Mobile Malware and Future Threats
By JonathanTabb Wired.com had an excellent article last week about Mobile Malware and it got me thinking about future computer threats a little. Let’s see where my mind went: Mobile devices far outrank...
View ArticleAir Force Cyber spending could increase, Symantec releases anti-malware...
By Ryan Kamauff Here are the top cyber news and stories of the day. Air Force CIO: Cyber spending could increase - While the overall DoD budget will be receiving cuts, the Air Force CIO, Lt. Gen....
View ArticleHighlights from the new CIO Council Mobility Report, Android App Scanner...
By Ryan Kamauff Here are the top cyber news and stories of the day. 5 highlights from new CIO Council federal mobility report - FedScoop has a great piece on the recent Federal CIO Council’s Mobility...
View ArticleRenders Leak for purported HTC superphone, Facebook Messenger unleashes VOIP...
By Ryan Kamauff Here are the top mobile news and stories of the day. Samsung Chromebox with Intel Core i5 surfaces - One of my more recent purchases was a Samsung ARM Chromebook. I have become a big...
View ArticleTriumfant: Malware Detection and Remediation
By Marcus Williams Background Triumfant, Inc. is a privately held company with a focus on detecting and remediating cyber attacks. Triumfant has a ’Assume Nothing, Scan everything’ approach to cyber...
View ArticleHTML5 Security: Learn more about two of many new attacks
By Carsten EilersHTML5 brings new opportunities – for developers and for attackers. Here you will see two examples of how an attacker could abuse HTML5 and how you as a developer could prevent this (or...
View ArticleGSA pilot program revolutionizes the personal office, Malware now spreads...
By Ryan KamauffHere are the top cyber news and stories of the day. GSA pilot program revolutionizes the personal office – The GSA is using hoteling to allow employees to reserve office space when they...
View ArticleHHS tools, data unleashed as part of Health Datapalooza IV, Hackers are...
By Ryan KamauffHere are the top cyber news and stories of the day. The future of military sensor systems: self-powered wireless Android boxes – DARPA’s new prototype sensor is an Android device with...
View ArticleInvincea and Dell: New OEM agreement delivers cutting edge security to...
By Bob GourleyI’ve mentioned before how proud I am to be associated with Invincea as a member of their advisory board. They are a firm with a fantastic team of engineers and executives led by a...
View ArticleMedical devices vulnerable to hackers, 2013′s biggest security snafus and more
By Ryan Kamauffimage via mobihealthnews Here are the top cyber news and stories of the day. Medical devices vulnerable to hackers warns FDA – “In a recent safety alert, the FDA has officially outlined...
View ArticleNapolitano urges successor to prepare for cyber attack, China reportedly...
By Ryan KamauffHere are the top cyber news and stories of the day. Napolitano urges successor to prepare for cyber attack – “Outgoing Homeland Security Secretary Janet Napolitano said Tuesday that her...
View ArticleWe All Need This: Invincea Launches Small Business Offering To Address Highly...
By Bob GourleyEditor’s note: We have written before about the very capable firm Invincea and how honored I am to serve on their advisory board. Some particularly exciting news is provided below from...
View ArticleInterview of @Invincea by @SecureNinja at @FedCyber 2013
By Bob GourleySecureNinjaTV’s Alicia Webb speaks with Eddie Mitchell from Invincea while at FEDcyber 2013 about placing users in a secure virtual “bubble” to protect them from…themselves! as well as...
View ArticleSecurity News: @Invincea Raises $16 Million in C-Series Funding Led by Aeris...
By Bob GourleyAnnounces Acquisition of Sandboxie to Expand Global Reach, Small Business Footprint and Consolidate the Two Leading Brands in Burgeoning Virtualized Containment Solutions Market FAIRFAX,...
View ArticleTriumfant: Malware Detection and Remediation
By Marcus WilliamsBackground Triumfant, Inc. is a privately held company with a focus on detecting and remediating cyber attacks. Triumfant has a ’Assume Nothing, Scan everything’ approach to cyber...
View ArticleHTML5 Security: Learn more about two of many new attacks
By Carsten EilersHTML5 brings new opportunities – for developers and for attackers. Here you will see two examples of how an attacker could abuse HTML5 and how you as a developer could prevent this (or...
View ArticleHHS tools, data unleashed as part of Health Datapalooza IV, Hackers are...
By Ryan KamauffHere are the top cyber news and stories of the day. The future of military sensor systems: self-powered wireless Android boxes – DARPA’s new prototype sensor is an Android device with...
View ArticleInvincea and Dell: New OEM agreement delivers cutting edge security to...
By Bob GourleyI’ve mentioned before how proud I am to be associated with Invincea as a member of their advisory board. They are a firm with a fantastic team of engineers and executives led by a...
View ArticleInvincea: Advanced malware threat detection, breach prevention and forensic...
Invincea is the premier innovator in advanced malware threat detection, breach prevention, and forensic threat intelligence. https://www.youtube.com/watch?v=ewrUY3l-vtI Invincea FreeSpace™ is an...
View ArticleInvincea Announces 54 New Enterprise Customers for Its Flagship Enterprise...
By Bob Gourley Editor’s note: I have remarked before how proud I am to be on the Invincea advisory board. News like the release below shows how virtuous this firm is being in the enterprise IT domain....
View Article