LooCipher: Can Encrypted Files Be Recovered From Hell?

LooCipher is a new ransomware being distributed in the wild. While there have been articles discussing its main behaviour, how this new ransomware is being spread, and how it communicates with its command and control server to send victim machine information, this blog will focus on LooCipher’s file encryption mechanism Continue Reading

Hughes-Fortinet Partnership Brings Zero-Touch Simplicity to Distributed Retail Organizations

Hughes Network Systems is a leading managed network service provider for highly distributed enterprises that need to operate and deliver uniform performance across large numbers of branch locations. They have been a long-time Fortinet partner, delivering innovative managed network solutions that leverage Fortinet platforms by combining Fortinet’s security capabilities with Continue Reading

Energy and Utilities Benefit from Mobile

Energy and Utility companies’ work is distributed far and wide, between residential homes, businesses, schools, and wherever else the supporting infrastructure exists. Territories for field workers can often span a few towns wide and without a plan on prioritizing their sites, time and money can be wasted on unproductive routes. Over two Continue Reading

Why Git is Worth the Learning Curve

Over the last decade, distributed version control systems, like Git, have gained popularity and are regarded as the most important development tools by developers. Although the learning curve can pose a challenge, developers told us that Git enhances their ability to work together and ship faster, suggesting that managers have Continue Reading

Extending the Security Fabric: Refining the Security Operations Center

Monitoring, managing, and protecting the formless scope and scale of today’s highly distributed and dynamically changing digital enterprise network is a daunting task for IT and Security Operations Teams. The proliferation of IoT and mobile devices, the convergence of IT and OT, and adoption of cloud-based networking and services is Continue Reading

A Security Fabric Needs to Be Local AND Global

Security today relies on total visibility across the distributed network, as well deep insight into threats gathered and correlated from across the globe. But visibility isn’t enough. It needs to be combined with an integrated security architecture, such as the Fortinet Security Fabric, that can actively convert that visibility into Continue Reading

Security Webcast with Yubico

Git is distributed, meaning that people can maintain a copy of the source code. While Git’s distributed nature is what makes it so popular amongst developers, it is also what makes it a security concern to enterprises. The concern is that your source code is only as secure as the Continue Reading

Introducing the World’s Fastest and Most Secure Distributed Enterprise Firewall

Distributed enterprises are undergoing a dramatic change, driven by the adoption of mobility, direct Internet access, public cloud applications, and the Internet of Things (IoT). This has resulted in an exponential increase in devices, users, bandwidth, and transactions flooding their networks through the cloud applications. At the same time, the Continue Reading

Patented Firmware Repels Large-Scale DDoS attacks on DNS Services

DNS-Related DDoS Attacks Are on the Rise Domain Name System (DNS)-related distributed denial of service (DDoS) attacks are on the rise because hacktivists and cyberterrorists are finding it easy to use botnets to stage large volumetric reflection and amplification of queries DDoS attacks to overwhelm servers. When these attacks succeed, Continue Reading

>