Stories by By John Breeden II

  • Hawkeye G battles malware so you don't have to

    The number and complexity of cyber threats leveled against enterprises of all sizes these days is staggering. There's everything from advanced persistent threats created by well-sponsored nation states to disgruntled <a href="http://www.networkworld.com/article/2692093/security0/data-protection-165097-disgruntled-employees-lash-out.html">insiders</a> looking to make a fast buck or enact revenge for some perceived wrongdoing.

  • New security tools from Tenable, HP, Co3 attempt the impossible

    Automated incident response is one of the fastest growing fields in computer security. Alternatively called threat monitoring, vulnerability management or threat management, it encompasses the seemingly impossible task of defending a network from active threats as they happen, in addition to detecting every possible vulnerability that could be exploited by an attacker.