There was a flurry of news articles out recently highlighting some interesting data points from IDC. In particular, according to IDC, worldwide factory revenue from security appliances was up 7.2% year on year to $2.3 billion, as unit shipments increased 5.2% to 538,428. Granted, Q4 is generally the strongest quarter in the tech industry, so it should be no surprise to most to see a strong finish to the year
Spamhaus, Cyberbunker and the largest DDoS attack on Record
Botnet owners took a page out of Chef Emeril Legasse’s cookbook and ‘kicked it up a notch’ last week when they launched a massive Distributed Denial of Service (DDoS) attack on Internet spam fighter Spamhaus, content delivery provider CloudFlare and other Internet infrastructure providers. The Spamhaus Project provides blacklisting services to many ISPs and email servers around the world with the intent of stopping the billions of spam emails sent daily
Sandboxing Technologies, Techniques Get Another Look
Neil MacDonald, a vice president at Gartner, wrote in a blog last week the idea of sandboxing potentially malicious content and applications isn’t new, but interest in this type of approach – particularly on Windows desktops – is on the rise. A growing number of virtualization and abstraction techniques available on Windows, he wrote, create isolation to provide security separation. FortiGuard Labs describes sandboxing as a practice employed by security technology to separate running progra…
Insomni’hack 2013
Insomni’hack 2013 took place last week at Geneva and I had the opportunity to attend. Insomni’hack DAY 1 consisted of one day workshops on subjects ranging from “Linux exploitation” to “How to make sure your Pentest Report is never empty”. I had the chance to attend a workshop on “Practical ARM exploitation” given by black Steve (@s7ephen) and white Steve (Stephen Lawler)
Deloitte Survey Finds Breaches Across Industries
A mid-February 2013 Deloitte Tech Trends poll of 1,749 business executives found more than one in four report their organizations were the victims of at least one cyber attack in the past year. Nine percent report multiple breaches, and 17 percent say they are not confident their organizations could detect an attack
NBC.com Infected With Malware Targeting Personal Financial Information
46 security vendors were tested and only 3 were able to detect and mitigate the infected NBC.com malware.
Microsoft Exchange Server® Monitoring Best Practices
Learn more about monitoring the performance and health of your Microsoft Exchange Server: www.solarwinds.com Exchange exposes so many performance counters – how do you know what is important to monitor and what thresholds are optimal for your environment? And what do you do when something goes wrong?
How to prevent DoS attacks?
DoS attacks are one of the most dreaded form of network attacks among Enterprises and SMBs since they could paralyze network activity completely. The after-effects of these attacks are even more that they have a long-standing impact on the image of the brand if the company caters to the consumer segment. If Amazon has a DoS attack on its network, it will hit the headlines in a few hours.
How to Actively Defend Your Network Using SolarWinds Log and Event Manager
Keeping your network secure is a full-time responsibility. The ability to rapidly identify and respond to malicious activity is imperative, but you can’t be on-guard 24/7. That’s where the real-time event correlation and active response capabilities of SolarWinds’ Log and Event Manager can help.
Drobo Product Overview
Web celebrity Cali Lewis explains what makes Drobo special. See the other videos at youtube.com for more information on Drobo storage for Professionals and Drobo storage for Business — certified for VMware, Citrix, MS Exchange and file sharing / offsite backup.