Security is live warfare with daily ongoing battles, not a single point-in-time event, such as installing a firewall or implementing DLP.
Of the 60 million variants of malware in existence today, one-third were created last year alone.
RSA Security Brief, February 2011

There are only two types of companies; those that have been hacked and those that will be.
- Robert Mueller, Director, FBI,
keynote speech at the RSA conference,
March 2012

Many CISOs still have limited visibility of their company’s Security/Risk Posture.
white papers


read more
security news

Breaking News

read more
breaking alerts

Virus/ Malware

read more

How is your posture?

The term “Security Posture” is rapidly becoming a hot IT topic. With some of the nation’s largest companies announcing security breach and data loss, many executives are looking inward to ask that very question – what is our Security Posture? Our team works closely with clients to understand current security policy; its accuracy and relevance; and to remediate any internal or external vulnerabilities.

Recent Posts

eBay Asking Users to Change Passwords

This morning, eBay confirmed users' passwords were compromised but says there's no evidence any financial information was accessed.

The database, which eBay said was compromised in late February and early March, held eBay customer's names, encrypted passwords, email addresses, physical addresses, phone numbers, and dates of birth. However, the company says users' financial information was not accessed.

"After conducting extensive tests on its networks, the company said it has no evidence of the compromise resulting in unauthorized activity for eBay users, and no...

Read more

Blackhole Exploit Kit Author Arrested

The alleged cybercriminal responsible for developing and maintaining the Blackhole automated attack toolkit was arrested this week, according to the European Cybercrime Centre (EC3). The agency confirmed that authorities had a person in custody Tuesday to TechWeek Europe. The most widely used toolkit was behind many of the financially motivated attacks aimed at businesses and people. The toolkit was sold on underground hacking forums under a subscription-based business model, which included periodic updates. The updates included some of the latest exploits, such as those...
Read more