- Tools 10 Information Security Mistakes: A False Sense of Security
Ten practices that create false security: capturing logs without sufficient detail, policies no one follows, vulnerability scans without remediation processes, pen tests excluding workstations,...
- Social Networking Predicting 2011 Information Security Trends
- Social Networking Antivirus Vendors Consider Facebook Activity Protection
Antivirus vendors are experimenting with Facebook apps (Norton Safe Web, BitDefender Safego) that review links shared on users' walls for malware. These run on vendor infrastructure using Facebook's...
- Malware 5 Common Malware Infection Approaches
Five common infection vectors: client-side exploits (browser, PDF, Office), server-side network vulnerabilities, social engineering to trick users into installing malware, propagation via USB drives...
- Malware Honeypots as Part of a Modern IT Infrastructure
Honeypots are decoy systems designed to be attacked. They slow intruders, decrease false positives (any connection is suspicious), capture malware samples, and reveal attacker intentions. The main...
- Malware Key Challenges of Combating Malware in the Enterprise
Enterprise malware defense is harder than single-host protection due to diverse business needs preventing consistent controls, geographic dispersement creating visibility gaps, political complexities...