ips | Page 2


What's going on? Over the past weekend information became available about a previously-unknown vulnerability in all modern versions of Microsoft's Internet Explorer browser that allow an attacker to remotely execute code without the victim's permission. This can lead to compromise of your system and various malware to be installed. The exploit leverages a technique often used by attackers via Adobe Flash to bypass certain features of IE that are designed to prevent remote code execution (RCE). Why is this a big deal? This vulnerability (which... [Read More]
by RSS Richard Henderson  |  Apr 28, 2014  |  Filed in: Industry Trends & News
All too often, cyber space seems a vast and unregulated "Wild West," where anarchy is the norm and criminal justice remains by-and-large a concept rarely enforced. What's more, the Internet cloaks cybercriminals under a blanket of anonymity, where they have the ability to take down international governments and large-scale corporations at the touch of a button from any where in the world. It's no secret that the "lawless" nature of cyberspace has become an accepted status-quo - so much so that high-profile cybercrime, international privacy breaches... [Read More]
by RSS Stefanie Hoffman  |  Jan 30, 2014  |  Filed in: Behind the Firewall
Intrusion prevention system, or IPS, is like the secret ingredient in a favorite recipe -- it is rarely consumed by itself, but most security suites and Unified Threat Management devices wouldn't be considered complete without it. In fact, it's often taken for granted. IPS is a vital component of any comprehensive security solution and a necessary part of a compliance-driven environment. And while it is one of the most traditional security solutions on the market, its features continue to evolve to tackle a maelstrom of modern attacks. Essentially... [Read More]
by RSS Stefanie Hoffman  |  Nov 13, 2013  |  Filed in: Security 101
Once upon a time, Unified Threat Management (UTM) devices were perceived as a simple and relatively basic security tool created to pacify fundamental requirements for mid-sized enterprises and SMBs. And while that more or less remains true, UTMs have also undeniably evolved to meet the growing demands of an increasingly diverse and nuanced market. No doubt Unified Threat Management, or UTM, devices still have a strong and viable presence in the SMB. That said, it should come as little surprise that the same characteristics that generate higher... [Read More]
by RSS Stefanie Hoffman  |  Aug 07, 2013  |  Filed in: Security 101
(This is a continuation from last week, in which we discussed the distinction between big data and security and how they intersect. ) Most know that the there is often a big disparity between theory and reality. And nowhere is that more evident than when big data and security solutions conflict. In fact, big data concepts often translate to challenges when given practical applications. Let’s look at a few examples provided by Ryan Potter, Fortinet director of security strategy. The Challenges of Security Information and Event Management (SIEM) Starting... [Read More]
by RSS Stefanie Hoffman  |  Dec 11, 2012  |  Filed in: Industry Trends & News
[Read More]
by RSS Rick Popko  |  Aug 18, 2010  |  Filed in: Security Research