Introducing the Worldwide Malware Signature Counter
Today Triumfant added a malware signature counter to our Web site to represent an up-to-the-second counter of the number of signatures required by traditional signature based tools. The counter is...
View ArticleQuestions Answered About the Worldwide Malware Counter
The Worldwide Malware Counter introduced in Triumfant CEO John Prisco’s blog post yesterday has gotten a lot of interesting response and some questions that I thought I would address. Why should I care...
View ArticleStopping Stupid Part 2 – There is No Cyber Santa
A recently released study by Verisign states that 88% of American Web users are unable to spot a phishing Web site. This was done by showing sample users side-by-side comparisons of legitimate and...
View ArticleA Practical Primer on Triumfant – the ActiveX IE Exploit
In his blog The Last Watchdog, Byron Acohido discusses the recent zero day attacks that exploit a flaw in the video Active X component of the Internet Explorer browser. Acohido goes on to discuss why...
View ArticleWhy Bad Things Happen to Good Endpoints
I was with a prospect the other day and was asked what, at least for me, was a very thought provoking question. We were discussing the two major areas of application for Triumfant – continuous...
View ArticleSecurity Fails of 2009 – The Heartland Payment Systems Breach
This is the fifth in the series of Security Fails of 2009. As 2009 draws to a close I think no one would argue that this has been an extremely eventful year for IT security. While others will soon be...
View ArticleDefense in Depth – There is No Perfect Shield
Everyone wants the perfect shield for their endpoint population. All malware should be detected and blocked before it has a chance to do anything bad to any given machine. Nothing less is acceptable....
View ArticleThe Yin and Yang of Triumfant – Agent Based Precision With Network Level...
Yesterday I was in a conversation with Dave Hooks, our CTO, and a very smart person from the intelligence community, and, as often happens when I engage with people smarter than myself, I had an...
View ArticleTriumfant and Situational Awareness – The Google Model
I have written in this blog that while Triumfant is useful, innovative technology, I often struggle to come up with word pictures or analogies that help others grasp how useful and innovative it really...
View ArticleThe Nasdaq Breach Illustrates the Need for Continuous Monitoring
Dear Nasdaq, call me. I am here to help. The Wall Street Journal reported late Friday that Nasdaq had discovered that they had been hacked. The hackers never made it to the trading programs, but...
View Article