14 posts from September 2012

September 28, 2012

Share:
  • Tags:
  • Permalink
  • Comments (0)
Share:
  • Tags:
  • Permalink
  • Comments (0)

September 26, 2012

The European Agency Network Information Security Agency (ENISA) warned today that antivirus programs only work to prevent 30% of attacks and instructed companies to be more diligent about protecting themselves. “Antivirus only works in 30%...Read More
Share:
  • Tags:
  • Permalink
  • Comments (1)

September 21, 2012

Incapsula examined 200M web sessions across 3,000 to identify the origin of web attacks. It's a very cool graphic and overview.Read More
Share:
  • Tags:
  • Permalink
  • Comments (0)

September 20, 2012

Imperva's Tal Be'ery has an interesting and positive perspective on Google's acquisition of VirusTotal which was published in SecurityWeek. Here's the thesis: In buying VirusTotal, Google provided itself with an access to a community based...Read More
Share:
  • Tags:
  • Permalink
  • Comments (0)
Today, we released our latest Hacker Intelligence Initiative report, A Comprehensive Guide to DDoS. This month, we took a comprehensive look at DDoS--including the latest trends, technologies and techniques. Anyone concerned about DDoS--which is just...Read More
Share:
  • Tags:
  • Permalink
  • Comments (0)

September 12, 2012

After seeing the Dark Reading article, What the IPS Saw, the question came up was, 'What Didn't the IPS See?' Why? The billions upon billions of data points they collected contained one glaring gap: the...Read More
Share:
  • Tags:
  • Permalink
  • Comments (0)

September 11, 2012

Last week, we blogged quite a bit on the Apple UDID-FBI news. We were right that in fact the IDs were not a hoax, as some had purported. However, the real lesson from the breach...Read More
Share:
  • Tags:
  • Permalink
  • Comments (0)

September 10, 2012

Sunday's New York Times op-ed warns us about the growing use of offensive vs defensive cyber security capabilities. This article actually got it wrong. For years, emphasis has been put on developing attack capabilities rather...Read More
Share:
  • Tags:
  • Permalink
  • Comments (0)
Great perspective from our own Tal Be'ery on managing Java vulnerabilities.Read More
Share:
  • Tags:
  • Permalink
  • Comments (0)