- November 2nd, 2016
Security researchers at enSilo recently released a novel code injection technique for Windows known as ‘Atom Bombing’. This is so called because it exploits Windows atom tables and Async procedure calls (APC) to evade detection by many common security solutions.
- December 4th, 2015
Here at Avecto we believe that security products should be secure by design, meaning that they are designed from the ground up to be secure. A key principle is that you should be able to share details of the design without compromising its security, as opposed to security by obscurity, where you are reliant on keeping the solution secret to prevent a compromise.
- May 1st, 2015
Last week I was talking to a customer about whitelisting policies. Having rolled out least privilege, application control and sandboxing to their estate they had gone from hundreds of security incidents per week to virtually none. This has caused the security team to become more proactive by shifting from constant firefighting and reacting to incidents to thinking strategically and planning ahead.
- November 27th, 2014
As America recovers from Turkey overload this Thanksgiving, thrifty shoppers are dusting off their credit cards to satisfy an altogether different appetite – the appetite for a bargain. With Black Friday already upon us and Cyber Monday just around the corner, online retailers are offering their most tempting holiday deals.
- October 29th, 2014
Last year, 73% of the UK population accessed the internet every day, according to figures from the ONS, and in our workplaces, more and more time is spent online.
Today’s workers expect full access to online content in order to do their jobs effectively. With the rising influence of millennial employees, an increasing number expect to be able to access social media and other personal content at all times too.