The landscape has shifted. Security is no longer something your organization can have complete control over. In this video, John Strand will demonstrate how most large corporations can be compromised in moments, even without phishing.
He will then discuss how many attackers are moving away from exploits and malware. In light of this, how do we detect attacks? How do we react? Are there any products to help us? Is it time to panic? Yes, yes it is.
Posted on 21 October 2014. | Multiple banks say they have identified a pattern of credit and debit card fraud suggesting that several Staples Inc. office supply locations in the Northeastern United States are currently dealing with a data breach.
Posted on 15 October 2014. | Lynis unearths vulnerabilities, configuration errors, and provides tips for system hardening. It is written in shell script, installation is not required and can be performed with a privileged or non-privileged account.
Posted on 14 October 2014. | Enabling employees and contractors to bring their own devices to work has become a way of life for many organizations. Many understand that traditional perimeter security defenses are not effective at identifying attacks on mobile devices.
Posted on 13 October 2104. | Designed for IT and security professionals, the service gives a view of the data exchanged with partner and cloud applications beyond the network firewall. Completely passive, it runs on non-production systems, and does not require firewall changes.