<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://feeds.fortinet.com/feedblitz_rss.xslt"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/"  version="2.0" xmlns:feedburner="http://rssnamespace.org/feedburner/ext/1.0"><channel><title>All Fortinet Blog | Latest Posts</title><description>Explore the latest cybersecurity trends and innovations, leading edge threat intelligence from FortiGuard Labs, Fortinet executive insights, and customer perspectives.</description><link>https://www.fortinet.com/bin/fortinet/allblogsrss</link><lastBuildDate>Mon, 20 Apr 2026 16:56:24 +0000</lastBuildDate><pubDate>Mon, 20 Apr 2026 16:56:24 +0000</pubDate>
<image>
	<url>https://users.feedblitz.com/57868ae052519574c19bd8596eda9141/fortinet-logo.png</url>
	<title>All Fortinet Blog | Latest Posts</title>
	<link>https://www.fortinet.com/bin/fortinet/allblogsrss</link>
</image>
<meta xmlns="http://www.w3.org/1999/xhtml" name="robots" content="noindex" />
<item>
<feedburner:origLink>https://www.fortinet.com/blog/ciso-collective/supercharged-security-security-in-the-time-of-mythos</feedburner:origLink><title>Supercharged Security: Security in the Time of Mythos</title><description><![CDATA[As AI has turned cybersecurity into an arms race, learn how Fortinet stands apart by combining long standing AI expertise, secure by design products, and the fastest path from discovery to mitigation, without sacrificing trust.]]>

</description><link>https://feeds.fortinet.com/~/954108563/0/fortinet/blogs~Supercharged-Security-Security-in-the-Time-of-Mythos</link><pubDate>Mon, 20 Apr 2026 13:00:00 +0000</pubDate><content:encoded><![CDATA[<p>As AI has turned cybersecurity into an arms race, learn how Fortinet stands apart by combining long standing AI expertise, secure by design products, and the fastest path from discovery to mitigation, without sacrificing trust.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.fortinet.com/~/i/954108563/0/fortinet/blogs">
]]>

</content:encoded><guid isPermaLink="false">tag:feedblitz.com,2026-04-20:52242/https://feeds.fortinet.com/~/954108563/0/fortinet/blogs/643b1a6b1ae300457f674220d75722b7</guid></item>
<item>
<feedburner:origLink>https://www.fortinet.com/blog/threat-research/tracking-mirai-variant-nexcorium-a-vulnerability-driven-iot-botnet-campaign</feedburner:origLink><title>Tracking Mirai Variant Nexcorium: A Vulnerability-Driven IoT Botnet Campaign</title><description><![CDATA[TBK DVRs targeted by Nexcorium: exploiting, persisting, brute-force attacks, and multi-architecture Mirai-style DDoS in a single campaign. From CVE-2024-3721 exploitation to CVE-2017-17215 reuse, this botnet demonstrates how quickly IoT threats continue to evolve.]]>

</description><link>https://feeds.fortinet.com/~/953946956/0/fortinet/blogs~Tracking-Mirai-Variant-Nexcorium-A-VulnerabilityDriven-IoT-Botnet-Campaign</link><pubDate>Fri, 17 Apr 2026 13:00:00 +0000</pubDate><content:encoded><![CDATA[<p>TBK DVRs targeted by Nexcorium: exploiting, persisting, brute-force attacks, and multi-architecture Mirai-style DDoS in a single campaign. From CVE-2024-3721 exploitation to CVE-2017-17215 reuse, this botnet demonstrates how quickly IoT threats continue to evolve.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.fortinet.com/~/i/953946956/0/fortinet/blogs">
]]>

</content:encoded><guid isPermaLink="false">tag:feedblitz.com,2026-04-17:52242/https://feeds.fortinet.com/~/953946956/0/fortinet/blogs/36cf4c948474c4428d50c6afa4606978</guid></item>
<item>
<feedburner:origLink>https://www.fortinet.com/blog/secure-networking/ai-security-is-an-architectural-decision</feedburner:origLink><title>AI Security Is an Architectural Decision</title><description><![CDATA[Fortinet EVP Russ Schafer explains why AI security must be embedded in the enterprise architecture—not layered on top—and how Secure Networking convergence prepares organizations for production-scale AI. Join the discussion at the 2026 Fortinet AI Security Summit.]]>

