Malware June 4, 2015 Detecting and Analyzing Kernel-Based Malware 3 min read - The intricacies of kernel-based malware make it difficult for security teams to identify potential problems, but the task is not impossible.
April 16, 2015 Bee in Your Botnet: AAEH Disrupted by Law Enforcement Sting 2 min read - A joint international task force has disrupted the Beebone botnet (AAEH), but are users really safe from this type of polymorphic malware?
Advanced Threats April 9, 2015 Top Security Myths That Could Leave Your Organization Vulnerable to an Attack 5 min read - These four pervasive security myths may keep organizations from moving to the higher level of security maturity that is needed to fight today's attackers.
March 17, 2015 Google Researchers Develop Exploits for DRAM Rowhammer Hardware Bug 2 min read - Security researchers at Google have found a way to reliably exploit a serious hardware bug that is present in many laptop devices.
Endpoint August 13, 2014 Stolen Password? How to Not Be the Next Victim of Corporate Password Theft 3 min read - Although many organizations have a policy that prohibits reusing corporate credentials on third-party sites, these password rules are hard to enforce.
Malware July 29, 2014 Citadel’s New Trick: Persistent Device Remote Control 3 min read - Citadel, a type of malware, can now persistently have remote control of devices, which is an advanced threat that can affect many victims.
Mainframe June 25, 2014 Security Is a Team Sport: A Case for Cooperative Defense in Depth 3 min read - A strong defense against advanced persistent threats relies on cooperative Defense in Depth.
CISO May 23, 2014 What’s Top of Mind for CISOs? 2 min read - A look at today's hottest security topics and what was top of mind with CISOs in 2014, including their unique insights about the specific challenges and the innovative ways their organizations are approaching today's evolving threats.
Endpoint May 21, 2014 Future of Endpoint Protection: 3 Must-Have Requirements 4 min read - Today's rapidly evolving threat landscape requires advanced, intelligent endpoint protection to prevent APTs and zero-day attacks. Here are three must-have requirements that every organization needs in their endpoint security solution to protect against advanced threats.
Mainframe May 15, 2014 Detection Is NOT the New Prevention 5 min read - What does it take to stop today's extremely motivated and well-trained cyber attackers? Is prevention pretty much dead? Is rapid detection the new prevention? There has been a dangerous shift recently in the prevailing wisdom of the security industry that…