When companies relied on the static analysis of binaries to determine whether a program is malicious, attackers came up with a simple way to bypass defenses: obfuscating the code with packers and other techniques.
Browsing: CISO
Several statistics gathering engines on the web reveal an interesting picture. Content management systems (CMS) have become far more popular in the last couple of years.
This whitepaper by Portcullis Labs discusses a number of attack vectors for SSL and TLS, offering real world examples where it can.
Please click on the image to download your FREE copy now.
Vendors such as Juniper Networks that are open sourcing their SDN controllers are pursuing a poor strategy that misses the point of the technology, HP representatives said this week.
In our interconnected world we all rely together on the stable operation of a single global infrastructure. The ability of ports in Europe to service ocean-going vessels impacts consumers in America.
A study from Tripwire and the Ponemon Institute has revealed that many of the world’s largest enterprises are not prepared for the new European Union Directive on cyber security
As the UK government announces a new cyber defence reserve force, IT Governance Ltd is welcoming the new version of the ISO/IEC 27001 information security standard,
Social media has become a top target of hackers and mobile devices are expanding that target, IBM reported on Tuesday in its X-Force 2013 Mid-Year Trend and Risk Report.
Mobility has changed the business workforce landscape; however, because the concept is still so new to the industry
Keanini brings nearly 25 years of network and security experience with companies including Cisco and nCircle