What if your network could do it all? Be digital-ready AND secure your business.
By Dan Stotts Networks today are supposed to be digital-ready, meaning fast and agile to propel business into a world where everything is connected. Getting there has hit some major speedbumps due to highly publicized hacks. And this has started a virtual arms race, where no expense is spared to deploy numerous, disparate security solutions. […]
What if your network could do it all? Be digital-ready AND secure your business.
By Dan Stotts Networks today are supposed to be digital-ready, meaning fast and agile to propel business into a world where everything is connected. Getting there has hit some major speedbumps due to highly publicized hacks. And this has started a virtual arms race, where no expense is spared to deploy numerous, disparate security solutions. […]
Vulnerability Spotlight: Adobe Acrobat Reader DC jpeg Decoder Vulnerability
By Talos Group Discovered by Aleksandar Nikolic of Cisco Talos Overview Talos is disclosing TALOS-2016-0259 / CVE-2016-9041 an uninitialized memory vulnerability in Adobe Acrobat Reader DC. Adobe Acrobat Reader is one of the largest and well known PDF readers available today. This particular vulnerability is associated with the JPEG Decoder functionality embedded in the application. […]
Vulnerability Spotlight: Adobe Acrobat Reader DC jpeg Decoder Vulnerability
By Talos Group Discovered by Aleksandar Nikolic of Cisco Talos Overview Talos is disclosing TALOS-2016-0259 / CVE-2016-9041 an uninitialized memory vulnerability in Adobe Acrobat Reader DC. Adobe Acrobat Reader is one of the largest and well known PDF readers available today. This particular vulnerability is associated with the JPEG Decoder functionality embedded in the application. […]
Effective Endpoint Security – More than Meets the Eye
By Jason Lamar One of your sales people, Susan, is on the road putting some finishing touches on a presentation before a big meeting. Using the hotel Wi-Fi she does a quick search to see if there’s any relevant company or industry news she needs to know about before meeting with the client. She clicks […]
Effective Endpoint Security – More than Meets the Eye
By Jason Lamar One of your sales people, Susan, is on the road putting some finishing touches on a presentation before a big meeting. Using the hotel Wi-Fi she does a quick search to see if there’s any relevant company or industry news she needs to know about before meeting with the client. She clicks […]
Guidelines and Practices for Multi-Party Vulnerability Coordination Open to Review
By Omar Santos Recent cyber attacks on organizations around the world have demonstrated the need for consistency in managing security vulnerabilities. To answer that demand, the Industry Consortium for the Advancement of Security on the Internet (ICASI) and the Forum of Incident Response and Security Teams (FIRST) created the FIRST Vulnerability Coordination Special Interest Group […]

