Don't Let Your Users Get Sucked into the Blackhole!
November 07, 2011 | POSTED BY BRETT EDGAR IN MALWARE, SECURITY
Over the past month, TRUE NSM analysts have observed a significant increase in the number of corporate web users being attacked by the Blackhole Exploit Kit. The rate of incidents reported involving this malware is now close to two per day. The Blackh...READ MORE +
November 03, 2011 | POSTED BY JEFF HARRIS IN UNCATEGORIZED
Security Notes are an archive of past short security-related articles written by current and former True analysts and colleagues prior to the introduction of the True Insight blog.
Finding Your Digital Security Swing
Protecting Yo...READ MORE +
3 P's of Information Security: Perimeter
November 03, 2011 | POSTED BY JERALD DAWKINS IN UNCATEGORIZED
In my last article I briefly discussed the three key components, or the "3 P's," of information security, perimeter, people and policies. We will start this month with perimeter and how vulnerabilities exist both inside as well as outside your company.
...READ MORE +