Should I Really Trust the Cloud with my Endpoint Protection?
The radical shift in the scale and economics of cybercrime calls for an equally radical change in how IT protects user systems. Whether…
The radical shift in the scale and economics of cybercrime calls for an equally radical change in how IT protects user systems. Whether…
BUSINESS PERSPECTIVE *Excerpt from Solution Spotlight: Next-Generation Endpoint Security. Authored by Rafal Los, Director of Solutions Research, Optiv. The topic of corporate endpoint…
When you’re in charge of protecting not only your company’s critical business information, but also that of your company’s customers, there’s no…
Alex Stamos, formerly with Yahoo and now CSO at Facebook, gave a really interesting talk at AppSec California 2015 recently titled "AppSec…
Recently, I discovered a vulnerability in QEMU's virtual Floppy Disk Controller (FDC), exploitation of which may allow malicious code inside a virtual…
Today, CrowdStrike disclosed a critical virtual machine escape vulnerability (which we named VENOM) discovered by our Senior Security Researcher Jason Geffner. VENOM…
When your network gets breached – and I do mean when and not if – the first question that needs to be answered is whether the…
Can you believe that the 2015 RSA Conference starts in just a couple of days? Whether you’re flying in for a full…
April is an unbelievably busy month for IT security professionals. In addition to daily online combat with bears, kittens, pandas, and other…
If the Target breach was the wake-up call to the retail sector that cyber security was no longer just an abstract threat…