Remove 2011 Remove Malware Remove Operating Systems Remove Security
article thumbnail

Enhance Your Security Posture: Doing Four Things Can Reduce Unauthorized Penetrations by 85%

CTOvision

By Bob Gourley We often highlight the importance of applying security controls to your enterprise. As a review, they are: 20 Critical Security Controls – Version 4.1. Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers. Malware Defenses. Secure Network Engineering.

Security 278
article thumbnail

Security News: @Invincea Raises $16 Million in C-Series Funding Led by Aeris Capital and Dell Ventures

CTOvision

The acquisition and this new round of funding support Invincea’s rapid growth across the globe, expansion into the small business sector, and further solidifies its position as the market leader in this game changing cyber-security segment. FAIRFAX, VA–(Marketwired – Dec 16, 2013) – Invincea, Inc.,

Dell 249
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Invincea Announces 54 New Enterprise Customers for Its Flagship Enterprise Solution, $8.1M in Advanced Research Contracts for Its Labs Division

CTOvision

In the first quarter of 2014, the company’s advanced research division—Invincea Labs—secured $8.1M in new contracts for advanced cybersecurity projects for defense and federal government agencies in the areas of cloud-based advanced malware analysis, spear-phishing attacks against Android, and big data analytics for compromise detection.

CTO Hire 255
article thumbnail

Update on Invincea: Another year of breakthrough growth

CTOvision

Users Secured Worldwide; Secured Core IP Through Patent Awards; Leadership in Advanced Threat Protection Endpoint Security Market. Patent and Trademark Office (USPTO) that grew the company’s portfolio in isolation, containerization and detection techniques for protecting operating systems from targeted attacks.

Malware 150
article thumbnail

No, that public charger won’t hack your phone. probably

Vox

Juice jacking is when someone tampers with a charging station or USB port, allowing it to leach data from your phone or install malware on it while you top off your battery. The world was first introduced to juice jacking in 2011 when a demonstration at the hacking and cybersecurity conference DEF CON showed that it was possible.

Malware 98
article thumbnail

Going Mobile - A Screw's Loose

A Screw's Loose

The more ‘enlightened’ of us have started to talk about managing apps instead of devices, and managing data instead of operating systems. We see this as a way to protect our intellectual property and keep our corporate data secure. ©2011-2012 A Screws Loose. Uncategorized. Windows Phone. Tags Applications. Innovation.

Mobile 73
article thumbnail

Barn Doors - A Screw's Loose

A Screw's Loose

Security, no matter where you look everyone is talking about it these days. print Tagged as: Enterprise Strategy , Security. the point about security and mobile. changes the calculus when it comes to security. Greater mobility requires greater security. Also, the windows operating system. Barn Doors.

Mobile 60