Tripwire Survey Finds that 40 Percent of Retail and Financial Organisations Need Two to Three Days to Detect a Breach
Browsing: Malware and Vulnerabilities
As our research team reveals in our Hacker Intelligence Initiative Report, some APTs are relatively simple to execute
Unlike the traditional ‘stop-start’ approach to vulnerability management driven by snapshot scans, continuous detection and mitigation of vulnerabilities
The fact that this vulnerable version of OpenSSL has been around for more than 2 years, many services and their related data have been vulnerable.
By now, you are probably aware of the Heartbleed Bug. There are many people who have heard about it, but don’t understand what it is.
We all use signatures. Signatures here, signatures there. They grant authenticity and trust, among other things, or at least they’re supposed to.
CipherCloud, the leader in cloud information protection, expands its Discover, Protect, Monitor platform with CipherCloud for Cloud Discovery.
Despite the increased share of phishing attacks on online stores, the most frequently attacked category of organisation was still social networking sites
Our estimate suggests that criminals could penetrate three quarters of the U.S. corporate world using unpatched Windows XP vulnerabilities.
Websense, Inc. is a global leader in protecting organisations from the latest cyber attacks and data theft.