The “Solera DeepSee BlackBox Recorder" continuously captures all network traffic—including packets, flows, files and applications, and helps incident responders pinpoint the root cause and material impact of a breach.
Internet security firm Check Point Software Technologies Ltd. launched a new low-cost series of security appliances designed to provide enterprise-class security in a compact desktop form factor idea for branch and remote offices.
NetIQ released updates its Change Guardian product, which now has the ability to detect and respond to potential threats in real time through intelligent alerting of unauthorized access and changes to critical files, systems, and applications
What if you could automatically be recognized as secure because of the DNS? In other words, what if you could put your certificate into the DNS? What if you could turn on a Web browser and be secure right out of the box, without application vendors having to install certificates?
The challenge is how to give users the full advantage of their mobility platform of choice without introducing risks to the business. A key part of that challenge is enabling flexible mobile security options depending on the device and use case
What happens when a lack of control over the technologies on which trust is built means you can no longer trust them? Take a look, for example, at our reliance on cryptographic keys and digital certificates—technologies that were once thought of as intrinsically trustworthy.
If I have to sit through another presentation on information security that opens with the canned two or three slides peddling FUD, I’m going to launch myself across the table and unleash my own brand of FUD on the speaker. It’s not the bad guys who are winning, it’s the alarmists.
Measuring security posture is hard, but is being done by many network security teams. Of course, once you have meaningful measurement of your situation, you begin to pick up all kinds of bumps in the road you couldn’t even detect before.
One of the challenges with deploying a sandbox-only solution to deal with malware is that attackers are making it their job to understand security technologies, how they work, where they are deployed and how to exploit their weaknesses.
Quality not quantity is the most important attribute of a cyber security team. In order to provide a robust team capable of supporting 24x7 or even 16x5 coverage, a team of specialists is paramount to securing any infrastructure.