Following the disappointment at the failure of the end of the world, we decided to do a little recap on the Project Blitzkrieg that has been widely talked about in the security community over the past couple of months following a report by RSA.
It mi...
Windows 8 has added some new security features such as bundled AV (Windows Defender) but still lacks a robust connectivity and security agent can recognize off network policy and protect against advanced threats.
Webinar Registration Link: http...
It’s an exciting time in the world of retail – and not just because it’s the holiday season. Many retailers appear to be embracing the possibilities that social networking and mobile devices offer. From in store, custom advertising to easy integratio...
Fortinet's FortiGuard Labs Reveals 2013 Threat Predictions
Expected Trends Include Mobile Advanced Persistent Threats, IPv6 Safe Havens and Exploits Through Machine-to-Machine Communications
SUNNYVALE, CA--(Marketwire - Dec 10, 2012) - Fortinet®...
Fortinet 2013 Cyber-Crime Report
The evolution of cyber-crime organizations into well-organized hierarchical operations has increased the level of risk to your network. These organizations rely on a complex network of leaders, engineers, contract...
(This is a continuation from last week, in which we discussed the distinction between big data and security and how they intersect. )
Most know that the there is often a big disparity between theory and reality. And nowhere is that more evident than...
Zitmo Attack Scenario - taken from my slides at ShmooCon, January 2011
Zitmo's attack scenario, taken from CheckPoint's and VerSafe's white paper (Dec 2012)
Recently, Check Point and Versafe published a white paper on a mobile banking trojan they...
One thing that has become clear with modern cloud and data center technologies is the need for a different approach to security. An organization cannot rely on traditional infrastructure products to provide the level of security needed in the clou...