Quantcast
Channel: Exceptional Security » vulnerability management
Browsing latest articles
Browse All 10 View Live

Image may be NSFW.
Clik here to view.

Introducing the Worldwide Malware Signature Counter

Today Triumfant added a malware signature counter to our Web site to represent an up-to-the-second counter of the number of signatures required by traditional signature based tools.  The counter is...

View Article


Image may be NSFW.
Clik here to view.

Questions Answered About the Worldwide Malware Counter

The Worldwide Malware Counter introduced in Triumfant CEO John Prisco’s blog post yesterday has gotten a lot of interesting response and some questions that I thought I would address. Why should I care...

View Article

Image may be NSFW.
Clik here to view.

Stopping Stupid Part 2 – There is No Cyber Santa

A recently released study by Verisign states that 88% of American Web users are unable to spot a phishing Web site. This was done by showing sample users side-by-side comparisons of legitimate and...

View Article

Image may be NSFW.
Clik here to view.

A Practical Primer on Triumfant – the ActiveX IE Exploit

In his blog The Last Watchdog, Byron Acohido discusses the recent zero day attacks that exploit a flaw in the video Active X component of the Internet Explorer browser. Acohido goes on to discuss why...

View Article

Image may be NSFW.
Clik here to view.

Why Bad Things Happen to Good Endpoints

I was with a prospect the other day and was asked what, at least for me, was a very thought provoking question.  We were discussing the two major areas of application for Triumfant – continuous...

View Article


Image may be NSFW.
Clik here to view.

Security Fails of 2009 – The Heartland Payment Systems Breach

This is the fifth in the series of Security Fails of 2009.  As 2009 draws to a close I think no one would argue that this has been an extremely eventful year for IT security.  While others will soon be...

View Article

Image may be NSFW.
Clik here to view.

Defense in Depth – There is No Perfect Shield

Everyone wants the perfect shield for their endpoint population.  All malware should be detected and blocked before it has a chance to do anything bad to any given machine.  Nothing less is acceptable....

View Article

Image may be NSFW.
Clik here to view.

The Yin and Yang of Triumfant – Agent Based Precision With Network Level...

Yesterday I was in a conversation with Dave Hooks, our CTO, and a very smart person from the intelligence community, and, as often happens when I engage with people smarter than myself, I had an...

View Article


Image may be NSFW.
Clik here to view.

Triumfant and Situational Awareness – The Google Model

I have written in this blog that while Triumfant is useful, innovative technology, I often struggle to come up with word pictures or analogies that help others grasp how useful and innovative it really...

View Article


Image may be NSFW.
Clik here to view.

The Nasdaq Breach Illustrates the Need for Continuous Monitoring

Dear Nasdaq, call me.  I am here to help. The Wall Street Journal reported late Friday that Nasdaq had discovered that they had been hacked.  The hackers never made it to the trading programs, but...

View Article
Browsing latest articles
Browse All 10 View Live