Users of Atlassian’s Confluence collaboration software were warned yesterday to either restrict internet access to the software or to disable it due to a...
Addressing known vulnerabilities remains the best approach to secure your organization, despite a couple of high-profile zero-day attacks dominating news cycles recently.
Overwhelmed by the volume of security intelligence and alerts, human analysts need machine learning to augment and accelerate efforts. Machine learning moves security analytics...
Overwhelmed by the volume of security intelligence and alerts, human analysts need machine learning to augment and accelerate efforts. Machine learning moves security analytics...
The time it takes for a known vulnerability to be exploited by some sort of malware has fallen precipitously in the past three years. From the time that the vulnerability became known, the Slammer worm took six months to hit, Sasser took three weeks, and the Witty worm took two days. One of 2005
Intrusion prevention systems (IPSs) are becoming ubiquitous in the minds of enterprise buyers. However, the problems of intrusion detection systems (IDSs) have not gone away, and many organizations have an overinflated view of these systems. Moreover, the vendors and popular press continue to perpetuate numerous myths around this narrow but useful capability.