The Ghosts of Malware Past
The year was 1987. Bon Jovi’s Livin’ on a Prayer was blasting through every cassette player. Fred Cohen, the man who arguably coined the phrase “computer virus“ in his paper, Computer Viruses: Theory...
View ArticleISSA Journal: Heap Sprays to Sandbox Escapes
I’m pleased to post my article that got published in the January 2013 release of the International ISSA journal. The title of the article is “Heap Sprays to Sandbox Escapes: A Brief History of Browser...
View ArticleThe Friction Affliction
Reformed burglars will tell you that leaving the TV on at night is a better theft deterrent than the best alarm system. Most of us don’t think of our television as a security device, let alone a better...
View ArticleClimbing Mount Never Rest: Features vs Security in Browsers
In a recent post on ZDNet, Larry Seltzer makes the case that browser security has peaked, and argues that “that’s probably a good thing”. Browser security may well have peaked, but it’s definitely not...
View ArticleAnother massive breach, are you THE Target?
Yesterday, online giant Target disclosed that approx 40 million of their customers could be impacted by a breach. The stolen data is reported to include customer names, credit and debit card numbers,...
View ArticleLightning Strikes Twice: First Target, Now eBay
This morning, Graham Cluley Security News broke the news that eBay confirmed a security breach that could impact 128 million active users. According to eBay, the compromised database contains user...
View ArticleThe Implications of “Endpoint Protection: Attitudes and Opinions”
Bromium has just published the results of “Endpoint Protection: Attitudes and Opinions,” a survey of more than 300 information security professionals, focused on end user threats and security. The...
View ArticleThe Dawn Of A New Era In Corporate Cyber Threats?
Cyber criminals know where the money is and have been attacking businesses in the hopes of getting a big payout for many years. Hacking and manipulating financial systems to steal money or customer...
View ArticleIf you had only one more security dollar…
what would you spend it on? Improve endpoint security, or better protect your network or your applications? This was the topic debated by three Gartner security analysts: Neil MacDonald (endpoint),...
View ArticleDetectible Dysfunction
In 2003, security industry analyst Richard Stiennon famously declared that intrusion detection systems would be obsolete by 2005, writing at the time: “The underlying problem with IDS is that...
View ArticleHow do you spell “Polymorphic”?
I guess the answer is “i r o n y”: Last week a Bromium field employee searched for “polymorphic” on dictionary.com and was treated to a gloriously literal definition: The site dropped a banking...
View ArticleThe Rise and Fall of Enterprise Security
Every day, enterprises are bombarded by rapidly multiplying and morphing advanced threats—and current network and endpoint security solutions aren’t capable of defeating these targeted attacks. This...
View ArticleBlack Hat Survey: End Users Remain Biggest Security Headache as Compromised...
Earlier this year, Bromium published “Endpoint Protection: Attitudes and Opinions,” a statistical analysis of more than 300 information security professionals. The results revealed that endpoints are...
View ArticleGoldilocks and the 3 Theres (1/2)
At VMWorld VMware SVP of Security Tom Korn described the hypervisor and virtual network environment of a virtual infrastructure platform as the “Goldilocks Zone” for application security in the...
View ArticleMany Eyes Make Credible Security
We are proud to announce the successful results of an independent source-code review and penetration test of vSentry version 2.4 by the leading security consultancy IOActive – acknowledged as one of...
View ArticleChasing the White Whale: How Advanced Attacks Leverage Spear Phishing
Update: Breaking News: ICANN targeted in a spear phishing attack Information security becomes increasingly important as the frequency of cyber attacks increases. From Target to Sony, the past 12 months...
View ArticleBromium Partners to Bring Micro-virtualization to Windows 10
Bromium has partnered with Microsoft to ensure Bromium micro-virtualization and Windows 10 will work better together to provide the most secure endpoint solution on the market. Windows 10 offers...
View ArticleBromium is a Distinguished Security Vendor in the 2017 TAG Cyber Annual
Released today, Ed Amoroso’s 2017 TAG Cyber Security Annual – a practical guide for anyone serious about cybersecurity. Simon Crosby talks about his experience with Ed and why this compendium is worth...
View ArticleData Loss Prevention Comes Free with Bromium
Bromium does more than provide powerful isolation protection for endpoints and servers. We provide DLP controls that can help you strengthen your security. At no additional cost, you can apply quite...
View ArticleCrosby on the Real Hacking Risks for the US Election
We’ve taken elections for granted for our entire lives. We vote, we go home and we watch the returns on television. But with technology becoming part of the process, does that mean we putting...
View Article
More Pages to Explore .....