Network Administrators Are Not Just the Protectors of the Organization – They Are Also the Most Valuable Targets
Hi, what are you looking for?
Network Administrators Are Not Just the Protectors of the Organization – They Are Also the Most Valuable Targets
Keeping pace with the increasing sophistication of cyber attacks can often seem like a Sisyphean task. Attackers have a constantly evolving arsenal of malware...
Hacking and data breaches have become a painful reality for businesses of all sizes and from all industries. Attackers have perfected the art of...
For several years now, cybercrime in the financial sector was synonymous with banking botnets such as Zeus and Carberp. By and large, these malware...
The Security Revolution Will Be AutomatedInformation security teams have the largely thankless responsibility of simultaneously keeping pace with trends in enterprise computing as well...
By Penetrating the Browser, Man-in-the-Browser Malware Can See Virtually Everything that an End-user Can See
Information security is a big topic with a lot of disciplines, and hardly anyone is an expert in all of them. The good news...
Organizations Need to Ensure That They Don’t Just Buy Security Products, but Actually Empower the Security Organization...
The Long Tail of Data Breaches
Threats, Security Operations, and Scale
As part of my job, I spend a good deal of my waking hours thinking about information security and sharing my findings with IT...
Recent reports in the media are detailing how various government, media and technology companies in Japan and South Korea were victims of a new...
Advanced Persistent Threats (APTs) have forced organizations to reevaluate their approach to security. But the adaptive nature of APTs requires much more than a...
The influential journalist H.L. Mencken famously waxed poetic about news reporting, describing it as being “the life of kings.” However, Mr. Mencken’s comment was...
If Controlling Mobile Malware Isn’t on Your Radar, it Definitely Should Be...
Modern cyberattacks and APTs (advanced persistent threats) have quickly become a top priority for both security practitioners and C-level executives, and for good reason.
The problem of tackling Unknown Threats at Scale and the Gulf Between the Proof of Concept and the Real World are Not Unsolvable Problems...
Two weeks ago, hackers were able to compromise the password of the Associated Press Twitter account, allowing the hackers to send out fictitious tweets...
Java has been a very hot topic for security managers this year due to a steady stream of 0-day Java vulnerabilities that have been...