article thumbnail

Invincea Names Former Verizon Terremark CISO as Chief Operating Officer

CTOvision

the market leader in the use of secure virtual containers for user protection against advanced cybersecurity threats, today announced the appointment of Norm Laudermilch as the company’s first chief operating officer. GARTNER SECURITY & RISK MANAGEMENT SUMMIT, NATIONAL HARBOR, MD —June 23, 2014 – Invincea, Inc.,

Symantec 266
article thumbnail

Browser Isolation: The Missing Piece in Your Security Puzzle

SecureWorld News

The browser isolation technique considers non-whitelisted websites unreliable and isolates them from the local machine in a virtual environment. This approach decouples actual browsing from the endpoint and uses a remote virtual browser. Virtualization, sandboxing, and containerization technologies are used for this purpose.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Free Cloud Courses at Linux Academy — July 2019

Linux Academy

Principal Systems Engineer from Symantec Corporation and Ell Marquez for a Threat Report Rundown. Linux Academy Study Group July 2019: Symantec Threat Report Rundown. Students will explore how containers work, how they compare with virtual machines and Docker containers, and how they handle application isolation.

Course 60
article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

But to protect these systems, we need to understand these systems. So there’s a need, a definite need, for information security professionals to have access to industrial control systems -- not virtual, but actual hands on systems -- so they can learn. And how might we defend ourselves?

System 52
article thumbnail

The Hacker Mind: Follow The Rabbit

ForAllSecure

To access these sections of the building, there have to be doors, too, and behind these doors are the various companies, the various cloud clients with all their various virtual machines that can be spun up or spun down. And I remember calling Symantec and reporting a serious bug in an early version of their password manager.

article thumbnail

The Hacker Mind Podcast: The Fog of Cyber War

ForAllSecure

Vamosi: For most of my career I have speculated when and where there would be an escalation of physical war into the virtual world. And if you're building that kind of operation, it has to be run professionally. A cyberwar. So it pays off. So this trend actually started in the early 2000s.