New & Notable
Threat management and prevention News
June 27, 2014
Vendor Trend Micro announced it's globalizing its regional partner program, offering its worldwide partner base a standardized set of program features, benefits and requirements.
April 23, 2014
New Cisco managed security services collect enterprise network telemetry and apply real-time analysis and detection of threats.
April 22, 2014
Cisco's Service Program Partners can now tap Managed Threat Defense managed security services for their customers.
January 08, 2014
Update: A Cisco researcher says last week's malvertisement attacks using Yahoo ads likely began prior to December 2013.
Threat management and prevention Get Started
Bring yourself up to speed with our introductory content
A peer-to-peer botnet is a decentralized group of malware-compromised machines working together for an attacker’s purpose without their owners’ knowledge. Just as in the traditional botnet, which includes a command-and-control server, the bots are ... Continue Reading
A botnet topology is the network structure by which botnet interconnections are organized. Botnet topologies may be either centralized around a command and control server (C&C server) or decentralized using peer-to-peer (P2P) communication. Continue Reading
Josh Sokol reviews the security technologies needed to support a successful security analytics program focused on advanced malware detection. Continue Reading
Evaluate Threat management and prevention Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
More granular data is needed from an enterprise IPS than ever before. Brad Casey explores why and reveals other ways to get the info sought. Continue Reading
Hear how one IT services professional resolved a Cryptolocker infection for a customer and why the virus is evidence customers need managed services. Continue Reading
Breach detection systems, a tier-two security technology, identify malware in transit and help you detect unknown breaches and side-channel attacks. Continue Reading
Manage Threat management and prevention
Learn to apply best practices and optimize your operations.
For those managed service providers with enough agility, Heartbleed provided an opportunity for IT solution providers to earn customers' loyalty. Continue Reading
Are critics of the penetration test wrong? Find out what breaking and entering your enterprise network can reveal about the state of your security. Continue Reading
Learn the seven bad habits that leave you vulnerable to Web-borne malware attacks, and the changes you can make to secure your online life in 2014. Continue Reading
Problem Solve Threat management and prevention Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Malware leveraging PKI and digital signatures is increasingly common. Nick Lewis explains the threat and five key defense strategies. Continue Reading
The key to Cryptolocker ransomware protection is having a good backup plan in place. Find out why this malware needs to be taken seriously. Continue Reading
Expert Nick Lewis covers the benefits of threat intelligence for enterprises, plus how to integrate intel feeds with existing security programs. Continue Reading