You Are Browsing ‘Security ’ Category

Comments Off on Apple Patents Tech to Foil Concert Pirates
(Source: TechNewsWorld) "The camera is integral to so many applications -- from banking to expense systems," remarked Peter Tran, general manager of the Advanced CyberSecurity...
Comments Off on Safeguarding Against Colluding Mobile Apps
Have you heard of mobile app collusion? Seemingly benign apps are working together to execute attacks.  Read this solution brief from Intel Security to learn more about how to protect against mobile app collusion. ...
Comments Off on Safeguarding Against Pinkslipbot
W32/Pinkslipbot is a self-propagating malware family created to steal personal and financial data from its victims. This malware allows complete control of infected systems through a command-based backdoor operated by the control server as well as a virtual network computing-based backdoor. Pinkslipbot can also spread to other systems within the environment through network shares and can communicate to its control server to download updated versions o...
Comments Off on Threat Defense Isn’t Just About Protection
Endpoint defenses shouldn't just spot trouble—they need to respond quickly and remediate threats fully. Learn why integration is essential for intelligent endpoints. ...
Comments Off on Building Resilience in a Digital Enterprise: Transforming From Compliance to Risk Management
Organizations are looking to embed security into the culture and enterprise architecture of the business to ensure its resilience for the long term and reap the benefits of the current revolution. Building a strategy for resilience by growing capability towards a trusted level will help ensure sustained business continuity in the face of any threat. ...
One of the most serious security challenges facing enterprises today is that of the insider threat. The Intel Insider Threat Field Guide was designed to help enterprises better understand insider threats and take steps to minimize the associated risks. ...
Comments Off on Disrupting Targeted Attacks Solution Guide
In early 2015, an Intel® Security survey of incident responders at 700 organizations uncovered the hurdles and opportunities facing investigators of targeted enterprise attacks. This solution guide highlights the findings, addresses the challenges, and provides several solutions that help unify the Protect, Detect, and Correct stages of managing threats. The goal is to build a comprehensive security model to more efficiently combat targeted attacks. ...
Comments Off on Busted: Seven Myths of Advanced Malware
Advanced malware is the catchall term for the most sophisticated, evasive, destructive, and ever-evolving cyber threats. Fed by lack of understanding and anxiety―and sometimes perpetuated by security vendors―a number of misconceptions have arisen concerning this cyber menace. This guide will examine seven common misconceptions and distinguish between myth and reality. ...
Comments Off on SuperCom Group Awarded Key Patents for Cyber and Data Security
(Source: Yahoo Finance) Our portfolio of 20 patents and 15 pending patent applications cover a wide range of innovative and cutting-edge Cyber and Data Security solutions providing us ......
Comments Off on DevOps a black hole for security
(Source: ComputerWeekly.com) Businesses' shift towards a DevOps approach that combines application development and deployment is a growing challenge to security, says security firm ......