Creating an Intelligence-Led Security Organization

By Joe Malenfant I recently had the opportunity to sit down with Roland Cloutier, Global Chief Security Officer at ADP and former CISO at EMC, to discuss how they integrate and leverage threat intelligence into their security operations centers as well as their greater security technology infrastructure. It’s pretty rare for the CISO of a […]

Application Software Under the Scanner — Splunk, NQ Mobile, Fortinet, Paycom Software, and Cornerstone OnDemand

Application Software Under the Scanner — Splunk, NQ Mobile, Fortinet, Paycom Software, and Cornerstone OnDemand Source:: Fortinet

Application Software Under the Scanner — Splunk, NQ Mobile, Fortinet, Paycom Software, and Cornerstone OnDemand

Application Software Under the Scanner — Splunk, NQ Mobile, Fortinet, Paycom Software, and Cornerstone OnDemand Source:: Fortinet

Fortinet Selected to Secure Black Hat USA, the World’s Premiere Information Security Conference

Fortinet Selected to Secure Black Hat USA, the World’s Premiere Information Security Conference Source:: Fortinet

Fortinet Selected to Secure Black Hat USA, the World’s Premiere Information Security Conference

Fortinet Selected to Secure Black Hat USA, the World’s Premiere Information Security Conference Source:: Fortinet

Vulnerability Spotlight: Total Commander FileInfo Plugin Denial of Service

By Talos Group Talos is releasing an advisory for multiple vulnerabilities that have been found within the Total Commander FileInfo Plugin. These vulnerabilities are local denial of service flaws and have been assigned CVE-2015-2869. In accordance with our Vendor Vulnerability Reporting and Disclosure policy, these vulnerabilities have been disclosed to the plugin author(s) and CERT. […]

Vulnerability Spotlight: Total Commander FileInfo Plugin Denial of Service

By Talos Group Talos is releasing an advisory for multiple vulnerabilities that have been found within the Total Commander FileInfo Plugin. These vulnerabilities are local denial of service flaws and have been assigned CVE-2015-2869. In accordance with our Vendor Vulnerability Reporting and Disclosure policy, these vulnerabilities have been disclosed to the plugin author(s) and CERT. […]