XG Firewall flies high in NSS Labs tests

Credit to Author: Chris McCormack| Date: Fri, 28 Jul 2017 17:13:55 +0000

Sophos XG Firewall is among the top in the industry for security effectiveness, performance and value.<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&#038;blog=834173&#038;post=41086&#038;subd=sophos&#038;ref=&#038;feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/0Hmcw3SSr8c” height=”1″ width=”1″ alt=””/>

Read more

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of July 24, 2017

Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 28 Jul 2017 17:25:08 +0000

This week, I attended the Black Hat conference in Las Vegas, Nevada. 2017 marked the 20th anniversary of the Black Hat conference. A lot has certainly changed since I started attending back in 2002. I’m sure that many will have their opinions on the central themes that they saw at the conference (artificial intelligence was…

Read more

Fireball arrests made

Credit to Author: Pieter Arntz| Date: Fri, 28 Jul 2017 15:30:25 +0000

Following some arrests in China, we hope to see a decrease in the amount of adware and adfraud hailing from the Rafotech labs aka Fireball.

Categories:

Tags:

(Read more…)

The post Fireball arrests made appeared first on Malwarebytes Labs.

Read more

It’s a Small World for Colocation Providers…After All

Credit to Author: Greg Jones| Date: Fri, 28 Jul 2017 13:00:50 +0000

One of my favorite pieces of my job is the opportunity to interact with customers and colleagues from around the globe. The Cloud & Service Provider space is, in many… Read more »

The post It’s a Small World for Colocation Providers…After All appeared first on Schneider Electric Blog.

Read more

Bringing behavioral game theory to security defenses


Kelly Shortridge and CSO senior writer Fahmida Y Rashid talk about using behavioral game theory to take advantage of hackers’ mistakes and manipulate the data they think they're receiving. People generally make decisions by either thinking ahead to figure out how people may act in a given situation, or by learning over time by observing what people are doing. Since attackers learn over time by collecting feedback, obfuscating what they get can really mess up what the attackers are able to learn.

Read more