Tag Archives: McAfee

Information, The Next Battlefield

Today the Information Security Arena has been shaken by two separate, although similar, events: IBM and McAfee, two giants in this troubled market, have separately decided to make a decisive move into the Security Information And Event Management (SIEM) market by acquiring two privately held leading companies in this sector.... Read More

Processor Assisted Or OS Embedded Endpoint Security?

Yesterday, September the 13th 2011, the Information Security Arena has been shaken by a couple of announcements earthquakes unleashed by two of the most important players in this market.... Read More

August 2011 Cyber Attacks Timeline

Here it is the complete list of Main Cyber Attacks for July: definitively it looks like the Dog Days did not stop the Cyber Attacks, which have been particularly numerous during August.... Read More

August 2011 Cyber Attacks Timeline (Part I)

Update Sep 2: August 2011 Cyber Attacks Timeline (Complete List)... Read More

Five Years of Hacking (Updated)

Strange Days for Information Security, you may watch my July 2011 Attacks Chart for noticing how troubled July has been. August promises to be even worse, but this is not the point…... Read More

The Antivirus is Dead, Long Live the Antivirus!

The Google Chromebook (that is the first Chromium OS powered devices) was presented few days ago (and is ready to reach our shelves for the half of June), but only yesterday I accidentally came across an interesting article (which I had already reported in yesterday’s post) which led me to several thoughts concerning the future of endpoint security, or better, how endpoint protection technologies will adapt themselves to the rapidly mutating landscape, which is shifting from an endpoint-centric to a cloud-centric model. My personal confessions of a dangerous mind derive from Google’s assertion that: Chromebooks have many layers of security built in so there is no anti-virus software to buy and maintain. Moreover, the fact that data reside mainly on the cloud moves the data protection requirements towards the cloud rather than on the endpoint.  If this is true many security giants (such as Intel McAfee, Symantec, Trend Micro, etc.) focalized on endpoint would seriously have to worry about.... Read More

Top Security Challenges for 2011: Check Point’s Perspective

At the last Check Point Experience in Barcelona, the Israeli-based company unleashed its own Top Security Challenges for 2011.... Read More

Some Random Thoughts On The Security Market

The intention by UK-headquartered company Sophos to acquire Astaro, the privately-held security company co-headquartered in Karlsruhe, Germany and Wilmington, Massachusetts (USA) is simply the last effect of the process of vendor consolidation acting in the information security market. It is also the trigger for some random thoughts…... Read More

Other Considerations On TCP Split Handshake

The storm unleashed by NSS Labs test for the TCP split handshake attack which affected 5 firewall vendors  is far from being quiet.... Read More

SCADA Security: Bridge the Gap

Utilities and Security Vendors are taking very seriously the events of Stuxnet and they’re consequently running for cover. Although due to natural events, the dramatic facts of Fukushima have shown to the entire World (and likely to Cyber-terrorists) how close we are to the abyss of a nuclear meltdown, with the consequent fear that a simil-Stuxnet malware could give the final push (even if according to some urban legends Stuxnet might have played a role in the failure of cooling systems afterward the Tsunami of March 11, 2011).... Read More