This year at Infosecurity Europe, Lancope surveyed conference participants on the state of cyber security.
Browsing: Forensic
The simple fact of the matter is public agencies feel that they can stem this tide of circulation though the use of conventional tracking methodologies,
These are things we know that we know. There are known unknowns. To say, there are things that we know we don’t know. But there are also unknown unknowns.
Malware called Gameover, Zeus, GOZeus, or P2PZeus has been created by Cyber Criminals and is in active circulation as of June 2014
Not only was this document release with complete access to its content accommodating any manipulation, but within 1 hour of being released it was hacked
What if Mother Nature was the CISO? What strategy could she give the prey species so they could survive in the presence of many predators?
It proves some people should think before they expose ‘your’ chips to allowing viral code impact operations.
Network Access Control (NAC) is one of the longest standing and most effective security technologies in the industry.
The advent of successful Cyber Crimes has driven their increased focus upon CSIRT, First Responder Capabilities, and the application of Digital Forensics.
The Windows XP debate is an interesting one, and when one considers there are significant numbers of clients still installed