Quantcast
Channel: Security – A Collection of Bromides on Infrastructure
Browsing all 48 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

The Ghosts of Malware Past

The year was 1987. Bon Jovi’s Livin’ on a Prayer was blasting through every cassette player. Fred Cohen, the man who arguably coined the phrase “computer virus“ in his paper, Computer Viruses: Theory...

View Article



Image may be NSFW.
Clik here to view.

ISSA Journal: Heap Sprays to Sandbox Escapes

I’m pleased to post my article that got published in the January 2013 release of the International ISSA journal. The title of the article is “Heap Sprays to Sandbox Escapes: A Brief History of Browser...

View Article

Image may be NSFW.
Clik here to view.

The Friction Affliction

Reformed burglars will tell you that leaving the TV on at night is a better theft deterrent than the best alarm system. Most of us don’t think of our television as a security device, let alone a better...

View Article

Image may be NSFW.
Clik here to view.

Climbing Mount Never Rest: Features vs Security in Browsers

In a recent post on ZDNet, Larry Seltzer makes the case that browser security has peaked, and argues that “that’s probably a good thing”.  Browser security may well have peaked, but it’s definitely not...

View Article

Image may be NSFW.
Clik here to view.

Another massive breach, are you THE Target?

Yesterday, online giant Target disclosed that approx 40 million of their customers could be impacted by a breach. The stolen data is reported to include customer names, credit and debit card numbers,...

View Article


Image may be NSFW.
Clik here to view.

Lightning Strikes Twice: First Target, Now eBay

This morning, Graham Cluley Security News broke the news that eBay confirmed a security breach that could impact 128 million active users. According to eBay, the compromised database contains user...

View Article

Image may be NSFW.
Clik here to view.

The Implications of “Endpoint Protection: Attitudes and Opinions”

Bromium has just published the results of “Endpoint Protection: Attitudes and Opinions,” a survey of more than 300 information security professionals, focused on end user threats and security. The...

View Article

Image may be NSFW.
Clik here to view.

The Dawn Of A New Era In Corporate Cyber Threats?

  Cyber criminals know where the money is and have been attacking businesses in the hopes of getting a big payout for many years. Hacking and manipulating financial systems to steal money or customer...

View Article


Image may be NSFW.
Clik here to view.

If you had only one more security dollar…

what would you spend it on?   Improve endpoint security, or better protect your network or your applications? This was the topic debated by three Gartner security analysts: Neil MacDonald (endpoint),...

View Article


Image may be NSFW.
Clik here to view.

Detectible Dysfunction

In 2003, security industry analyst Richard Stiennon famously declared that intrusion detection systems would be obsolete by 2005, writing at the time: “The underlying problem with IDS is that...

View Article

Image may be NSFW.
Clik here to view.

How do you spell “Polymorphic”?

I guess the answer is “i r o n y”:  Last week a Bromium field employee searched for “polymorphic” on dictionary.com and was treated to a gloriously literal definition: The site dropped a banking...

View Article

Image may be NSFW.
Clik here to view.

The Rise and Fall of Enterprise Security

Every day, enterprises are bombarded by rapidly multiplying and morphing advanced threats—and current network and endpoint security solutions aren’t capable of defeating these targeted attacks. This...

View Article

Image may be NSFW.
Clik here to view.

Black Hat Survey: End Users Remain Biggest Security Headache as Compromised...

Earlier this year, Bromium published “Endpoint Protection: Attitudes and Opinions,” a statistical analysis of more than 300 information security professionals. The results revealed that endpoints are...

View Article


Image may be NSFW.
Clik here to view.

Goldilocks and the 3 Theres (1/2)

  At VMWorld VMware SVP of Security Tom Korn described the hypervisor and virtual network environment of a virtual infrastructure platform as the “Goldilocks Zone” for application security in the...

View Article

Image may be NSFW.
Clik here to view.

Many Eyes Make Credible Security

We are proud to announce the successful results of an independent source-code review and penetration test of vSentry version 2.4 by the leading security consultancy  IOActive – acknowledged as one of...

View Article


Image may be NSFW.
Clik here to view.

Chasing the White Whale: How Advanced Attacks Leverage Spear Phishing

Update: Breaking News: ICANN targeted in a spear phishing attack Information security becomes increasingly important as the frequency of cyber attacks increases. From Target to Sony, the past 12 months...

View Article

Image may be NSFW.
Clik here to view.

Bromium Partners to Bring Micro-virtualization to Windows 10

Bromium has partnered with Microsoft to ensure Bromium micro-virtualization and Windows 10 will work better together to provide the most secure endpoint solution on the market. Windows 10 offers...

View Article


Image may be NSFW.
Clik here to view.

Bromium is a Distinguished Security Vendor in the 2017 TAG Cyber Annual

Released today, Ed Amoroso’s 2017 TAG Cyber Security Annual – a practical guide for anyone serious about cybersecurity. Simon Crosby talks about his experience with Ed and why this compendium is worth...

View Article

Image may be NSFW.
Clik here to view.

Data Loss Prevention Comes Free with Bromium

Bromium does more than provide powerful isolation protection for endpoints and servers. We provide DLP controls that can help you strengthen your security. At no additional cost, you can apply quite...

View Article

Image may be NSFW.
Clik here to view.

Crosby on the Real Hacking Risks for the US Election

We’ve taken elections for granted for our entire lives. We vote, we go home and we watch the returns on television. But with technology becoming part of the process, does that mean we putting...

View Article
Browsing all 48 articles
Browse latest View live




Latest Images