Conficker Redux: Is Your Network Security Ready?
By BUFFERZONE Team, 6/01/2016
The notorious Conficker worm (a.k.a. Downup, Downadup and Kido) first reared its malicious head in 2008 – which makes it virtually prehistoric.
Read More >FBI to Ransomware Victims: “Pull Out Your Credit Card Instead of Calling the Cyber Cops”
By BUFFERZONE Team, 3/11/2015
It’s a Bird…it’s a Plane…it’s a Cost-Benefit Analysis? It’s the equivalent of a superhero telling distraught citizens that they just need to “suck it up” and tolerate some relatively minor
Read More >3 Critical Insights of the Target Breach – and 3 Key Takeaways
By BUFFERZONE Team, 13/10/2015
KrebsOnSecurity has obtained an internal report commissioned by Target that investigated the giant retailer’s headline-grabbing data breach in 2013 — and the findings so far are a chilling, cautionary tale
Read More >Endpoint Security Best Practices with Forrester Analyst Chris Sherman
By BUFFERZONE Team, 12/10/2015
Endpoint Security Best Practices: Moving Beyond The Blacklist For years, most endpoint security strategies have revolved around endpoint anti-virus, but this approach is clearly unable to keep pace with modern
Read More >Thank you for visiting us at Data Connectors Orlando!
By BUFFERZONE Team, 24/09/2015
We would like to thank you all for taking the time to visit us at the Data connectors event in Orlando, Florida on Sep’ 10th. This was our first Data
Read More >3 Things Hackers Don’t Want You to Know About Endpoint Security
By BUFFERZONE Team, 27/08/2015
Call it job preservation, but hackers aren’t in the habit of helping their would-be victims avoid a data breach. But if there was a rogue double-agent hacker – one who
Read More >