How to Achieve Automated, Intelligence-Driven Security

Over the last couple of years, cyberattacks have evolved in both scale and effectiveness, affecting organizations across all industries and geographic regions. Successful cyberattacks are a growing industry-wide problem in spite of billions being spent on cybersecurity solutions. Part of the reason is that new techniques- and in fact a Continue Reading

Zimbra’s Wiki – now 17x Faster!

Greetings, Friends. Over the last few months we received reports that our Tech Center was suffering from occasional timeouts or long waiting periods. Not good! We know that our tech articles are critical for your Zimbra deployments and/or configurations, so I have good news for you today. But first, a Continue Reading

Don’t Take It from Us – FortiGate Enterprise Network Firewall Customer Reviews

Last year, Gartner launched a new website and service called Peer Insights. Its goal is to provide organizations looking at adopting new technologies or solutions with access to the collective knowledge and experience of IT professionals that have already evaluated and adopted similar technology. Their posted reviews offer detailed perspectives Continue Reading

Petya’s Master Boot Record Infection

Last week we started our technical analysis on Petya (also called NotPetya) and its so-called “killswitch.” In that blog post we mentioned that Petya looks for a file in the Windows folder that has the same filename (no extension) as itself (for example: C:WindowsPetya). If it exists, it terminates by Continue Reading

Google’s 2017 CTF – The “ASCII Art Client” Challenge

    In our last blog in this series, we discussed FortiGuard Labs’ participation in Google’s second annual Capture The Flag (CTF) competition. In this blogpost, I want to share how I solved another challenge, called“ASCII Art Client”. Challenge Description For this challenge, participants were given two files: a binary Continue Reading

Why Git is Worth the Learning Curve

Over the last decade, distributed version control systems, like Git, have gained popularity and are regarded as the most important development tools by developers. Although the learning curve can pose a challenge, developers told us that Git enhances their ability to work together and ship faster, suggesting that managers have Continue Reading

Zero Patch IoT Environment

Over the last few months or years I have reported vulnerabilities on several IoT devices. None have been patched so far, and I think it is time to discuss the situation openly. One of the issues I have faced several times is the zero-security-culture phenomenon. Some of those IoT companies were typically very small Continue Reading

X-tended Performance in ownCloud X

As we have previously announced, the release of ownCloud X is getting closer. Last week we announced the new extended security in the latest ownCloud Edition and this week we are excited to announce that ownCloud X will also offer extended performance features/functionalities. One of the key aspects of ownCloud Continue Reading

Anonymity and Abuse Reports

Last Thursday, ProPublica published an article critiquing our handling of some abuse reports that we receive. Feedback from the article caused us to reevaluate how we handle abuse reports. As a result, we’ve decided to update our abuse reporting system to allow individuals reporting threats and child sexual abuse material Continue Reading

Byline: Will Automated Next Gen Cybersecurity be Based on Intent?

Implementing Intent-based Network Security (IBNS) Takes Planning, Consideration, and Incremental Implementation Over the last few months I’ve written about a number of technologies impacting cybersecurity and how in a perhaps idealistic world these security systems can all interact with each other, share information about the devices in our networks, and take mitigating actions, Continue Reading

>