For me, perhaps the biggest highlight from VMworld last week was the announcement of our new capabilities for the Server Security Suites – a project that my team has been ingrained in for a while now,...
At the AVAR conference in November, with the help of coauthor and independent security researcher Song Li, we will present our findings of an emerging mobile threat vector.
We have found that in a group...
So far, 2014 has been a tumultuous year for the security industry. We’ve seen thousands of computers taken hostage through ransomware—malicious software that encrypts and locks data until the victim...
Stay connected to the latest security news and catch up with the industry’s major players. Our experts cover a broad spectrum of useful security information including in-depth analysis, interviews, and best practices.
Six months after the fact, Heartbleed continues to make news. Many websites are still vulnerable to the Heartbleed exploit and their stolen data has appeared in the online black market. Lists of vulnerable or unpatched websites have also appeared in the black market, and cybercriminals are taking aim. These challenges were recently covered in McAfee’s […]
Advanced evasion techniques (AETs) have developed quite a reputation in the information security sector, given their ability to disguise advanced persistent threats (APTs) and stealthily siphon out data. Although AETs have been active security threats for quite some time, several misconceptions remain. In an effort to dig deeper into how these threats are passing through […]
Cloud computing is a growing trend for organizations of all sizes, and many enterprises are adopting it — but what does this shift to the cloud mean for their security? While the appeal of cloud options is obvious in terms of efficiency and scalability, security issues have triggered some (much deserved) hesitancy among information security professionals. The challenges […]
A busy week at the Intel Developer Forum has just come to a close. Over the course of three (somewhat) sunny days in San Francisco, we got a chance to see what the developers, makers and creators of today’s technologies have in store for the upcoming year. Just in case you didn’t get a chance […]
If there’s one term that can make a CISO squirm whenever mentioned, it’s “Shadow IT.” After all, when tasked with securing an enterprise-scale network, most CISOs frown on business units and employees procuring their own tech solutions — like Dropbox, Flickr, or Gmail — without notifying IT for proper vetting. But that discomfort isn’t stopping […]