Posts Tagged 'security management'
The practice of using maliciously signed binaries continues to grow. Digitally signing malware with legitimate credentials is an easy way to make victims believe that what they are downloading, seeing, and installing is safe. That is exactly what the malware writers want you to believe. But it is not true. Through the use of stolen […]
Cybercriminals have fully embraced ransomware. This specific form of malware encrypts files and extorts money from victims, and is a favorite among criminals. Ransomware is easy to develop, simple to execute, and does a very good job of compelling victims to pay to regain access to their precious files or systems. Almost anyone and every business is a potential […]
Malware development continues to remain healthy. Intel Security Group’s McAfee Labs Threat Report: August 2015 shows malware’s quarterly growth at 12% for the second quarter of 2015. The overall count of known unique malware samples has reached a mesmerizing 433 million. Oddly, this confirms a very stable trend. For many years malware detection rates have […]
For the fourth year in a row, McAfee landed in the leader’s quadrant of the Magic Quadrant for Security Information and Event Management (SIEM) report, published by Gartner, Inc. The annual report, which came out in late July, evaluates vendors who offer SIEM products on both the ability to execute and completeness of vision. The […]
This is the third of three parts about root of trust and the Internet of Things. In Part 1 and Part 2, I covered how root of trust is an important approach to managing risk in virtualized network—especially compliance risks. The first two posts in this series examined several reasons to consider root-of-trust technologies. In […]