September 16th, 2016
For a long time, the threat intelligence landscape could be likened to an archipelago; a collection of islands. There were a few bridges here and there but the various islands remained largely inaccessible. It became clear, however, that in this era of rapidly evolving and advanced threats, we needed to find a way to build those bridges, to join the dots and ensure each part of the ‘security archipelago’ is not only connected, but integrated, with open channels of communication.
- November 8th, 2016
Throughout history humans have sought to socially engineer each other, exploiting social norms and applying pressure to reveal information or gain advantage. From travelling conmen and master spies to cyber threats and phishing emails the fundamental problem is the same, humans can be manipulated.
- November 2nd, 2016
Security researchers at enSilo recently released a novel code injection technique for Windows known as ‘Atom Bombing’. This is so called because it exploits Windows atom tables and Async procedure calls (APC) to evade detection by many common security solutions.
- October 19th, 2016
Gartner recently published its paper; “The Real Value of a Non-Signature-Based Anti-Malware Solution to Your Organization”, providing insight into how non-signature approaches to malware prevention can not only prevent attacks but offer reduced footprints on the endpoint. As you would expect Avecto is mentioned as one of the vendors in this space.
- October 4th, 2016
Leveraging technology partnerships to drive customer value
- September 30th, 2016
Over the past 30 years we’ve seen business technologies come and go in a rapidly evolving landscape of innovation and ingenuity. You could be forgiven for thinking that in the time we shrunk a computer down to the size of a wristwatch and established high speed connectivity to every corner of the globe that we would have also revolutionized information security.