Is this email not displaying correctly? View it in your browser.

Click the POST THIS button below to quickly and easily send the selected message to your social networks and/or blog. 

There are three new custom articles available to Fortinet Partners. These articles are first come, first served. If you are interested in one of the following articles, please email lorien@contentmx.com

  1. Create A Safe, Digital K12 Environment With E-Rate Eligible Security From Fortinet
  2. Why Research Organizations Should Start Paying Attention to Cybersecurity
  3. E-Rate Lowers Costs Of Protecting K12 Schools From Cyber Threat

Please contact your ContentMX success manager with questions. 

New Promotion to Share

Defining Security for Today's Cloud Environments
Defining Security for Today's Cloud Environments
Learn the importance of an agile security solution that dynamically scales as changes are made to cloud environments, and the benefits of segmentation for deep visibility of traffic and eliminating the spread of advanced threats.
POST THIS
#Cybersecurity becomes an issue to closing the big deal. Legal Counsels Fret Over Cybersecurity
Corporate Legal Counsels and Cybersecurity
Corporate Legal Counsels and Cybersecurity
BDO Consulting survey shows in-house legal executives cite data breaches, cross-border data transfers, as risks with e-discovery.
POST THIS
Analysis of ISC #BIND TKEY Query Response Handling #DoS
Bug taking down BIND recursive servers?
Bug taking down BIND recursive servers?
Another TKEY record-related bug in BIND has been fixed with a patch from the Internet Systems Consortium (ISC) that was released just after the New Year. This bug may take down BIND recursive servers by sending a simple query response with TKEY record, thereby causing a denial of service (DoS). This potential DoS vulnerability is caused by an assertion failure in Resolver.c when caching the DNS response with TKEY Record. In this post we will analyze the BIND source codes and expose the root cause ...
POST THIS
What to Consider When Moving To #Hyperconverged #Infrastructure. Thinking #Cybersecurity
Moving To Hyperconverged Infrastructure?
Moving To Hyperconverged Infrastructure?
Scalability, data availability, and agility are three reasons why enterprises are making the move to HCI.
POST THIS
The #heartbeat of #cybersecurity, let the beat get you in.
The Cyber Security Heartbeat
The Cyber Security Heartbeat
Researchers at Binghamton State University in New York think your heart could be the key to your personal data. By measuring the electrical activity of the heart, researchers say they can encrypt patients' health records. The fundamental idea is this: In the future, all patients will be outfitted with a wearable device, which will continuously collect physiological data and transmit it to the patients' doctors. Because electrocardiogram (ECG) signals are already collected for clinical diagnosis, ...
POST THIS
Android Locker Malware uses Google #Cloud Messaging Service #cybersecurity
Last month, we found a new android locker malware that launches ransomware, displays a locker screen on the device, and extorts the user to submit their bankcard info to unblock the device. The interesting twist on this ransomware variant is that it leverages the Google Cloud Messaging (GCM) platform, a push notification service for sending messages to registered clients, as part of its C2 infrastructure. It also uses AES encryption in the communication between the infected device and the C2 server. ...
What Hard Brexit Means for Vodafone, BT
What Hard Brexit Means for Vodafone, BT
A hard Brexit could equal hard times for UK service providers, and increase the likelihood that Vodafone will move its headquarters outside the UK.
POST THIS
Cloud Security & IoT: A Look At What Lies Ahead
Cloud Security & IoT: A Look At What Lies Ahead
Cloud Security & IoT: A Look At What Lies Ahead
In the brave new world of cloud, security teams must be as agile as possible. This means leveraging proactive monitoring tools, locking down access points, and forecasting requirements
POST THIS
January 26, 2017

Promotions to share

Learn the benefits of cloud adoption and key #security considerations with Fortinet's #Cloud Security Solutions
Scale and Segment the Cloud
Scale and Segment the Cloud
Download the white paper today!

POST THIS

New Features:

Understanding Your ROI With Google Analytics

As marketers we know that measuring your ROI with analytics is important. ContentMX collects a range of statistics that give you the big picture of how content marketing benefits your business.

We also recognize that many companies use Google Analytics to get a full measure of their website traffic. This data provides a lot of helpful information, but it is not always easy to correlate it to your content marketing efforts.

To help organize and present this information in a more meaningful way, ContentMX has developed a Google Analytics integration that adds data to your reports to show how your content drives web traffic.

Click here to read more and to learn how to connect. 


Additional Support: 

Article Request Form

Is there a specific topic you would like us to write about? Complete this Article Request form

Please allow for a minimum of 14 days from the time you submit your request to your preferred delivery date.

Copyright (C) 2017 Fortinet All rights reserved.