Organisations are increasing their defences but it still isn’t enough to protect against today’s threats
Browsing: Malware and Vulnerabilities
In my post on Measuring and Reporting on Vulnerability Risk, I talked about how rankings and categories make for some easy to understand graphs, but they tend to fail at meaningfully measuring progress over time.
Cisco’s Advanced Services has been performing penetration tests for our customers since the acquisition of the Wheel Group in 1998. We call them Security Posture Assessments
Keanini brings nearly 25 years of network and security experience with companies including Cisco and nCircle
Malicious obfuscated JavaScript has been injected into several pages. The obfuscated code contains an iFrame, which after execution, redirects users to a malicious website.
HP unveiled its new family of HP TippingPoint Next-Generation Firewall (NGFW) appliances to further protect customers from threats introduced by mobile and cloud computing.
Lancope, Inc., a leader in network visibility and security intelligence, will deliver a complimentary webinar on Thursday, Sept. 26 at 11:00 a.m. U.S. Eastern time entitled, “Hunting Attackers with Network Audit Trails.”
Most security professionals agree that we can’t effectively stop malware by blacklisting signatures; the approach used by most antivirus applications.
Security researchers have spotted a surge in attacks against online banking customers, thanks to a new strain of Java-exploiting Trojan Caphaw (aka Shylock).
Cloud-based Platform Brings Behavioural Analysis to Mainstream; Delivers Continuous Coverage of Any User on Any Device in Any Location for Pervasive Protection and Real-time Visibility