How To Avoid Collateral Damage In Cybercrime Takedowns

Internet pioneer and DNS expert Paul Vixie says ‘passive DNS’ is way to shut down malicious servers and infrastructure without affecting innocent users. Botnet and bad-actor IP hosting service takedowns by law enforcement and industry contingents have been all the rage for the past few years as the good guys have taken a more aggressive […]

Continue Reading

Geek Out Over 4 New WildFire and Threat Prevention Features in PAN-OS 7.0

PAN-OS 7.0 is out and is jam-packed with new features including the following noteworthy WildFire and threat prevention features: Grayware Verdict The new WildFire grayware analysis result is introduced to clearly identify executables that behave similarly to malware, but are not malicious in nature or intent. A grayware result might be assigned to executables that […]

Continue Reading

Why China Wants Your Sensitive Data

Since May 2014, the Chinese government has been amassing a ‘Facebook for human intelligence.’ Here’s what it’s doing with the info. Leading into 2015, the cybersecurity community was still reeling from the impact of a destructive attack unlike any other we have seen in terms of visibility, scale, and impact. Already halfway into 2015, there […]

Continue Reading

Engaging with Clients on EMV Migration

Cyber security is universally important to businesses, whether they are large, global enterprises or small business retailers. Its importance is underscored by the looming October 2015 Europay, MasterCard, Visa (EMV) liability shift that can transfer transaction fraud responsibility in the US from financial institutions to businesses. With the shift now less than five months away, […]

Continue Reading
%d bloggers like this: