SUMMARY
Broad industry efforts — including Secure by Design, the National Institute of Standards and Technology (NIST) Cybersecurity Framework, the Joint Cyber Defense Collaborative within CISA, and widespread threat intelligence sharing — have bolstered cybersecurity defenses. Still, bad actors continue finding new ways to compromise security controls across infrastructure solution providers. It represents an unprecedented onslaught, further intensified by the rise of nation-state attacks buoyed by an ongoing and unstable geopolitical climate.
Modern generative and agentic AI tools have great promise for fortifying security posture and defense within cybersecurity platforms. However, cyber criminals are also leveraging the same technologies to improve the sophistication of attacks to disrupt operational efficiency and extort organizations via ransomware for ill-gained profit.
The sharing of threat intelligence goes far to help organizations stay one step ahead of bad actors. An example is Fortinet’s recently published 2025 Global Threat Landscape Report highlighting malware campaigns and AI-powered techniques that bypass traditional detection methods. However, more is needed.
To allow defenders to stay ahead of cyberattacks, there is also a need for greater transparency from security infrastructure providers themselves. Security infrastructure providers must have the courage to be more forthcoming, rather than allowing the press to report incidents first. They must responsibly share the resulting learnings to bolster security resilience for the cybersecurity industry at large.
Moor Insights & Strategy believes that Fortinet is establishing itself as one of the leaders in providing cybersecurity transparency that is enabling improved security outcomes. Fortinet’s CISA Secure by Design pledge, vulnerability identification and responsible disclosure approach, broad and deep consortia participation, and unique intellectual property distinguish it from competitors. Its proven history in identifying cyber threats early in the kill chain positions it as a wise choice. The company serves organizations seeking secure networking infrastructure that can scale across clouds, datacenters, campuses and branches, and network edges.


