<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1626328370711236&amp;ev=PageView&amp;noscript=1">
banner-blog.jpg

blog

FS-ISAC Miami: When saying no is a no-go

Posted by Peter Lunk on May 17, 2016

The city of Miami recently hosted the annual conference for the Financial Services Information Sharing and Analysis Center (FS-ISAC), and as expected, the top security teams from the largest banks were on hand to share information, network and enjoy the chaos that is South Beach.  For those unfamiliar with FS-ISAC, it is an industry forum for collaboration on critical security threats facing the global financial services sector. FS-ISAC is unique in that it was created by and for members and operates as a member-owned non-profit entity.

Read More

Tags: malware, web, isolation, security, user-experience

Top 50 UK Website Security Report

Posted by Jason Steer on Nov 12, 2015

Earlier this year, we released the State of the Web 2015 vulnerability report, which revealed more than 1 in 3 of the top Web domains are risky; and 1 in 4 of the most trusted sites (education and government) are vulnerable. We wanted to expand on this concept for the top 50 U.K. websites and use our technology to instrument how much code is being fetched and executed in a browser by the simple act of visiting popular websites. But why stop at just the code? Where did the code come from? How much of it is there and what systems dleiver this content? The findings were quite a surprise.

Read More

Tags: cybersecurity, web

The Evolution of the Web Gateway

Posted by Jason Steer on Sep 24, 2015

For the duration of my career in IT Security (16 years+ now), I have been able to work with and test a large number of security products that attempt to secure users and businesses from the Web. Back in 1998, the Web was just emerging as a platform to do business on. The biggest risk organizations faced was filling up their pipe with traffic, while caching proxy solutions such as open-source Squid technology had emerged to optimize bandwidth usage. However, caching was just the tip of the iceberg in terms of new risks.

Read More

Tags: malware, web, gateway, proxy

State of the Web 2015: Vulnerability Report

Posted by Kowsik Guruswamy on Mar 23, 2015

In February, security researchers reported Forbes.com had been hacked. As a result, any visitor to the site was infected – without clicking on any links. This incident was just the latest reminder that seemingly safe activities on the Web – like browsing the home page of a well known and trusted site like Forbes.com – is risky. With over one billion websites on the Internet, and more than 100,000 new sites coming online daily, we found ourselves wondering: Can we quantify the level of risk on the Web?

Read More

Tags: vulnerability, cybersecurity, web, report

Connect with us

Lists by Topic

see all

Recent Posts

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.