Blog

Need Answers Fast?

Call 858-715-3837 or email us for immediate assistance.

Get Support Now

G2 News

July 03 2013

Fortinet to Announce Second Quarter 2013 Financial Results

Fortinet to Announce Second Quarter 2013 Financial Results …read more Via: Shareholder

July 02 2013

Nine HIPAA Network Considerations

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) Omnibus Final Rule, released January 2013, introduced some significant changes […] …read more Via: Cisco Security Blog

July 01 2013

Chip Shot: Intel® System Studio Extended to Linux* Embedded App Developers

Intel is expanding its Intel

Industry News

February 10 2016

Microsoft and Acer expand partnership to bring Microsoft services to more customers on more devices

REDMOND, Wash., and TAIPEI, Taiwan — Feb. 10, 2016 — Microsoft Corp. and Acer Inc. announced on Wednesday the expansion of their global partnership to bring Microsoft mobile productivity services to more consumers. From the second half of 2016, Acer will begin pre-installing Microsoft services and apps on its portfolio … Read more »

February 10 2016

DNSChanger Outbreak Linked to Adware Install Base

[Ed. note: This post was authored by Veronica Valeros , Ross Gibb , Eric Hulse, and Martin Rehak ] Late last autumn, the detector described in one of our previous posts,  Cognitive Research: Learning Detectors of Malicious Network Traffic , started to pick up a handful of infected hosts exhibiting a new kind of malware behavior. Initially, the number of infections were quite low, and nothing had drawn particular attention to the findings. Recently, this changed when we observed a significant uptake in the number of infections during the first few weeks of 2016. These […]

February 10 2016

Built-In Security: Sharing the ‘How’

I work with a lot of customers discussing how they can reduce their cyber risk and increase resiliency with an effective security strategy. It’s easy to talk about leading practices for security, but figuring out how to put them into practice can be a whole other story. As I mentioned in a recent post , the Security and Trust team is headed to CiscoLive Berlin with the goal of sharing real and actionable security practices that are designed to be taken […]

February 10 2016

Small to Midsize Business Security Capabilities Falling as Attack Sophistication Rises

Working with limited resources and being asked to “do more with less” is often par for the course for small and midsize businesses (SMBs). Smaller companies are also credited with being more nimble than their enterprise counterparts, adopting next-generation tools more quickly and experimenting with new business models. However, a new survey of CSOs and SecOps Managers reveals that more SMBs are putting themselves at increased risk for cyber attacks by forgoing critical security capabilities and processes. Attackers are Developing […]

February 09 2016

Microsoft Patch Tuesday – February 2016

Today, Microsoft has released their monthly set of security bulletins designed to address security vulnerabilities within their products. This month’s release contains twelve bulletins addressing 37 vulnerabilities. Five bulletins are rated critical and address vulnerabilities in Internet Explorer, Edge, Windows Journal, Office and Windows PDF. The remaining seven bulletins are rated important and address vulnerabilities in the Network Policy Server (NPS), Active Directory, Windows, Remote Desktop Protocol, WebDAV, Kernel Mode Driver and the .NET Framework. Bulletins Rated Critical Microsoft bulletins […]