Threat Morphosis: Two Decades of Malware

By | November 14th, 2011
Industry InSights, Network Security & Solutions|Comments Off on Threat Morphosis: Two Decades of Malware

Largest Data Breaches of All Time

As Sony deals with their most recent data breach of one million passwords, Flowing Data took a look at the the largest data loss incidents on record, according to DataLossDB.        

By | June 14th, 2011
IT Infrastructure|Comments Off on Largest Data Breaches of All Time

In The News: New Banking Trojan

Twitter |  Facebook |  LinkedIn In The News: New Banking Trojan The SonicWALL UTM Research team has received reports of a new banking Trojan named Tatanga in the wild. Spain, Germany, the United States, and the United Kingdom are the top countries affected by this Trojan. This Trojan has many sophisticated features resembling functions found in the popular crime-ware toolkits Zeus and SpyEye which includes: Encrypted configuration files Encrypted communication between the bot and the [...]

By | March 27th, 2011
IT Infrastructure|Comments Off on In The News: New Banking Trojan

Managed Firewall 101: What Everyone Needs to Know

If your home has ever been burglarized, you know what it feels like to be victimized. You may have been temporarily aggravated or even angered by the “inconveniences” that followed the event, i.e., repairing a broken window or door, changing the locks, installing an alarm system, replacing items that were stolen, wondering what else was stolen that you haven’t noticed yet, etc., and somehow, the feeling of just how vulnerable you are stayed with you [...]

By | March 22nd, 2011
IT Infrastructure|Comments Off on Managed Firewall 101: What Everyone Needs to Know

What Are the Odds of a Security Breach at Your Institution?

If your home has ever been burglarized, you know the unnerving feeling of being violated and how the experience can haunt you for a long time. Obviously, locks and bolts are only as strong as the door and the frame they’re fitted to. This is also true of the security posture of financial institutions. Outdated software applications, misconfigured devices, and ineffective security policies are much like the weak or rotten woodwork framing the door of your home ...

By | March 31st, 2009
Network Security & Solutions|Comments Off on What Are the Odds of a Security Breach at Your Institution?

How Does Your Security Strategy Rate?

Much to the chagrin of IT professionals who face the constant onslaught of threats and problems, security tests can never prove that you are secure. That’s because security is a process, not a final destination. As such, security testing should be applied with a well thought-out strategy...

By | March 31st, 2009
Compliance & Business Continuity, Network Security & Solutions|Comments Off on How Does Your Security Strategy Rate?

Don’t Let Development Pressures Cut Security Testing Short

There are more than 5,000 known security vulnerabilities and the number is growing. In 2008, there were 11.5% more internet security vulnerabilities disclosed than in 2007. That’s because we’re getting better at identifying and eliminating vulnerabilities. But all the progress made can be thrown out the window, if you’re in a hurry to roll out the latest and greatest software upgrade. Don’t cut security testing short just to meet deadlines...

By | March 26th, 2009
IT Infrastructure, Network Security & Solutions|Comments Off on Don’t Let Development Pressures Cut Security Testing Short