Welcome to the New Age of Threat Intelligence

Sony PlayStation Networks and Microsoft Xbox Live experienced user connection problems on Christmas Day, 2014, for which a hacker group claimed responsibility. This time, hackers launched massive distributed denial-of-service (DDoS) attacks that overloaded the servers with bogus requests. DDOS is a specific type of DOS attack where multiple compromised systems, “Zombies”, which are usually infected…

Video: If you are breached, would you know it ?

If you listened to the episode of 60 Minutes on CBS on October 5, 2014, you would have heard Director of FBI, James Comey, state “there are two types of companies: those that know they have been hacked and those that don’t know it yet.” No one is immune to security breaches and today’s headlines…

The Benefits of Behavior Analysis in Threat Detection

The next generation of security needs to “identify attacks as they are happening”. This is where behavior analysis can step in and be used as a real-time security defense tool. Today, SIEM’s are effective at identifying attack patterns but they are not sophisticated enough to convert their threat correlation analytics into actionable events, such as…

Virtual Elastic Firewall For Cloud Security – Part II

This is Part II of a three-part series on the value proposition of a Virtual Firewall Architecture (VFA) for Cloud Security. Part II: Challenges for cloud security solutionsMost security solutions were designed for SMB, enterprise, or physical data center architectures. Requirements for these solutions do not necessarily apply to virtualized environments. A security service for cloud…

Virtual Elastic Firewall Architecture For Cloud Security – Part I

Security is a necessary building block for modern data center architectures. Without an established security, organizations will not put computing tasks and sensitive data in the cloud. Traditional security solutions, which were designed for SMB, enterprise, or data center perimeters, cannot be deployed in modern data centers efficiently. A good data center security solution has…