Sep 26, 2014
It is often law enforcement that finds evidence of a security
breach first. Being able to respond effectively to breaches can
reflect on an organization's reputation.
There is always malware running somewhere. Some enterprises have Security Response Teams, but many do not. If it is a one-man shop should they be a...
Sep 17, 2014
Malware in its various forms has been around since the start of the computing age, but one platform remains more susceptible to evil code than others with more than 1 million new unique virus signatures discovered each and every day, according to F-Secure.
Also according to F-Secure's Threat Strategist David Perry,...
Sep 12, 2014
Honeypots, used to detect cyber attacks, have been around information security for a long time.
The non-profit Honeynet Project is dedicated to investigating the latest attacks and working to improve the utility of honeypots in today's changing network environment.
In this podcast Vic Wheatman speaks with Gartner VP of...