About Paul Zimski

Paul Zimski, brings more than 10 years of industry experience and oversees marketing and solution strategy at Lumension. Zimski is a regular speaker at major security events such as RSA and HIMSS and is a regular contributor for major news publications.

 

By: - IT Security Expert

The ABCs of APTs

January 6th, 2014

As employees and IT professionals return from the holidays, many are doing so with 2014 New Year’s resolutions in mind. For IT pros, we hope that one of your resolutions is to bolster your organization’s security and defenses in 2014. One of the rising threats that many IT professionals should be concerned about defending against […]



By: - IT Security Expert

Employ a Targeted Defense Against Targeted Threats

November 11th, 2013

In my last post, I discussed the reality of APT hitting unsuspecting organizations with a predictable pattern. Study after study indicates people are being hit by malicious hackers and the attack goes on for months before anyone is any the wiser. If they ever know. Some very large companies, with hundreds of business units and […]



By: - IT Security Expert

The Predictable Pattern of APTs

November 6th, 2013

It used to be that only large, Fortune 500-sized businesses had to worry about targeted threats, or APTs. Today, it’s a whole new ballgame. Sophisticated, malicious hackers use focused resources for small- and medium-sized companies too. Everyone is a target and your risk is multiplied if you do business with important partners and business associates […]



By: - IT Security Expert

Avoiding the User Blame Game

October 10th, 2013

It might not be part of any formal forensics or incident response policy, but odds are at most organizations, whenever a malicious hacking attack hits the mark there’s one step rarely missed: blaming the user. Users do some boneheaded things sometimes so pointing the finger at them is easy. But the truth is if IT […]



By: - IT Security Expert

BYOD or BYOT (Bring Your Own Threat)…The Case for Mobile Devices as Endpoints

May 7th, 2013

Lumension recently conducted a survey of more than 1,600 IT professionals on Linkedin regarding their thoughts on BYOD and mobile security. You can check it out here. There is a lot of interesting information in this survey, with one of the main takeaways was for these respondents’ organizations, BYOD is really all about end-user satisfaction […]



By: - IT Security Expert

Global 2013 Trends in Data Protection Maturity

March 25th, 2013

Protecting sensitive information has become increasingly difficult the last few years – if you haven’t recognized this fact and modified your security approach recently, you’ve got issues. One reason for this is the explosion of mobile devices on our networks. While convenient for our users and a significant productivity booster for our business, this new […]



By: - IT Security Expert

Adobe Hack Translation

October 2nd, 2012

Late last week, we received notice hackers, presumably a well-equipped group using an advanced campaign, somehow made their way laterally onto an Adobe build server where company developers package up a final executable for consumers. With access to the build server, attackers were able to sign their own hacking tools with legitimate Adobe certificates. In […]



By: - IT Security Expert

Use the Yahoo Breach to Educate Your Users

July 13th, 2012

Evidently, this is what the hackers wanted – an opportunity to educate. While the fact that Yahoo did not encrypt customer passwords is yet another instance of embarrassingly low security priorities on behalf of corporate entities, the fact is that Yahoo’s customers who were breached are at fault too. The firm that uncovered the breach […]



By: - IT Security Expert

Closing the Antivirus Protection Gap

May 16th, 2012

With 50% of IT endpoint operating costs now attributable to malware, is reliance on antivirus as the keystone endpoint security measure the best approach? Instinct tells us no but to be sure, Lumension recently did a comparative analysis on the effectiveness of standalone AV and O/S resident patching solution versus newer technologies, including application whitelisting, […]



By: - IT Security Expert

Security vs. Operations

April 18th, 2012

audio

Time and again, we’ve heard IT teams lament over how security continues to challenge the operational aspects of an organization. And these issues will not likely resolve themselves. While there isn’t a silver bullet that will “fix” this situation, there are best practices that will definitely improve security and increase operational efficiency. For some tips, we […]


By: - IT Security Expert

Security and Operations: Back to the Basics

April 12th, 2012

audio

We’re back with part II in our podcast series on security versus operations with Mike Rothman, president and analyst with Securosis. In this post, Mike and I will discuss getting back to the basics of endpoint security, as small and mid-size organizations should not even consider employing in-depth cyber security measures until they have the […]


By: - IT Security Expert

Security and Operations: Guidelines to Striking a Balance

April 4th, 2012

audio

Time and again, we’ve heard IT teams lament over how security continues to challenge the operational aspects of an organization. And these issues will not likely resolve themselves. While there isn’t a silver bullet that will “fix” this situation, there are best practices that will definitely improve security and increase operational efficiency. Download the podcast. This […]


By: - IT Security Expert

Life After an Attack

September 9th, 2011

Hackers never sleep–as Citigroup can certainly attest to, having their consumer information twice hacked in a span of only three months. While we are counting sheep, the bad guys are of course looking for a way in, lurking and waiting for a vulnerable minute to strike. And all too often, this happens to organizations that […]


By: - IT Security Expert

How to Remove MAC Defender

June 2nd, 2011

MacDefender is fake security program that has been targeting Mac OS users. Through a combination of SEO optimization and a socially engineered website, Mac users are tricked into installing the Mac Defender malware. In this video, two members of the Lumension team, Russ Ernst, product management and Chris Merritt, solution marketing have prepared a step-by-step […]


By: - IT Security Expert

Will Early Technology Adoption Put You at Risk for Identity Theft?

June 10th, 2010

It was reported yesterday that a group of hackers from Goatse Security compromised AT&T’s server through an open vulnerability to steal over 114,000 iPad 3G owners sensitive personal information which included email addresses and SIM card ICC-IDs.  The attack didn’t effect the iPads themselves, but rather customer information housed on AT&Ts network.  Luckily, no credit […]



IT Secured. Success Optimized.™

Contact Lumension | Privacy Policy

Connect & Follow Us

blog.lumension.com