By: - Dir. Solutions Marketing

Patch! Patch! Patch! What Security Pros Know that Your Barber Doesn’t

August 13th, 2015

[Originally published in the Spiceworks IT Community.] A Google security research paper was recently published on the best safety practices that hundreds of security experts recommend. This paper outlines the results of two surveys — one with 231 security experts, and another with 294 web-users who aren’t security experts — in which both groups were asked what […]

By: - Independent Computer Security Analyst


Android and Windows battle for top position on the malware front, claims report

February 16th, 2015

We all know that malware is a huge problem on the Windows platform. Every day, something like 400,000 new Windows malware variants are dissected by security labs, and most people’s anti-virus software is set to download updates on a pretty much continual basis in an attempt to keep up. It sounds bad because it *is* […]

By: - Dir. Solutions Marketing

POS System Pwnage

March 5th, 2014

Perhaps there have been bigger breaches, but the Target breach in late-2013 certainly seems to set off a firestorm. There are literally thousands of new online articles and posts everyday covering the event – the who, what, where, when, and especially the how and “what now” aspects of the case – and we’re certainly not […]

By: - Dir. Solutions Marketing

160 New Viruses Captured Every Minute

February 17th, 2014

Periodically, I take a look at what the good folks at have to say about the amount of malware in their “zoo.” What I’ve been seeing over the past couple of quarters is pretty shocking. 2013 in Review The amount of new malware seen in 2013 jumped to an average of about 6.9M per […]

A Win-Win for Missouri S&T

September 5th, 2013

Missouri University of Science & Technology faces a set of challenges many post-secondary organizations similarly face. On one side of the problem set, we have a whole fleet of student-owned endpoint devices—over 7,000—connecting to the network without any kind of centralized management because the university only has the means to manage campus-owned systems. On the […]

By: - Senior Architect


Defending Against Java

July 24th, 2013

Java offers enterprises the ability to write code once and run it everywhere.  However, this flexibility comes with a high cost: reduced security on endpoints. It has lately gotten so bad that Java has been nicknamed Just Another Vulnerability Announcement. Oracle has been working to produce updates to Java that addresses these vulnerabilities, but many […]

By: - Former Chairman and CEO, Lumension


The New York Times Breach: Why AV Failed, What They Should Have Done and What We Accomplish by Letting Them Stay Inside

February 1st, 2013

In yet another example in the saga of personalized malware from foreign nations, specifically China, The New York Times reported Wednesday that the Chinese had carried out an extensive malware campaign against the newspaper giant for the past four months. With this news, we see once again stand alone, signature-based defenses are completely ineffective, especially […]

By: - Former Chairman and CEO, Lumension


A Look at June’s State of Cyber Security

July 2nd, 2012


May was an action-packed month and I’m happy to report that with the onset of summer, the truly severe threats seem to have subsided (for now). That’s not to say this month was without incident – that’s impossible in our industry. Download the podcast. So listen in and as always, I’d love to hear your […]

By: - Forensics and Security Expert


UPDATE: Flame Malware Has Evaded AV for 5 to 8 Years

June 4th, 2012

June 4, 2012 UPDATE: Today, Microsoft issued Security Advisory 2718704 for attacks using unauthorized certificates from a Microsoft Certificate Authority. “This issue affects all supported releases of Microsoft Windows,” Microsoft said. Some techniques used in Flame could also be leveraged for less sophisticated, wide spread attacks. Read their blog. If you think antivirus has you covered, […]

By: - IT Security Expert

Closing the Antivirus Protection Gap

May 16th, 2012

With 50% of IT endpoint operating costs now attributable to malware, is reliance on antivirus as the keystone endpoint security measure the best approach? Instinct tells us no but to be sure, Lumension recently did a comparative analysis on the effectiveness of standalone AV and O/S resident patching solution versus newer technologies, including application whitelisting, […]

By: - Dir. Solutions Marketing

DNSChanger Trojan: Not All Doom and Gloom

May 9th, 2012

If your server(s) have been infected by the DNSChanger Trojan and you’ve not done anything about it, time is running out. You have until July 9, 2012 to get your systems fixed, or you’ll lose internet access until you do. This insidious little Trojan – variously known as TDSS, Alureon, TidServ, and TDL4 malware – […]

By: - Forensics and Security Expert


Is Apple Poised To Become The Achilles Heel Of The Enterprise?

May 9th, 2011

The growth in market share for the iMac and MacBook is what first got the attention of hackers; then came the iPhone and shortly after that, the iPad. Anyone that thinks they have a “security by obscurity” advantage is mistaken. You are no longer safe simply because you use an Apple product. The recent discovery […]

By: - Sr. Director Solutions and Strategy


Is the PlayStation® Network Meltdown a Security "Black Swan"?

May 3rd, 2011

The intensive and comprehensive nature of Sony’s PlayStation® Network (PSN) meltdown has made a strong impression on me. Loss of massive amounts of sensitive customer data, long-term network unavailability, probable class-action law suits, and an unprecedented avalanche of bad PR – this is not your normal “our network got hacked” situation. It made me wonder, […]

By: - Former Chairman and CEO, Lumension


Playing the Security Game? Think Before Simply Clicking ‘Renew’

April 26th, 2011

If your organization is anything like the companies we’ve been speaking with, then you know first-hand the headache and ongoing challenge that the rising cost of malware has created. In fact, 48 percent of organizations recently reported an increase in their IT operating expenses, according to the 2010 Ponemon Institute study commissioned by Lumension. Significantly, […]

By: - Forensics and Security Expert


2011 Has Potential to be a Really Bad Year

April 20th, 2011

If we look at how 2010 ended there is perhaps good reason for IT security pros to already be nervous in 2011. According to the end of year report from IBM X-Force, at least 44% of all vulnerabilities disclosed in 2010 had no corresponding patch by end of year. Not only do we have to […]

IT Secured. Success Optimized.™

Contact Lumension | Privacy Policy

Connect & Follow Us