Category: Vendors
Attacking the internal network from the public Internet using a browser as a proxy
Though not a new attack, it is not very widely known outside of the security research community that a malicious JavaScript hosted on the public Internet can attack the internal network. Since a browser will by default have access to localhostAbout that information leak: It’s coming from inside the organization
Law firms are often considered a soft target when it comes to data security: one in five law firms was hacked last year and six major law firms were hacked in recent history. Law firms are high value targets because they hold troves of clients’How to Use SharePoint Item-Level Permissions
SharePoint item-level permissions affect the management of lists, folders and documents and the viewing of items and application pages. These permissions can be grouped together to create permission levels, which can be assigned to users andHow to enable your smart card going mobile in 60 seconds!
Smart cards providing perfect security. Unfortunately, they are often not convenient in the office, at home and on travel. Learn in 60 seconds how to make your smart card convenient anywhere, i.e. for smartphone, tablet, notebooks and desktop.People vs Automation: Why IP Geolocation Validation Still Needs a Human Touch
April 2nd, 2019 Network Geography Analysts ensure IP geolocation data is accurate and up to date. We receive geolocation feedback data from our ... (Feed generated with FetchRSS)Three Reasons to Scale-Out, not Scale-Up
Everyone talks about scalability, the ability for a unit or a system to grow as users requirements grow. There are many ways to scale up. However, one innovative company has changed the game in the packet broker market. Their solutions scaleThe Online Merchant’s Guide to Auto-Scaling
Picture this. You’ve spent weeks preparing for a massive online sale. Your products are priced right. Your social media influencers are primed and ready to help drive shoppers to your storefront. And they do their job! The sale begins and,Why Riverbed is a Six-Time Consecutive Leader in the Gartner NPMD Magic Quadrant
In a business market that is dominated by digital transformation initiatives, it is Riverbed’s position that companies must have the ability to understand all of the elements that underpin digital experience and how they relate to one another.Thwarting an invisible threat: How AI sniffs out the Ursnif trojan
The cyber AI approach successfully detected the Ursnif infections even though the new variant of this malware was unknown to security vendors at the time.Load More