When Google announced that they would be penalizing the ranking of web sites that did not support the HTTPS protocol, a lot of people started to pay attention to, and started learning about, the HTTP and SSL protocols. Today, if you compare web hosting companies, the options and fees for SSL certificates are prominently displayed...
Carsten Willems, the CEO & co-founder of VMRay, has been developing malware detection sandboxes for many years. During that time, he has seen many different approaches, each with their inherent flaws or limitations. However, his latest VMRay Analyzer uses an agentless hypervisor approach that is both fast and very difficult to be evaded by malware....
Just about every enterprise and organization today has in place a large assortment of security devices, software, and procedures to respond to security threats. What they are often lacking, however, is enough trained security personnel to execute the necessary actions. What they are really lacking is time – and when it comes to responding to...
It is no secret that the use of open source software components is growing at a very rapid pace. This is true for both young startup companies as well as established enterprise developers. The developers that incorporate these open source components need to somehow stay on top of the many licensing issues and security vulnerabilities...
Most efforts at security today focus on keeping out the “bad guys” and building strong walls to prevent attackers from getting within reach of sensitive corporate assets. However, what happens if attackers do manage to break through the various barriers? What if the attackers are already legitimately inside the corporate rings of defense? Most security...
The IEEE is the world’s largest technical professional organization for the advancement of technology and its Computer Society is the largest society within the IEEE. The fields of interest of its members cover all major areas of computing and information technology, including computer hardware, software, multimedia, IT, security, networking, mobile computing, and other areas. Two...
BeyondTrust is convinced that the greatest cause of enterprise data breaches is the fact that users abuse the privileged level of access permission given to them, i.e. admin or root access. Sometimes this abuse is malicious and sometimes it is accidental – but it is always a bad thing. The BeyondTrust platform and tools address...
While there is no question in anyone’s mind that companies must provide increased amount of security training to their employees, it is not always obvious what is the best way to do that. In this interview, Kurt Wescoe, the Chief Architect at Wombat Security Technologies, explains his company’s specific approach to security training. Their methodology...
Let’s be honest – how many of us think about security risks as we race into a coffee shop to check our email or the latest sports scores? Unfortunately, there are a lot of bad guys out there who know the answer to that question. They are waiting to take advantage of the situation and...
Most of us are too busy having fun on social media to recognize the many dangers that lurk there. We have gotten into the habit of sharing everything, which could easily lead to significant information falling into the wrong hands. This is true both for our personal information as well as for confidential company information....