Researcher Shows Why Tor Anonymity Is No Guarantee Of Security

Researcher Shows Why Tor Anonymity Is No Guarantee Of Security

Tor exit node in Russia spotted downloading malicious code. Users of the Tor network now have one more reason to be cautious when using the service to browse the Internet or to download executable code anonymously. A security researcher last week uncovered a malicious Tor exit node in Russia being used by unknown attackers to [...]

You’ve Never Seen Love This Deep For An Enterprise Security Platform

You’ve Never Seen Love This Deep For An Enterprise Security Platform

Once in a while, you come across a story that grabs your attention and makes you wonder how it would apply to your own situation. Last year, one such story was the film ‘Her.’ It portrayed an everyday person falling in love with an everyday technology called OS1 and its voice, Samantha. The analogy? We [...]

IoT Security: Sorting Through the Noise to Take Action

IoT Security: Sorting Through the Noise to Take Action

This post originally appeared on Iron Bow Technologies’ Techsource page. Editor’s Note: In honor of National Cyber Security Awareness Month (NCSAM) we are focusing our content on tips and best practices in the area of cyber security. This week, we are emphasizing the importance of protecting critical infrastructure and properly securing all devices that are connected [...]

How to Strengthen Data Center Security Without Compromising Application Performance

How to Strengthen Data Center Security Without Compromising Application Performance

Starting next week, we will be on the road with VMware and VMUG in the U.S. and Canada to discuss how you can strengthen your data center security without compromising application performance. Click through to register for one of the below events. Space is limited so sign up now! Palo Alto – Tuesday, November 4, 2014 [...]