Remove .Net Remove Architecture Remove Firewall Remove Malware
article thumbnail

Endpoint security renaissance in the era of hybrid work

CIO Business Intelligence

Back then, protecting endpoints involved anti-malware tools that sniff out suspicious files based on static signatures. This network perimeter made it simple to cast a wider net that protects all the assets within the enterprise. Unifying endpoint security architecture. inch floppy disks to the attendees of a WHO conference?

article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

So he invites me to go to a book that, you know, one of those first black hats and Doug Song was set doing his thing on checkpoint firewall bypass, and I'm sitting there, and a guy named Jeff Nathan. Let's analyze malware. Let's take apart packet captures you know, Project Honey net was going well. Come sit next to me.