Creating an Intelligence-Led Security Organization
By Joe Malenfant I recently had the opportunity to sit down with Roland Cloutier, Global Chief Security Officer at ADP and former CISO at EMC, to discuss how they integrate and leverage threat intelligence into their security operations centers as well as their greater security technology infrastructure. It’s pretty rare for the CISO of a […]
Application Software Under the Scanner — Splunk, NQ Mobile, Fortinet, Paycom Software, and Cornerstone OnDemand
Application Software Under the Scanner — Splunk, NQ Mobile, Fortinet, Paycom Software, and Cornerstone OnDemand Source:: Fortinet
Application Software Under the Scanner — Splunk, NQ Mobile, Fortinet, Paycom Software, and Cornerstone OnDemand
Application Software Under the Scanner — Splunk, NQ Mobile, Fortinet, Paycom Software, and Cornerstone OnDemand Source:: Fortinet
Fortinet Selected to Secure Black Hat USA, the World’s Premiere Information Security Conference
Fortinet Selected to Secure Black Hat USA, the World’s Premiere Information Security Conference Source:: Fortinet
Fortinet Selected to Secure Black Hat USA, the World’s Premiere Information Security Conference
Fortinet Selected to Secure Black Hat USA, the World’s Premiere Information Security Conference Source:: Fortinet
Vulnerability Spotlight: Total Commander FileInfo Plugin Denial of Service
By Talos Group Talos is releasing an advisory for multiple vulnerabilities that have been found within the Total Commander FileInfo Plugin. These vulnerabilities are local denial of service flaws and have been assigned CVE-2015-2869. In accordance with our Vendor Vulnerability Reporting and Disclosure policy, these vulnerabilities have been disclosed to the plugin author(s) and CERT. […]
Vulnerability Spotlight: Total Commander FileInfo Plugin Denial of Service
By Talos Group Talos is releasing an advisory for multiple vulnerabilities that have been found within the Total Commander FileInfo Plugin. These vulnerabilities are local denial of service flaws and have been assigned CVE-2015-2869. In accordance with our Vendor Vulnerability Reporting and Disclosure policy, these vulnerabilities have been disclosed to the plugin author(s) and CERT. […]

