The majority of companies have been able to install preventative tools such as intrusion prevention systems and antivirus software to help protect against malware, but those tools are usually not an end-all solution. The key is deploying capabilities and collecting logs to detect threats as well. This slideshow features five concerns to keep top of mind in the ever changing and evolving malware landscape, as identified by Jaime Blasco, labs manager at AlienVault.
Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ... More >>
When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ... More >>
Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ... More >>