com,2026-03-26:52242/https://feeds.feedblitz.com/~/952567301/0/fortinet/blogs/94e979c7176c4af8bc7fa40761c0d4ca</guid></item>
<item>
<feedburner:origLink>https://www.fortinet.com/blog/industry-trends/cybersecurity-leadership-and-society</feedburner:origLink><title>Cybersecurity, Leadership, and Society</title><description><![CDATA[Episode 4 of the second season of the Fortinet podcast series Brass Tacks - Talking Cybersecurity examines cybersecurity as a societal and leadership challenge, exploring education, public-private collaboration, and the intersection of technology, governance, and trust.]]>

</description><link>https://feeds.feedblitz.com/~/951898628/0/fortinet/blogs~Cybersecurity-Leadership-and-Society</link><pubDate>Thu, 26 Mar 2026 14:00:00 +0000</pubDate><content:encoded><![CDATA[<p>Episode 4 of the second season of the Fortinet podcast series Brass Tacks - Talking Cybersecurity examines cybersecurity as a societal and leadership challenge, exploring education, public-private collaboration, and the intersection of technology, governance, and trust.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/951898628/0/fortinet/blogs">
]]>

</content:encoded><guid isPermaLink="false">tag:feedblitz.com,2026-03-26:52242/https://feeds.feedblitz.com/~/951898628/0/fortinet/blogs/137ef38268fb1071b27c784d95f7bd8c</guid></item>
<item>
<feedburner:origLink>https://www.fortinet.com/blog/industry-trends/cybersecurity-ai-and-sovereignty-whats-next-for-global-digital-infrastructure</feedburner:origLink><title>Cybersecurity, AI, and Sovereignty: What’s Next for Global Digital Infrastructure</title><description><![CDATA[Fortinet shares insights from the World Economic Forum Industry Strategy Meeting on cybersecurity, AI, digital sovereignty, and public-private collaboration shaping global digital infrastructure.]]>

</description><link>https://feeds.feedblitz.com/~/951842558/0/fortinet/blogs~Cybersecurity-AI-and-Sovereignty-What%e2%80%99s-Next-for-Global-Digital-Infrastructure</link><pubDate>Wed, 25 Mar 2026 12:00:00 +0000</pubDate><content:encoded><![CDATA[<p>Fortinet shares insights from the World Economic Forum Industry Strategy Meeting on cybersecurity, AI, digital sovereignty, and public-private collaboration shaping global digital infrastructure.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/951842558/0/fortinet/blogs">
]]>

</content:encoded><guid isPermaLink="false">tag:feedblitz.com,2026-03-25:52242/https://feeds.feedblitz.com/~/951842558/0/fortinet/blogs/bb60ba5f96ee29176b1b5b8857ad186d</guid></item>
<item>
<feedburner:origLink>https://www.fortinet.com/blog/industry-trends/why-cybersecurity-certifications-are-now-a-business-imperative</feedburner:origLink><title>Why Cybersecurity Certifications Are Now a Business Imperative</title><description><![CDATA[Cybersecurity certifications have become a hiring and retention imperative. Learn why certified teams perform better, how the skills gap persisted in 2025, and where organizations must invest to stay secure.]]>

</description><link>https://feeds.feedblitz.com/~/951205184/0/fortinet/blogs~Why-Cybersecurity-Certifications-Are-Now-a-Business-Imperative</link><pubDate>Thu, 19 Mar 2026 15:00:00 +0000</pubDate><content:encoded><![CDATA[<p>Cybersecurity certifications have become a hiring and retention imperative. Learn why certified teams perform better, how the skills gap persisted in 2025, and where organizations must invest to stay secure.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/951205184/0/fortinet/blogs">
]]>

</content:encoded><guid isPermaLink="false">tag:feedblitz.com,2026-03-19:52242/https://feeds.feedblitz.com/~/951205184/0/fortinet/blogs/6a6316803e2144ecbf81e34249fd34a6</guid></item>
</channel></rss>

