Remove 2011 Remove Malware Remove Network Remove Security
article thumbnail

Enhance Your Security Posture: Doing Four Things Can Reduce Unauthorized Penetrations by 85%

CTOvision

By Bob Gourley We often highlight the importance of applying security controls to your enterprise. As a review, they are: 20 Critical Security Controls – Version 4.1. Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers. Malware Defenses. Secure Network Engineering.

Security 278
article thumbnail

Security News: @Invincea Raises $16 Million in C-Series Funding Led by Aeris Capital and Dell Ventures

CTOvision

The acquisition and this new round of funding support Invincea’s rapid growth across the globe, expansion into the small business sector, and further solidifies its position as the market leader in this game changing cyber-security segment. FAIRFAX, VA–(Marketwired – Dec 16, 2013) – Invincea, Inc.,

Dell 249
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Invincea Announces 54 New Enterprise Customers for Its Flagship Enterprise Solution, $8.1M in Advanced Research Contracts for Its Labs Division

CTOvision

Major Market Demand for Advanced Threat Protection Driving Rapid Platform Adoption and Expansion of Technology Ecosystem; Company Announces Integration With Palo Alto Networks’ Wildfire Platform. In the first quarter of 2014, the company’s advanced research division—Invincea Labs—secured $8.1M FAIRFAX, VA—April 7, 2014 —Invincea, Inc.,

CTO Hire 255
article thumbnail

Update on Invincea: Another year of breakthrough growth

CTOvision

Users Secured Worldwide; Secured Core IP Through Patent Awards; Leadership in Advanced Threat Protection Endpoint Security Market. 8,935,773 for “Malware Detector.”. Hundreds of malware forensic analysts are now using Invincea Research Edition. From: [link]. Invincea Announces Breakthrough Growth in 2014.

Malware 150
article thumbnail

Cisco Talos: Zeus spawn “Floki bot” malware gaining use, cyber-underworld notoriety

Network World

Cisco’s Talos security group this week warned that a variant of trojan monster Zeus has begun to garner a following in the cyber-underworld as a hard-to-detect attack mechanism. Floki bot] is based on the same codebase that was used by the infamous Zeus trojan, the source code of which was leaked in 2011.

Malware 60
article thumbnail

The Network Game - A Screw's Loose

A Screw's Loose

The Network Game. These all make up parts of our song on places you can’t get network access and need to use your mobile devices offline. ©2011-2012 A Screws Loose. Standard Disclaimer. A Screw's Loose. by Brian Katz on August 30, 2012 · 1 comment. So what do all these things have in common? Many hotels.

Network 43
article thumbnail

SeanDaniel.com [tech]: How to Stay Safe on Public Wi-Fi Networks

Sean Daniel

How to Stay Safe on Public Wi-Fi Networks. Over on Lifehacker.com , one of my favorite sites, they talk a bit about how to stay safe on Public, or even those looming “open” networks that you might discover in an apartment building. Labels: Security , Training and Awareness , Windows 7 , Windows Vista. at 11:51 AM.

Network 48