Whenever a breach occurs it reveals weaknesses in how an organization approached security. Compromises are a great way to reveal the hidden sins organizations are committing. In the case of the Target breach, it is a gift that keeps on giving. While the initial breach report came out in December, it seems...
Read more
Defending Against the APT
Advanced Persistent Threat (APT)
Introduction
APT, formerly known as the Advanced Persistent Threat, is the buzz word that everyone is using. Companies are concerned about it, the government is being compromised by it and consultants are using it in every presentation they give. One of the main reasons organizations are broken into today is because they are...
Read more
Companies are Really Using Intrusion Prevention Systems
With cloud sharing gaining great popularity the need for the use of an intrusion prevention system is increasing. Many companies especially those involved in e-commerce are working hard to ensure their customers' privacy. Because technology is changing so much, so quickly companies large and small are taking cautionary measures. Intrusion prevention...
Read more