X-Force February 27, 2015 Adware Adds to Security Headaches 7 min read - Over the past few days, we have seen a security incident involving adware explode in the press. Repair, however, starts with conscious decisions.
October 20, 2014 POODLE Attack Packs a Bite 2 min read - The innocuously named POODLE attack disclosed by security researchers at Google this week demonstrates the dangers of supporting obsolete technology.
Endpoint September 25, 2014 You Want to Plug What in? 5 Tips for Evaluating IoT Devices 3 min read - Personal Internet-connected electronics, designed primarily for home use, are rapidly finding their way into the enterprise. IoT is coming, are you ready?
Software Vulnerabilities June 13, 2014 The Pitfalls of Reusable Code: OpenSSL 4 min read - What happens when a widely-used common library, such as OpenSSL, has vulnerabilities? Thoughts on how incidents such as Heartbleed can occur.
Mainframe May 14, 2014 Heartbleed vs. Heartblead: Why IPS Pattern Matching Makes for Poor Security 2 min read - Think you are covered after the Heartbleed breach? Think again. Is a false sense of security any better than no security at all? As seen in the recent ICS-CERT/FBI recommended Heartbleed protection signatures, intrusion prevention systems (IPS) relying solely on…
Intelligence & Analytics April 10, 2014 How Security Intelligence Helps Reduce the Impact of Heartbleed Vulnerability 4 min read - Discussions about the ramifications of the Heartbleed vulnerability are currently taking the Internet by storm. Learn how a proper application of security intelligence tools can help reduce the cost and impact of these kinds of issues in the enterprise.
Fraud Protection August 22, 2011 Ramnit Evolution: From Worm to Financial Malware 3 min read - Over time, the Ramnit worm has morphed into a financial malware — or is at least being used as a platform to commit financial fraud.
Banking & Finance November 16, 2010 Financial Malware Uses Configuration File to Target Enterprise 3 min read - Zeus is known to target members of financial institutions. However, this malware also uses a configuration file to steal from enterprises.