Monthly archives: October, 2015

Chuck Leaver – A New Cyber Security Risk Is Upon Us With The Internet Of Things

Written By David Shefter And Presented By Ziften CEO Chuck Leaver     We are now living in a new world of the Internet of Things (IoT), and the risk of cyber hazards and attacks grow exponentially. As implementations progress, brand-new vulnerabilities are emerging. Symantec released a report this spring which evaluated 50 smart home

Don’t Suffer From Security Blindspots Use Ziften ZFlow – Chuck Leaver

Written By Andy Wilson And Presented By Chuck Leaver CEO Ziften   Over the past number of years, numerous IT organizations have adopted making use of NetFlow telemetry (network connection metadata) to enhance their security position. There are numerous factors behind this: NetFlow is relatively economical (vs. complete packet capture); it’s fairly simple to collect

Chuck Leaver – Blocking And Prevention Are No Longer Enough So Here Is A New Path To Endpoint Security

Written By Josh Harriman And Presented By Chuck Leaver Ziften CEO   Standard endpoint security solutions, a few of which have been around for over 20 years, rely heavily on the exact same security methods every year. Although there is constantly innovation and strides to improve, the underlying problem still exists. Threats will always find

Chuck Leaver – Discover Superfish With The Ziften Application For Splunk

Written By Ryan Hollman And Presented By Chuck Leaver CEO Ziften   Background Details: Lenovo admitted to pre loading the Superfish adware on some consumer PCs, and unhappy consumers are now dragging the business to court on the matter stated PCWorld. A proposed class action suit was filed late last week against Lenovo and Superfish,

Chuck Leaver – You Need To Look Out For These Top 5 Suspicious Endpoint Behaviours

Written By Dr Al Hartmann And Presented By Ziften CEO Chuck Leaver Standard security software is not likely to identify attacks that are targeted to a particular company. The attack code will more than likely be remixed to evade known malware signatures, while fresh command and control infrastructure will be stood up to avert recognized