</description><link>https://feeds.fortinet.com/~/953830139/0/fortinet/blogs~AI-Security-Is-an-Architectural-Decision</link><pubDate>Wed, 15 Apr 2026 13:00:00 +0000</pubDate><content:encoded><![CDATA[<p>Fortinet EVP Russ Schafer explains why AI security must be embedded in the enterprise architecture—not layered on top—and how Secure Networking convergence prepares organizations for production-scale AI. Join the discussion at the 2026 Fortinet AI Security Summit.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.fortinet.com/~/i/953830139/0/fortinet/blogs">
]]>

</content:encoded><guid isPermaLink="false">tag:feedblitz.com,2026-04-15:52242/https://feeds.fortinet.com/~/953830139/0/fortinet/blogs/2bc6e4241241714b03a77df9ee251ed4</guid></item>
<item>
<feedburner:origLink>https://www.fortinet.com/blog/industry-trends/fortinet-training-institute-wins-industry-accolades</feedburner:origLink><title>Fortinet Training Institute Wins Industry Accolades</title><description><![CDATA[Learn more about the Fortinet Training Institute's industry awards for addressing the cyber skills gap.]]>

</description><link>https://feeds.fortinet.com/~/906577052/0/fortinet/blogs~Fortinet-Training-Institute-Wins-Industry-Accolades</link><pubDate>Mon, 13 Apr 2026 15:00:00 +0000</pubDate><content:encoded><![CDATA[<p>Learn more about the Fortinet Training Institute's industry awards for addressing the cyber skills gap.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.fortinet.com/~/i/906577052/0/fortinet/blogs">
]]>

</content:encoded><guid isPermaLink="false">tag:feedblitz.com,2026-04-13:52242/https://feeds.fortinet.com/~/906577052/0/fortinet/blogs/659609f93f5c9939bde4b82aa64b2398</guid></item>
<item>
<feedburner:origLink>https://www.fortinet.com/blog/secure-networking/shadow-ai-the-invisible-risk-growing-inside-your-organization</feedburner:origLink><title>Shadow AI: The Invisible Risk Growing Inside Your Organization</title><description><![CDATA[Shadow AI is expanding inside enterprises, creating visibility gaps, data exposure risks, and compliance challenges. Learn how to identify and control AI usage across networks and endpoints.]]>

</description><link>https://feeds.fortinet.com/~/953612567/0/fortinet/blogs~Shadow-AI-The-Invisible-Risk-Growing-Inside-Your-Organization</link><pubDate>Fri, 10 Apr 2026 13:00:00 +0000</pubDate><content:encoded><![CDATA[<p>Shadow AI is expanding inside enterprises, creating visibility gaps, data exposure risks, and compliance challenges. Learn how to identify and control AI usage across networks and endpoints.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.fortinet.com/~/i/953612567/0/fortinet/blogs">
]]>

</content:encoded><guid isPermaLink="false">tag:feedblitz.com,2026-04-10:52242/https://feeds.fortinet.com/~/953612567/0/fortinet/blogs/c8d41bedf1b31d1b284cce03e0e24677</guid></item>
<item>
<feedburner:origLink>https://www.fortinet.com/blog/secure-networking/leading-by-example-in-sustainability-fortinet-expands-global-epd-certification</feedburner:origLink><title>Leading by Example in Sustainability: Fortinet Expands Global EPD Certification</title><description><![CDATA[The FortiGate 90G Series now combines high-performance security with globally recognized ISO 14025 environmental certification.]]>

</description><link>https://feeds.fortinet.com/~/953569886/0/fortinet/blogs~Leading-by-Example-in-Sustainability-Fortinet-Expands-Global-EPD-Certification</link><pubDate>Thu, 9 Apr 2026 15:00:00 +0000</pubDate><content:encoded><![CDATA[<p>The FortiGate 90G Series now combines high-performance security with globally recognized ISO 14025 environmental certification.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.fortinet.com/~/i/953569886/0/fortinet/blogs">
]]>

</content:encoded><guid isPermaLink="false">tag:feedblitz.com,2026-04-09:52242/https://feeds.fortinet.com/~/953569886/0/fortinet/blogs/10447f87a8c7b732a4b819fa90350a21</guid></item>
<item>
<feedburner:origLink>https://www.fortinet.com/blog/industry-trends/when-cybercrime-becomes-an-industry</feedburner:origLink><title>When Cybercrime Becomes an Industry</title><description><![CDATA[Episode 6 of the second season of the Fortinet podcast series Brass Tacks - Talking Cybersecurity examines the industrialization of cybercrime, why everyone is a target, and how preparedness, basic cyber hygiene, and public-private cooperation remain critical.]]>

