The majority of companies have been able to install preventative tools such as intrusion prevention systems and antivirus software to help protect against malware, but those tools are usually not an end-all solution. The key is deploying capabilities and collecting logs to detect threats as well. This slideshow features five concerns to keep top of mind in the ever changing and evolving malware landscape, as identified by Jaime Blasco, labs manager at AlienVault.
When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ... More >>
Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ... More >>
IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ... More >>