aidarrow-end-inversearrow-endWhy choose AvectoAchieve complianceOperational efficiencycompliancedefendpoint-coloureddefendpoint-thin-2DesktopScaleResources.iconsAsset 21insider-threatsavecto-logo-smallquotation-marksransomwareResources.iconsResources.iconsResources.iconsResources.iconsResources.iconsResources.iconssafePrevent attacksAsset 19social-engineeringTrustedtriangleStop insider attacksAsset 20Resources.iconsResources.iconszero-days
Date published
3/14/2016 1:22:44 PM
Contributor:
Brian Hanrahan

Application authentication needs a reboot

Last week marked an exciting new first – ransomware on a Mac disclosed by Palo Alto who had seen it with a client. What’s simultaneously encouraging and disappointing is that it could have been prevented without detection using highly recommended best practices – application whitelisting.

Continue reading
Date published
9/1/2015 10:34:45 AM
Contributor:
Paul Kenyon

Prevention is possible

No longer will historic methods of blocking and protection be the only tenets of a security strategy, focus will be on next generation technologies and also detection and response.

Continue reading
Date published
8/18/2015 7:14:23 PM
Contributor:
James Maude

Fear and Loathing in Las Vegas - Advanced attacks and the InfoSec dream

During August members of the InfoSec community leave the comfort of their ergonomic desks and head out into the Nevada desert on a spiritual pilgrimage to Las Vegas. This mass movement is no coincidence, the draw is clear with Black Hat, DEF CON, BSides Vegas and the Star Trek Convention all occurring within a week. If you have an interest in offensive security, protecting data or ensuring your car cannot be remotely hijacked, Las Vegas is the place to be in August.

Continue reading
Date published
1/28/2015 3:52:31 PM
Contributor:
Andrew Avanessian

Defending your business this Data Privacy Day

Since 2007, January 28th has marked Data Privacy Day (or Data Protection Day in Europe), the annual awareness day to promote privacy and data protection best practices. The day is recognized in the United States, Canada, the UK and 26 other European countries through a number of initiatives focused on raising awareness among businesses and personal users about the importance of protecting the privacy of their personal information, particularly in the context of social networking.

Continue reading
Date published
1/12/2015 2:35:47 PM
Contributor:
James Maude

Return of the Macro

Just like fashion, malware goes through trends and comebacks, so let's take a look at what's 'in' this season. Anyone involved in IT in the 1990's will remember a few things; plaid shirts, floppy disks and macro viruses. Although I can't envisage the former two making a comeback any time soon, macros are definitely back on the InfoSec agenda, something Microsoft has been highlighting recently.

Continue reading
Date published
1/7/2015 12:21:45 PM
Contributor:
James Maude

Five New Year Security Resolutions

Many of us usher in the New Year with a set of aims or ambitions. If you've made a vow to get a better grip of IT security in 2015, what can you do to quickly and easily improve your security posture in the year ahead? Here we take a look at the top 5 quick wins.

Continue reading
  1. 1
  2. 2