Vulnerability Spotlight: Apache OpenOffice Vulnerabilities
By Talos Group Today, Talos is releasing details of three new vulnerabilities discovered within Apache OpenOffice application. The first vulnerability, TALOS-2017-0295 within OpenOffice Writer, the second TALOS-2017-0300 in the Draw application, and the third TALOS-2017-0301 discovered in the Writer application. All three vulnerabilities allow arbitrary code execution to be performed. Read More >> Source:: Cisco […]
Gartner releases report on the transformation of the SWG market
By Kevin Rollinson On September 12, Gartner – the leading research and advisory company – released a competitive report on the secure web gateway (SWG) market. The report highlights the significant transformation as the traditional SWG gives way to a new platform –– the secure internet gateway (SIG). Gartner states, “the SIG service platform offers […]
Gartner releases report on the transformation of the SWG market
By Kevin Rollinson On September 12, Gartner – the leading research and advisory company – released a competitive report on the secure web gateway (SWG) market. The report highlights the significant transformation as the traditional SWG gives way to a new platform –– the secure internet gateway (SIG). Gartner states, “the SIG service platform offers […]
How to Quickly Differentiate Between Malicious and Harmless Traffic Using the Cisco Security Packet Analyzer
By Matthew Packer With the constant news headlines about data theft it is mandatory that organizations understand what data is entering, traversing, and leaving their networks and have the ability to examine that data if necessary for conducting network forensic investigations. Two popular style of attacks that are constantly in the news are data hoarding […]
How to Quickly Differentiate Between Malicious and Harmless Traffic Using the Cisco Security Packet Analyzer
By Matthew Packer With the constant news headlines about data theft it is mandatory that organizations understand what data is entering, traversing, and leaving their networks and have the ability to examine that data if necessary for conducting network forensic investigations. Two popular style of attacks that are constantly in the news are data hoarding […]
Fireproofing your network with software-defined segmentation
By Andrew Akers We often hear of the many challenges of the industrial revolution, but one of the scourges of this time period that often goes unmentioned was mass fires. To the people of the time, great fires threatened the very viability of industrialization. The number of fires bearing the moniker ‘great‘ helps prove this […]
Fireproofing your network with software-defined segmentation
By Andrew Akers We often hear of the many challenges of the industrial revolution, but one of the scourges of this time period that often goes unmentioned was mass fires. To the people of the time, great fires threatened the very viability of industrialization. The number of fires bearing the moniker ‘great‘ helps prove this […]

