Half Sized Blog Element (Single Author Style)

Half Sized Blog Element (Multi Author Style)

3 Lessons From Layered Defense’s Missed Attacks

a posting from Dark Reading in there  Vulnerability Management section: Layering security measures typically protects systems better: Research) by three University of Michigan graduate students in 2008, for example, found that using multiple antivirus engines result in much better protection than using a single program. Yet, recent analysis by NSS Labs highlights that layering security devices rarely catches all […]

Gathering More Security Data From Your Endpoints

A posting from Dark Reading in there  Endpoint Security section: Even though many of the most troublesome and advanced threats hitting enterprise networks originate from the endpoint, most organizations today aren’t investing in the same kind of visibility and control over these devices as they spend on network-based controls. This disparity is leaving organizations with […]

3 Lessons From Layered Defense’s Missed Attacks

a posting from Dark Reading in there  Vulnerability Management section: Layering security measures typically protects systems better: Research) by three University of Michigan graduate students in 2008, for example, found that using multiple antivirus engines result in much better protection than using a single program. Yet, recent analysis by NSS Labs highlights that layering security devices rarely catches all […]

Gathering More Security Data From Your Endpoints

A posting from Dark Reading in there  Endpoint Security section: Even though many of the most troublesome and advanced threats hitting enterprise networks originate from the endpoint, most organizations today aren’t investing in the same kind of visibility and control over these devices as they spend on network-based controls. This disparity is leaving organizations with […]