Vulnerability Spotlight: Lexmark Perceptive Document Filters Code Execution Bugs
By Talos Group Overview Talos is disclosing a pair of code execution vulnerabilities in Lexmark Perceptive Document Filters. Perceptive Document Filters are a series of libraries that are used to parse massive amounts of different types of file formats for multiple purposes. Talos has previously discussed in detail these filters and how they operate. The […]
What’s in a Name? Threat Intelligence, Artificial Intelligence, and Extreme Snack Foods
By Marc Blackmer What is in a name? A lot, actually. A rose by any other name would certainly smell just as sweet. But if I sold you a dozen dandelions, calling them roses, as the perfect Valentine’s Day gift for your sweetheart, neither of you would be none too pleased, would you? It makes […]
What’s in a Name? Threat Intelligence, Artificial Intelligence, and Extreme Snack Foods
By Marc Blackmer What is in a name? A lot, actually. A rose by any other name would certainly smell just as sweet. But if I sold you a dozen dandelions, calling them roses, as the perfect Valentine’s Day gift for your sweetheart, neither of you would be none too pleased, would you? It makes […]
Fortinet FortiGate Virtualized Security Available for VMware Cloud on AWS
Fortinet FortiGate Virtualized Security Available for VMware Cloud on AWS Source:: Fortinet
Fortinet FortiGate Virtualized Security Available for VMware Cloud on AWS
Fortinet FortiGate Virtualized Security Available for VMware Cloud on AWS Source:: Fortinet
Here Are 3 Things that Drive Security for the Intuitive Network Hint: ISE 2.3 Plays Key Role
By Kevin Skahill We recently announced the Network Intuitive architecture, a new era of networking that removes complexity and enables automation, assurance, and security. With built-in security, you get dynamic protection that enables your business to evolve at the breakneck pace the market demands. Recent events highlight the criticality of securing the digital network against […]
Here Are 3 Things that Drive Security for the Intuitive Network Hint: ISE 2.3 Plays Key Role
By Kevin Skahill We recently announced the Network Intuitive architecture, a new era of networking that removes complexity and enables automation, assurance, and security. With built-in security, you get dynamic protection that enables your business to evolve at the breakneck pace the market demands. Recent events highlight the criticality of securing the digital network against […]

