These days, one-seventh of the world’s population is on Facebook and hundreds of millions are on LinkedIN, Twitter and YouTube. For a business, that’s nothing short of a gold mine, and, as such, most organizations have jumped onto the social media ba...
The concept has been around since the dawn of time: Criminals steal something valuable to the victim, forcing them to hand over money, information or other coveted items to get it back. Ransomware applies this concept to cyber space. By definition, i...
Protecting against malware attacks armed with advanced malicious threat technologies requires much stronger network security threat prevention that just looking for static viruses that match a signature. It requires an intelligence-based structure th...
This solution brief describes how Fortinet's NGFW technology offers identification and control of applications running over your network, an integrated intrusion prevention system (IPS) with deep packet scanning capabilities, and the ability to ve...
If you're looking to create a comprehensive approach to network security that includes everything from your mobile workers and remote offices to your headquarters and data centers, you'll need a security platform that is powerful, easy to manage an...
February 1st is National “Change Your Password Day.” … Well, maybe not, but it should be, according to Gizmodo, and there are plenty of reasons why.
Most people know they should apply unique passwords, replete with a complex mix of alphanumerics and...
Webinar Registration Link: http://goo.gl/BfuIJ
Starting out as simple denial of service assaults launched from a single computer, DDoS attacks have emerged with the proliferation of botnets and evolved into one of the most significant and prevalen...
A friend and fellow security practitioner forwarded me the following survey - the Third Annual Benchmark Study on Patient Privacy and Data Security. He happens to be in the hospital at the moment and couldn't help to feel a little uncomfortable with...
The number of organizations denying personal device access to their network is on the downswing, as predicted here in a recent blog by Kevin Flynn.
Gartner reports 70 percent of respondents in a December 2012 survey are planning to implement bring-y...
I recently came across an Android malware sample that does your usual data stealing i.e. leaking data from the victim's phone such as the phone number, contact information etc.
Most vendors name this sample Uranico (Android.Uranico, Trojan:Android/U...
Managed services are big, and they’re only going to get bigger. Gartner predicts public cloud spending will reach more than $207 billion by 2016, and Frost & Sullivan places the global managed security services market at $7 billion, sporting an 1...