Half Sized Blog Element (Single Author Style)

Half Sized Blog Element (Multi Author Style)

3 Big Mistakes In Incident Response

A posting from  DarkReading from there Security monitoring section:  The incident response specialist investigating a recent breach of a government services firm was convinced the attack he was investigating was the handiwork of a group of Chinese hackers. The type of malware he found was commonly associated with that group of attackers, so he concentrated his efforts on cleanup and analysis […]

Is Application Sandboxing The Next Endpoint Security Must-Have?

A posting  from Dark Reading in there Endpoint Security  section :  With the onslaught of zero-day attacks continuing to increase the barrage of unanswered threats against endpoints, there’s a growing contingent of security advocates championing the addition of a virtualized container layer in the endpoint security mix. Analyst predictions are rosy for the virtual containerization […]

3 Big Mistakes In Incident Response

A posting from  DarkReading from there Security monitoring section:  The incident response specialist investigating a recent breach of a government services firm was convinced the attack he was investigating was the handiwork of a group of Chinese hackers. The type of malware he found was commonly associated with that group of attackers, so he concentrated his efforts on cleanup and analysis […]

Is Application Sandboxing The Next Endpoint Security Must-Have?

A posting  from Dark Reading in there Endpoint Security  section :  With the onslaught of zero-day attacks continuing to increase the barrage of unanswered threats against endpoints, there’s a growing contingent of security advocates championing the addition of a virtualized container layer in the endpoint security mix. Analyst predictions are rosy for the virtual containerization […]