by John Whetstone | Oct 30, 2017 | Blog
Distributed denial-of-service (DDoS) attacks are nothing new, yet these attacks remain one of the most common causes of high-profile outages and interruptions of client-facing services. DDoS attacks are often linked to acts of hacktivism and are perpetrated by...
by Jason Pappalexis | Oct 25, 2017 | Blog
Readers of classic science fiction will likely recognize the reference to Robert Heinlein’s 1950s novel. In this futuristic tale, the characters must use a tunnel between Earth and an unfamiliar (and inhospitable) planet in order to take a survival test. The novel has...
by Jason Pappalexis | Oct 23, 2017 | Blog
The 25 (SMTP), 80 (HTTP), and 443 (HTTPS) ports are widely utilized and form the core of business communication. By design, these ports are open across perimeter firewalls. However, this clear line of sight from the dark alleys of the external world to the safe haven...
by NSS Labs | Oct 19, 2017 | Press
4 Products Receive Recommended Rating; 1 Receives Neutral Rating; 1 Receives Security Recommended Rating; 1 Receives Caution Rating AUSTIN, Texas – October 19, 2017 – NSS Labs, Inc., a global leader and trusted source for independent fact-based cybersecurity...
by Jason Pappalexis | Oct 16, 2017 | Blog
The volume of log and alert data from just a small number of security products can easily overwhelm a security team—even a well-funded one. “Alert fatigue” is real, and so data consolidation is helpful, not only for timely content consumption, but also to determine...
by NSS Labs | Oct 12, 2017 | Press
Findings Provide Insights for Enterprises Adopting Dual-Browser Strategies AUSTIN, Texas – October 12, 2017 – NSS Labs, Inc., a global leader and trusted source for independent fact-based cybersecurity guidance, today announced the release of its Web Browser Security...
by Jason Pappalexis | Oct 9, 2017 | Blog
Breach detection systems (BDS) are physical devices, virtual appliances, cloud services, or managed services that utilize both static analysis and behavioral analysis techniques to detect advanced malware, zero-day attacks, and targeted attacks that have bypassed a...
by John Whetstone | Oct 4, 2017 | Blog
Some might say that if marketing departments and encryption have anything in common, it’s the ability to obfuscate a message. A perfect example of this is the term “cloud”—surely one of today’s most overused and abused terms. You can’t turn on the television or go...
by John Whetstone | Oct 2, 2017 | Blog
Intrusion prevention systems (IPS) analyze network packets for exploits, protocol irregularities, and security policy violations. When an event is detected, the IPS sends an alert and relevant log information for security operations teams to review and act on. The IPS...
Recent Comments