By: - Dir. Solutions Marketing

Is It the End of the (USB) World as We Know It?

August 4th, 2014

News this past week about a Proof-of-Concept tool called BadUSB which has the IT security press in a lather. Why? Well, we all know that USB sticks are used to spread malware. But this POC by SRLabs security researchers Karsten Nohl and Jakob Lell – which will be demonstrated at Black Hat USA 2014 – […]



By: - Dir. Solutions Marketing

WinXP and Java: Double the Risk, Double the Fun

July 8th, 2014

Another reason, as if you needed one, to upgrade your WinXP systems: Java 8 – the latest version is 8u5 – has compatibility issues, and Java 7 – the latest version of which is 7u60 – is no longer supported on WinXP. As Oracle has put it: “Users may still continue to use Java 7 […]



By: - Dir. Solutions Marketing

POS System Pwnage

March 5th, 2014

Perhaps there have been bigger breaches, but the Target breach in late-2013 certainly seems to set off a firestorm. There are literally thousands of new online articles and posts everyday covering the event – the who, what, where, when, and especially the how and “what now” aspects of the case – and we’re certainly not […]



By: - Dir. Solutions Marketing

160 New Viruses Captured Every Minute

February 17th, 2014

Periodically, I take a look at what the good folks at AV-Test.org have to say about the amount of malware in their “zoo.” What I’ve been seeing over the past couple of quarters is pretty shocking. 2013 in Review The amount of new malware seen in 2013 jumped to an average of about 6.9M per […]



A Win-Win for Missouri S&T

September 5th, 2013

Missouri University of Science & Technology faces a set of challenges many post-secondary organizations similarly face. On one side of the problem set, we have a whole fleet of student-owned endpoint devices—over 7,000—connecting to the network without any kind of centralized management because the university only has the means to manage campus-owned systems. On the […]



By: - Dir. Solutions Marketing

Whitehat Lessons from $300M Cyber Crime Spree

July 30th, 2013

By now you’ve read about the new indictment of five hackers from Russia and Ukraine in what is being called the “largest data breach scheme in the US.” You can read the DOJ press release here and/or a redacted copy of the indictment here [PDF]. In what is really a continuation of the Albert Gonzalez […]



By: - Dir. Solutions Marketing

USBs: Unsafe at Any Speed?

August 12th, 2011

I always enjoy hearing about our venerable events in the popular press – sometimes they’re yuk-inducing, like this bit on Marketplace about their reporter asking about getting WiFi at Black Hat 2011 (see here or listen here for the whole piece). And although I did not attend, I’ve been trying to catch up on some […]



By: - Chairman and CEO, Lumension

@pclawson

Evolution to Intelligent Whitelisting : Part 3 : AV and Application Whitelisting, An Unlikely Couple

September 30th, 2010

video

Part 3 of a three-part Q&A podcast series with Pat Clawson, Chairman and CEO, Lumension and Patrick O’Grady, Technology Writer, Phoenix Business Journal



By: - Chairman and CEO, Lumension

@pclawson

Evolution to Intelligent Whitelisting: Part 2: Four Whitelisting Misperceptions to Abandon

September 20th, 2010

video

Part 2 of a three-part Q&A podcast series with Pat Clawson, Chairman and CEO, Lumension and Patrick O’Grady, Technology Writer, Phoenix Business Journal



By: - Chairman and CEO, Lumension

@pclawson

Evolution to Intelligent Whitelisting: Part 1: Not Your Father’s Whitelisting

September 13th, 2010

video

A three-part Q&A podcast series with Pat Clawson, Chairman and CEO, Lumension and Patrick O’Grady, Technology Writer, Phoenix Business Journal


By: - Chairman and CEO, Lumension

@pclawson

Lessons from the Road…Tokyo, London, Sydney: Part II

June 23rd, 2010

As I mentioned in my last post, after quite a bit of overseas travel recently, I observed a few trends that apply globally – at its core, what trends are driving technology trends in IT environments, today? In addition to the platform-centric approach being firmly planted both here and overseas and the efficiency of agents […]


By: - Chairman and CEO, Lumension

@pclawson

Whitelisting: Fill in the Gaps Where Traditional Efforts have Failed

May 27th, 2010

You’ve probably heard about three recent security-related events that attracted lots of attention. In January, Google announced that it suffered a “highly sophisticated” and targeted hacker attack—originating from China— against its corporate network. In April, an ill-fated false-positive antivirus signature was pushed out that accidentally removed a key part of Windows from machines. And a […]


By: - Forensics and Security Expert

@phenrycissp

Will 2010 be the Year of Zero-Day Vulnerabilities for Browsers?

March 23rd, 2010

It certainly seems that in 2010, a month doesn’t go by without hearing about yet another zero-day threat affecting a popular browser software. In the first quarter of 2010, we already have seen new zero-day issues in the most popular browsers in use today: Microsoft reported yet another new zero-day issue with Internet Explorer, and […]


By: - Forensics and Security Expert

@phenrycissp

Advanced Persistent Threat: Marketing Hype or Real Menace?

February 25th, 2010

In light of all of the widely varying commentary on the Advanced Persistent Threat (APT) issue I have been reading about on the Internet, I wanted to weigh in with my opinion on the issue. APT – the New Menace? For the past 20 years, we have at best only reacted to the changing Internet […]


By: - Dir. Solutions Marketing

Kneber BotNet / Zeus Trojan Strikes!

February 18th, 2010

Makes Us Wonder if Web 2.0 / Social Apps are a Boon or a Bane.



IT Secured. Success Optimized.™

Contact Lumension | Privacy Policy

Connect & Follow Us

blog.lumension.com