IDC is reporting again that Fortinet has the top market share in security appliances - This is great news for Fortinet researchers and customers alike.
Here at Fortinet, we’ve been talking a lot about handoffs recently. Handoffs of data between modu...
Sony is only the most recent of the major corporations with dedicated security teams to get hacked. Bottom line, nobody is immune to emerging threats.
2014 has earned itself the dubious distinction of becoming “Year of the Data Breach”. It’s not a...
Just about everyone has a firewall of some sort. But does it really need to be “next gen”?
Gartner and other industry analysts have made a lot of the “Next Generation Firewall” market, or NGFW for short. It isn’t just hype, though. Threats faced by...
K12 has its share of security and regulatory challenges, but higher ed takes things to a whole new level.
Last week I wrote about some of the security challenges K12 schools face, most of which revolve around balancing regulatory requirements, Inter...
If our kids spent as much time studying as they do bypassing firewalls, we’d be cranking out Rhodes Scholars left and right.
I spent several years as one of those all-too-typical public school tech guys. I taught math and science most of the time an...
Normal Java JAR or class format samples can be easily analyzed with Java decompiler tools, such as JAD and JD-GUI. Not so with those obfuscated ones, where decompiling results may be empty or not clear. When this happens, we need to then analyze the...