</description><link>https://feeds.fortinet.com/~/953458115/0/fortinet/blogs~When-Cybercrime-Becomes-an-Industry</link><pubDate>Tue, 7 Apr 2026 14:00:00 +0000</pubDate><content:encoded><![CDATA[<p>Episode 6 of the second season of the Fortinet podcast series Brass Tacks - Talking Cybersecurity examines the industrialization of cybercrime, why everyone is a target, and how preparedness, basic cyber hygiene, and public-private cooperation remain critical.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.fortinet.com/~/i/953458115/0/fortinet/blogs">
]]>

</content:encoded><guid isPermaLink="false">tag:feedblitz.com,2026-04-07:52242/https://feeds.fortinet.com/~/953458115/0/fortinet/blogs/38e27cc9f1f31158fa06f4b20adc8127</guid></item>
<item>
<feedburner:origLink>https://www.fortinet.com/blog/security-architecture/fortios-8-redefining-secure-networking-in-the-ai-and-quantum-era</feedburner:origLink><title>FortiOS 8.0: Redefining Secure Networking in the AI and Quantum Era</title><description><![CDATA[FortiOS 8.0 introduces unified, AI-governed, and quantum-ready security to help organizations reduce complexity, improve visibility, and defend against emerging AI-driven and post-quantum threats.]]>

</description><link>https://feeds.fortinet.com/~/953373773/0/fortinet/blogs~FortiOS-Redefining-Secure-Networking-in-the-AI-and-Quantum-Era</link><pubDate>Mon, 6 Apr 2026 13:00:00 +0000</pubDate><content:encoded><![CDATA[<p>FortiOS 8.0 introduces unified, AI-governed, and quantum-ready security to help organizations reduce complexity, improve visibility, and defend against emerging AI-driven and post-quantum threats.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.fortinet.com/~/i/953373773/0/fortinet/blogs">
]]>

</content:encoded><guid isPermaLink="false">tag:feedblitz.com,2026-04-06:52242/https://feeds.fortinet.com/~/953373773/0/fortinet/blogs/50ae020015e0e2a0338b9a831be5a2ed</guid></item>
<item>
<feedburner:origLink>https://www.fortinet.com/blog/industry-trends/securing-the-physical-world-as-it-comes-online</feedburner:origLink><title>Securing the Physical World as It Comes Online</title><description><![CDATA[Episode 5 of the second season of the Fortinet podcast series Brass Tacks: Talking Cybersecurity examines the growing cyber risk facing operational technology and what leaders must do to secure critical industries as IT and OT systems become increasingly connected.]]>

</description><link>https://feeds.fortinet.com/~/953175290/0/fortinet/blogs~Securing-the-Physical-World-as-It-Comes-Online</link><pubDate>Fri, 3 Apr 2026 14:00:00 +0000</pubDate><content:encoded><![CDATA[<p>Episode 5 of the second season of the Fortinet podcast series Brass Tacks: Talking Cybersecurity examines the growing cyber risk facing operational technology and what leaders must do to secure critical industries as IT and OT systems become increasingly connected.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.fortinet.com/~/i/953175290/0/fortinet/blogs">
]]>

</content:encoded><guid isPermaLink="false">tag:feedblitz.com,2026-04-03:52242/https://feeds.fortinet.com/~/953175290/0/fortinet/blogs/3774de82a2f85ea4427adcb25195b6e8</guid></item>
<item>
<feedburner:origLink>https://www.fortinet.com/blog/security-architecture/why-the-2026-ai-cybersecurity-summit-matters</feedburner:origLink><title>Why the 2026 AI Cybersecurity Summit Matters </title><description><![CDATA[Join Fortinet’s 2026 AI Cybersecurity Summit for practical guidance on securing AI across environments and to explore how security must evolve as AI moves into production.]]>

</description><link>https://feeds.fortinet.com/~/953171648/0/fortinet/blogs~Why-the-AI-Cybersecurity-Summit-Matters</link><pubDate>Fri, 3 Apr 2026 13:00:00 +0000</pubDate><content:encoded><![CDATA[<p>Join Fortinet’s 2026 AI Cybersecurity Summit for practical guidance on securing AI across environments and to explore how security must evolve as AI moves into production.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.fortinet.com/~/i/953171648/0/fortinet/blogs">
]]>

</content:encoded><guid isPermaLink="false">tag:feedblitz.com,2026-04-03:52242/https://feeds.fortinet.com/~/953171648/0/fortinet/blogs/bde99a7a96c4996323229f42d2bb9329</guid></item>
</channel></rss>

