by Jason Pappalexis | Apr 16, 2014 | Blog
Interop is promoted as a technology conference and traditionally has covered a range of interoperability topics, from core infrastructure up to applications. The conference also provides attendees with information on current security trends. This year, keynotes spoke...
by Randy Abrams | Apr 15, 2014 | Blog
As socially engineered malware (SEM) becomes more and more complex, endpoint protection (EPP) products increasingly depend on cloud-based reputation systems to protect users. Both Internet Explorer and Chrome use cloud-based reputation systems to protect users from...
by Jason Pappalexis | Apr 9, 2014 | Blog
Incident response (IR) is a key process designed to provide context, priority, and ultimately, closure for the events associated with an attack. When enterprise defenses falter, an IR process should give the information security (IS) team enough information to...
by Bob Walder | Apr 3, 2014 | Blog
Following publication of our new breach detection systems (BDS) test results, FireEye responded somewhat forcefully in a blog post by Manish Gupta. Not everyone can end up in the top right quadrant of the NSS Labs Security Value Map™ (SVM), so it is not unusual for...
by NSS Labs | Apr 2, 2014 | Press
Four of Six Leading Vendors Receive Coveted NSS “Recommended” Rating AUSTIN, Texas – April 2, 2014 − NSS Labs today released the results and analysis from its first Breach Detection Systems (BDS) Comparative Analysis and Security Value Map™ which evaluated six of the...
by Thomas Skybakmoen | Apr 2, 2014 | Blog
NSS once asked: “Will breach detection systems become the latest security “silver bullet” – or a “white elephant?” Precious Metal Projectile or Pale Pachyderm? To answer this question, we must review the NSS definition of a breach detection system (BDS), as seen in...
Recent Comments