Quantcast
Channel: Network World Martin Roesch
Browsing latest articles
Browse All 26 View Live

Security Primer: How malware is classified

The security industry was born at a time when the threat landscape consisted primarily of computer viruses that were spread by floppy disks. Antivirus was the name of the game, and the term “computer...

View Article



New video series: Security Chalk Talks from Sourcefire, Network World

We have all seen that advanced malware and attack chains continue to increase in sophistication. Ongoing DDoS attacks, advanced malware evolving to avoid sandbox detection or mobile malware...

View Article

Advanced Firewalls, part 2

The firewall has served as a primary barrier between a company’s IT assets and the outside world for many years. In our last video, we examined some of the major advancements that have been...

View Article

History of Computer Viruses, Part 1: The Early Days

The concept of a computer virus was first documented in an academic paper in 1949. Described by renowned mathematician and physicist John von Neumann as “self-replicating programs,” the idea was...

View Article

History of Computer Viruses, Part 2: Macro Viruses and Worms

The computer virus landscape has evolved enormously over the last few decades. Our previous talk discussed the conceptualization and eventual development of the world’s first computer viruses. Today,...

View Article


An Overview of Malware Protection Techniques

It should come as no surprise that nowadays malware has become big business. Bad actors are increasingly better funded and improving their approaches for attacking us. We have reached the point where...

View Article

Video tutorial: What is Conficker?

Today’s advanced malware threats are capable of changing behavior to block attempts to discover and remove them from systems. One of the most successful examples of malware deploying these techniques...

View Article

Video: What is a rootkit? (Chalk Talk)

The industrialization of hacking has introduced a wave of threats that are increasingly sophisticated, coming from more effective and efficient actors profiting from attacks on IT infrastructure. If...

View Article


Video: False Positives and False Negatives within IPS

Intrusion Prevention Systems are designed to detect and block malicious traffic in a network or on an endpoint. The most critical function that these systems provide is the ability to make a judgment...

View Article


Video: How malware harms systems

Building on our previous video about threat taxonomies, today we will discuss in greater depth how we describe and categorize threats by the kinds of harm that they can cause. Hacking has become big...

View Article
Browsing latest articles
Browse All 26 View Live




Latest Images

<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>
<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596344.js" async> </script>