Starting with Firefox DevEdition 46, developers will be informed about this privacy and security risk by displaying a lock with a red strikethrough when passwords are requested on non-secure pages. [Read More]
Intel Authenticate is a hardware-enhanced, multifactor authentication solution that strengthens identity protection on the PC, making it less vulnerable to identity and security credential attacks, the company said. [Read More]
New Check Point 15000 and 23000 Series appliances are designed for large enterprise and data center networks, and include integrated firewall, IPS, Application Control, AV, AnitBot, URL Filtering, sandboxing. [Read More]
Threat intelligence has little value unless it is put into context of an organization’s security posture. Most enterprises don’t have the resources to apply the required logic to correlate external threat data with their internal security intelligence.
The investment in access certifications have reduced the workload on IT, but by treating all entitlements and users the same, we’ve put the burden on LOB managers to manage the risk of excessive access.
DLP provides a range of business benefits, including compliance support and intellectual property protection. The concept isn’t a new one, but the ability to put it to use in an easier, more viable manner is.
After designating 2014 as “The Year of the Mega-Breach,” the security community hoped to bring awareness to the challenge of protecting customer data. As it turns out, the breaches of 2015 make the previous year’s ones pale in comparison.
Specific malicious payloads, URLs and IP addresses are so ephemeral that they may only be used once in the case of a true targeted attack. Intelligence should make you better prepared to evaluate and solve new problems that you haven’t encountered before.