aidarrow-end-inversearrow-endWhy choose AvectoAchieve complianceOperational efficiencycompliancedefendpoint-coloureddefendpoint-thin-2DesktopScaleResources.iconsAsset 21insider-threatsavecto-logo-smallquotation-marksransomwareResources.iconsResources.iconsResources.iconsResources.iconsResources.iconsResources.iconssafePrevent attacksAsset 19social-engineeringTrustedtriangleStop insider attacksAsset 20Resources.iconsResources.iconszero-days
Date published
3/9/2017 10:00:46 AM
Contributor:
James Maude

WikiLeaks’ CIA documents offer us an important reminder

With news breaking on the CIA’s ability to listen in via Smart TVs, many will be alarmed by the breadth of the exploits WikiLeaks has uncovered. The security industry has been warning of the dangers of Internet of Things devices for a long time and just last week, a hack on internet-connected teddy bears was making the headlines.

Continue reading
Date published
1/27/2017 2:49:46 PM
Contributor:
Laura Butler

Avecto’s channel predictions for the year ahead

A new year brings with it a new set of security challenges. From the escalation of ransomware and social engineering to the Internet of Things and the continued security headache that presents. Keeping pace with these challenges and staying one step ahead of cyber crime will be critical for security vendors but it also has a significant knock-on effect for the channel.

Continue reading
Date published
1/24/2017 3:01:33 PM
Contributor:
James Maude

How proactive protection can eclipse Shamoon

In recent days, Saudi Arabia has warned organizations in the kingdom to be on the alert for the Shamoon computer virus, a variant of which gained notoriety after being linked to attacks against Saudi Aramco in 2012 and reportedly damaged over 30,000 systems.

Continue reading
Date published
1/22/2017 3:22:32 PM
Contributor:
Katy Batley

Customer Success: It Takes A Village

Recently I was in a meeting discussing a customer that had been particularly slow to adopt our solution and someone said to me “Isn’t that your job?” and for a moment I felt personally culpable for the failure of a speedy time-to-value for customer X.

Continue reading
Date published
12/21/2016 2:27:07 PM
Contributor:
Brian Hanrahan

Moving the DXL story forward

Over the course of 2016, McAfee has been progressing a story and supporting a technical strategy that addresses the challenges of a rapidly changing risk landscape. In recent years at McAfee’s annual security conference, FOCUS, we’ve seen Chris Young, Brian Dye and others mature a narrative that started with more integrated products, and then an integration framework with the Data Exchange Layer (DXL) and now a DXL that’s going to be released as open source.

Continue reading
  1. 1
  2. ...
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. ...
  9. 26