Modern cyberattacks and APTs (advanced persistent threats) have quickly become a top priority for both security practitioners and C-level executives, and for good reason.
Hi, what are you looking for?
Modern cyberattacks and APTs (advanced persistent threats) have quickly become a top priority for both security practitioners and C-level executives, and for good reason.
The problem of tackling Unknown Threats at Scale and the Gulf Between the Proof of Concept and the Real World are Not Unsolvable Problems...
Two weeks ago, hackers were able to compromise the password of the Associated Press Twitter account, allowing the hackers to send out fictitious tweets...
Java has been a very hot topic for security managers this year due to a steady stream of 0-day Java vulnerabilities that have been...
Security Evasion and Customized Malware Has Become Mainstream for Attackers of all Skill Levels...
Last week Mandiant released a powerful report that exposed what certainly appears to be a state-sponsored hacking initiative from China, dubbed by Mandiant as...
Last week Google announced the details of the third iteration of Pwnium, Google’s contest where it gives cash to security researches who can demonstrate...
The Internet has made virtually any information accessible to someone who is determined to find it. This is great when you need to quickly...
It’s no surprise to anyone practicing security today that the threat landscape has grown increasingly complex. Modern attacks weave together exploits, malware, applications and...
Its no secret that modern data centers are in the midst of an ongoing period of very dynamic evolution that has fundamentally changed the...
Last week, Microsoft released the latest Microsoft Security Intelligence Report (SIR), which provided some interesting empirical insight into malware and how it is distributed on...
When Defending Against Today's Threats, It's Important To Know If a Particular Security Solution Is Ready For The Front Llines of The Network.