By: - Independent Computer Security Analyst

@gcluley

Here’s How to Keep Getting Free Security Updates for Windows XP Until 2019 – And Why You Shouldn’t

May 27th, 2014

Have you heard the news? A way has been found to trick computers into receiving security updates for Windows XP – even though Microsoft stopped officially supporting the operating system back in April. According to a BetaNews report, this could make it possible for users still using creaky old XP to carry on getting security […]



By: - Independent Computer Security Analyst

@gcluley

Windows 8.1 Update – Microsoft forces users to update OS if they want future security updates

April 9th, 2014

Most of the attention this week, from the patching point of view at least, has been directed towards the last ever security fixes for Windows XP. Microsoft warned in 2007 that it would no longer be supporting Windows XP after April 8th, 2014, and they have kept true to their promise – meaning that all […]



By: - Forensics and Security Expert

@phenrycissp

Apple Fingerprint Scanner: Game Changer or Game Over?

September 11th, 2013

Apple’s announcement of the company’s new iPhone 5S comes equipped with a fingerprint scanner has the potential to be a real game changer for personal device security – if it’s done right. There are two factors that will determine the real success of this new feature, which has undeniable potential. First, reliability and second, security – though […]



By: - Forensics and Security Expert

@phenrycissp

Nothing Pretty About Fireworks Delivered From Microsoft This Patch Tuesday

July 9th, 2013

IT admins may have taken the Fourth off to enjoy some fireworks, but they’ll be very busy this week patching their systems. It’s not a pretty Patch Tuesday this month with 7 bulletins, 6 of which are critical. That brings our total of critical bulletins for the year to 22, which is fairly high, considering […]



By: - Information Security Reporter

@kevtownsend

Compliance Is Bad for Security

June 18th, 2013

There are two separate approaches to keeping data safe: compliance and security. The first is a legal/regulatory obligation; the second is not. If you ask a compliance author, whether that’s a government legislator or a bureaucratic regulator, what is the purpose of compliance, the reply will be ‘to ensure security.’ If you ask the same […]



By: - Former Chairman and CEO, Lumension

@pclawson

3 Executive Strategies to Prioritize Your IT Risk

May 22nd, 2013

Every company wants to know the best way to protect their company, but it can be difficult when faced with the evolving security challenges of today. I recently sat down with Richard Mason, VP & CSO at Honeywell, Roger Grimes, security columnist and author, to get their thoughts on risk management best practices. I hope […]



By: - IT Security Expert

BYOD or BYOT (Bring Your Own Threat)…The Case for Mobile Devices as Endpoints

May 7th, 2013

Lumension recently conducted a survey of more than 1,600 IT professionals on Linkedin regarding their thoughts on BYOD and mobile security. You can check it out here. There is a lot of interesting information in this survey, with one of the main takeaways was for these respondents’ organizations, BYOD is really all about end-user satisfaction […]



By: - Dir. Solutions Marketing

ZIP Codes Are … PII?!

April 15th, 2013

Mr. ZIP (or Zippy to his friends) was born back in July 1963 and the soon-to-be 50-year-old is finally getting some privacy … in Massachusetts at least. The Massachusetts Supreme Court recently determined that under Mass. Gen. Laws, ch. 93, § 105(a), “personal identification information” includes a consumer’s ZIP code and decided that collecting such […]



By: - Windows Security Subject Matter Expert

@randyfsmith

Anatomy of Reflective Memory Attacks

April 10th, 2013

Ophiocordyceps unilateralis is a parasitical fungus that, beginning with a microscopic spore, infects a certain species of ant using a series of attacks, one building on the other until it controls the ant’s brain for its own bidding.  The fungus can’t just land on the ant, consume it and reproduce.  It needs to get inside the ant […]



By: - Forensics and Security Expert

@phenrycissp

Embedded Chinese Malware – Theoretical Threat or Practical Issue?

April 4th, 2013

Before we begin discussing the issue of the theoretical or practical reality in the potential threat of the Chinese embedding malware in the computer equipment they manufacture, consider this: Just a few years ago who would have thought that any government (never mind our own) would have created malware to attack another government’s computer systems […]


By: - Former Chairman and CEO, Lumension

@pclawson

Are Journalists Sitting Ducks?

March 26th, 2013

Remember Mat Honan – a Wired reporter that covers consumer electronics? He had his entire digital life erased last summer. His Google account was deleted, his Twitter taken over, his iPhone, iPad and MacBook erased. How about the New York Times hack? Chinese hackers allegedly broke into the paper’s systems, stole passwords and watched reporters, […]


By: - Windows Security Subject Matter Expert

@randyfsmith

Everything Matters

August 2nd, 2012

You just can’t cut corners today. In fact you need to be very careful about even “optimizing” your security efforts because it’s so easy to misjudge what needs to be secured and what doesn’t; what deserves your attention and what doesn’t. In fact, in a recent discussion with a colleague, we concluded that basically, “today, […]


By: - Forensics and Security Expert

@phenrycissp

June 2010 Patch Tuesday Security Briefing

June 9th, 2010

video

On Tuesday June 8, 2010, Microsoft warned users that they have released ten security bulletins — three of which are critical, seven are rated important and all of which include an explicit or possible restart warning. The impact will be felt enterprise-wide, as the bulletins cover a large portion of Microsoft’s range of operating systems, […]


By: - Sr. Director Solutions and Strategy

@donleatham

Patch Tuesday: The Looming Dangers of Digital Media

June 9th, 2010

It might be the start of summer, but there was little sunshine from Microsoft on Tuesday, as the company warned users that they have released ten security bulletins — three of which are critical, seven are rated important and all of which include an explicit or possible restart warning. The impact will be felt enterprise-wide, […]


By: - Former Chairman and CEO, Lumension

@pclawson

Innovation, Competition and Venture Capitalism

June 8th, 2010

Over the last several months, I’ve been wrestling over a few issues that I think are converging to create an inhospitable business environment. Issues such as our company’s heritage as a venture-backed company, where we sit as a nation from a data security perspective; and my own view, that US intellectual property is at an […]



IT Secured. Success Optimized.™

Contact Lumension | Privacy Policy

Connect & Follow Us

blog.lumension.com