Trust and reputation, so the saying goes, take years to build but seconds to lose. When your customers trust you with their confidential and sensitive data and you lose it to a data breach, the costs can be substantial, and how you respond critical to restoring your reputation and reacquiring lost customers. The costs of […]

Hi, I’m Regan Ogner, Head of Global Channel Marketing for Intel Security. Welcome to the first of many blogs designed to connect and share marketing best practices with our partner marketing community. As a long-time channel marketer in North America and three months into my new role for the global channel organization, I can honestly […]

We have all been there! I was carefully applying the sugar frosting onto the mouth-watering blueberry cheesecake to offer it a creamy texture. It was the result of organizing best tips from a minimum of ten recipes on YouTube, when suddenly I heard a yell- “Mom!” I left everything as is (leading to extra frosting […]

DLL planting, also known as DLL side loading, is a popular attack technique today. If we take a look at the list of advisories Microsoft has recently published, it is clear that a large number of vulnerabilities encompass DLL planting. We have seen many targeted attacks that abuse Windows OLE in many ways. At BlackHat USA 2015, an […]

Every year Verizon releases their Data Breach Investigations Report (DBIR), sharing a wealth of information about incidents throughout the year.  Verizon compiles this report with information from 70 organizations (including Intel Security), analyzing almost 80,000 individual incidents, over 2000 confirmed data breaches across 61 countries.  For professionals in the security industry, this information is invaluable […]