By: - Dir. Solutions Marketing

POS System Pwnage

March 5th, 2014

Perhaps there have been bigger breaches, but the Target breach in late-2013 certainly seems to set off a firestorm. There are literally thousands of new online articles and posts everyday covering the event – the who, what, where, when, and especially the how and “what now” aspects of the case – and we’re certainly not […]



By: - Dir. Solutions Marketing

160 New Viruses Captured Every Minute

February 17th, 2014

Periodically, I take a look at what the good folks at AV-Test.org have to say about the amount of malware in their “zoo.” What I’ve been seeing over the past couple of quarters is pretty shocking. 2013 in Review The amount of new malware seen in 2013 jumped to an average of about 6.9M per […]



A Win-Win for Missouri S&T

September 5th, 2013

Missouri University of Science & Technology faces a set of challenges many post-secondary organizations similarly face. On one side of the problem set, we have a whole fleet of student-owned endpoint devices—over 7,000—connecting to the network without any kind of centralized management because the university only has the means to manage campus-owned systems. On the […]



By: - Senior Architect

@danteal

Defending Against Java

July 24th, 2013

Java offers enterprises the ability to write code once and run it everywhere.  However, this flexibility comes with a high cost: reduced security on endpoints. It has lately gotten so bad that Java has been nicknamed Just Another Vulnerability Announcement. Oracle has been working to produce updates to Java that addresses these vulnerabilities, but many […]



By: - Chairman and CEO, Lumension

@pclawson

The New York Times Breach: Why AV Failed, What They Should Have Done and What We Accomplish by Letting Them Stay Inside

February 1st, 2013

In yet another example in the saga of personalized malware from foreign nations, specifically China, The New York Times reported Wednesday that the Chinese had carried out an extensive malware campaign against the newspaper giant for the past four months. With this news, we see once again stand alone, signature-based defenses are completely ineffective, especially […]



By: - Chairman and CEO, Lumension

@pclawson

A Look at June’s State of Cyber Security

July 2nd, 2012

audio

May was an action-packed month and I’m happy to report that with the onset of summer, the truly severe threats seem to have subsided (for now). That’s not to say this month was without incident – that’s impossible in our industry. Download the podcast. So listen in and as always, I’d love to hear your […]



By: - Forensics and Security Expert

@phenrycissp

UPDATE: Flame Malware Has Evaded AV for 5 to 8 Years

June 4th, 2012

June 4, 2012 UPDATE: Today, Microsoft issued Security Advisory 2718704 for attacks using unauthorized certificates from a Microsoft Certificate Authority. “This issue affects all supported releases of Microsoft Windows,” Microsoft said. Some techniques used in Flame could also be leveraged for less sophisticated, wide spread attacks. Read their blog. If you think antivirus has you covered, […]



By: - IT Security Expert

Closing the Antivirus Protection Gap

May 16th, 2012

With 50% of IT endpoint operating costs now attributable to malware, is reliance on antivirus as the keystone endpoint security measure the best approach? Instinct tells us no but to be sure, Lumension recently did a comparative analysis on the effectiveness of standalone AV and O/S resident patching solution versus newer technologies, including application whitelisting, […]



By: - Dir. Solutions Marketing

DNSChanger Trojan: Not All Doom and Gloom

May 9th, 2012

If your server(s) have been infected by the DNSChanger Trojan and you’ve not done anything about it, time is running out. You have until July 9, 2012 to get your systems fixed, or you’ll lose internet access until you do. This insidious little Trojan – variously known as TDSS, Alureon, TidServ, and TDL4 malware – […]



By: - Forensics and Security Expert

@phenrycissp

Is Apple Poised To Become The Achilles Heel Of The Enterprise?

May 9th, 2011

The growth in market share for the iMac and MacBook is what first got the attention of hackers; then came the iPhone and shortly after that, the iPad. Anyone that thinks they have a “security by obscurity” advantage is mistaken. You are no longer safe simply because you use an Apple product. The recent discovery […]


By: - Sr. Director Solutions and Strategy

@donleatham

Is the PlayStation® Network Meltdown a Security "Black Swan"?

May 3rd, 2011

The intensive and comprehensive nature of Sony’s PlayStation® Network (PSN) meltdown has made a strong impression on me. Loss of massive amounts of sensitive customer data, long-term network unavailability, probable class-action law suits, and an unprecedented avalanche of bad PR – this is not your normal “our network got hacked” situation. It made me wonder, […]


By: - Chairman and CEO, Lumension

@pclawson

Playing the Security Game? Think Before Simply Clicking ‘Renew’

April 26th, 2011

If your organization is anything like the companies we’ve been speaking with, then you know first-hand the headache and ongoing challenge that the rising cost of malware has created. In fact, 48 percent of organizations recently reported an increase in their IT operating expenses, according to the 2010 Ponemon Institute study commissioned by Lumension. Significantly, […]


By: - Forensics and Security Expert

@phenrycissp

2011 Has Potential to be a Really Bad Year

April 20th, 2011

If we look at how 2010 ended there is perhaps good reason for IT security pros to already be nervous in 2011. According to the end of year report from IBM X-Force, at least 44% of all vulnerabilities disclosed in 2010 had no corresponding patch by end of year. Not only do we have to […]


By: - Chairman and CEO, Lumension

@pclawson

Industry Evolution: Innovation vs. Spending; Part 1 of 3

March 30th, 2011

 PART I: Is the security industry content to stop innovating because businesses keep buying? (The Problem) Research and development among technology vendors is on the decline.  Tech giants, such as HP and IBM, have made cuts to their R&D programs.  This may be the case for the security industry as well.  At least that seemed […]


By: - Chairman and CEO, Lumension

@pclawson

Evolution to Intelligent Whitelisting : Part 3 : AV and Application Whitelisting, An Unlikely Couple

September 30th, 2010

video

Part 3 of a three-part Q&A podcast series with Pat Clawson, Chairman and CEO, Lumension and Patrick O’Grady, Technology Writer, Phoenix Business Journal



IT Secured. Success Optimized.™

Contact Lumension | Privacy Policy

Connect & Follow Us

blog.lumension.com