IT Trenches:

threats

1

August 26, 2010  6:08 PM

Online devices, applications and threats grow – predictions for 2013



Posted by: Troy Tate
analysis, application, application development, application management, Cisco, device management, information security, mobile devices, mobility, social networking, threats, trends, vulnerability, vulnerability assessment

The Cisco 2010 Midyear Security Report shows some staggering statistics about the number of online devices, mobile applications and security threats projected to be around in 2013.

  • In 2007...

August 28, 2009  4:21 PM

BlackHat USA technical presentations available online – not just for hackers



Posted by: Troy Tate
antivirus, blackhat, bootkit, Database, Development, education, hacker, information security, infosec, least user authority, least user privilege, malware, research, rootkit, threats, vulnerabilities

The media archives have now been posted on the BlackHat website from the BlackHat technical conference held in July 2009. This is the place to go if you want to see some of the latest information security...


August 14, 2009  12:48 PM

Bootkit – rootkit – malware bypasses disk encryption!



Posted by: Troy Tate
antivirus, blackhat, bootkit, hacker, least user authority, least user privilege, malware, research, rootkit, threats, vulnerabilities

If you have not been nervous before about someone infecting computers without your knowledge then you should be much more nervous after reading this article. In 1987 the Stoned boot sector virus came out and was one of the...


May 7, 2009  7:33 PM

Is unified threat management defense in depth?



Posted by: Troy Tate
Defense in Depth, exploits, information security, information security management, Midmarket security, Security, Single Point of Failure, threats, Unified Threat Management, UTM, vulnerabilities

An ITKE poster recently asked a great question.

Experts tout unified threat management appliances as an ideal antimalware, intrusion prevention and content filtering firewall for midmarket companies. But doesn't this counter the long-standing security practice of defense-in-depth? With...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: