Malware Attack and Detection is a Cat and Mouse Game

Malware outbreaks have several characteristics: First, the vulnerabilities that are being used are 0-day or n-day exploits on commonly used software. The widespread use of these commonly used software means there are lots of potential targets. Because not everyone may patch their software in a timely manner, there are many unpatched systems on the network….

2017 Security Trends

Enterprise Security In enterprise security investment, more emphasis has been put on post breach detection and incident response for this passing year. We will see this trend continue in 2017. Technologies in the area of breach detection, data leak protection, remediation, and so forth, are focusing on the full cyber kill chain rather than an…

2016: New Opportunities for Security in SDN, Cloud, Data Centers and Container Technology

Security continues to be top of mind for businesses as we head into 2016. The continued adoption of cloud and virtualization technologies has resulted in new security concerns and new opportunities for security companies to address them: Security Demands will Drive SDN Adoption SDN has been picking up steam in enterprises. It enables creation and…

Reflections on the Excellus Breach

Today’s hackers harness numerous advanced attack strategies to get past traditional security solutions, including multi-vector attacks that exploit multiple security vulnerabilities, metamorphic and polymorphic malware that changes itself continually, and zero-day attacks that target newly discovered security flaws. Traditional firewall solutions fail to capture and stop today’s sophisticated attacks.Todays IT security focus on the perimeter,…