This is the best overview of the BASH Shellshock vulnerabilities we’ve seen to date, so we wanted to share: http://www.zdnet.com/the-shellshock-faq-heres-what-you-need-to-know-7000034219/?s_cid=e539&ttag=e539&ftag=TRE17cfd61
Brandon Harms has returned to Infogressive and will be serving as our Chief Technology Officer. “Brandon brings a wealth of technical ability and experience to our organization. I’m very excited to have him back leading our engineering and managed services teams, said Justin Kallhoff, Infogressive CEO.” After spending a year in beautiful Hawaii, Brandon and his family decided getting back to the Nebraska Good Life was in their best interests, or maybe they just missed the snow and humidity! The entire team at Infogressive is happy to have Brandon back and look forward to his contributions that are sure to help our customers all over the world.
Thanks to our customers in 40 states and 5 countries, Infogressive had a record first half of 2014. Our total revenue grew 92.9% over 2013’s Q1 and Q2.
“We’re honored that our customers continue to trust us to help them secure their organizations. Infogressive has done significant hiring in the past 3 months to accommodate our continued rapid growth. We’re very excited about the talent and people we’ve added recently. The future is bright for our organization as we continue to focus on securing our clients from all over the world, said Justin Kallhoff, Infogressive’s Founder & CEO.
It seems every vendor is marketing a solution to challenges posed by Advanced Persistent Threats and Targeted Attacks as Data Breaches stemming from sophisticated cyber threats routinely making the news. Sandboxing, payload analysis, emulation- “fire” this and “fire” that whatever you call them, solutions to detect breaches abound and the sheer noise in the market can be overwhelming.
That’s when real-world testing, by independent industry experts, is essential. Beyond the hype, which vendors really help solve the problem. And which just talk.
Read the NSS Labs Report on Breach Detection Systems for an independent, real-world assessment of comparative security effectiveness, performance and cost.
Infogressive proudly launched it’s first of a series of e-commerce sites, fortisecurity.com this week. The site is dedicated to selling Fortinet’s entire product line.
“Fortinet has been a key technology partner of ours since our inception, we have done a lot of great things together, it was only fitting that we embark upon this new line of business with them. We believe we can provide customers with the complete package they really need to secure their businesses against today’s threats by combining our partners’ great technologies with our certified engineers’ implementation assistance and our strategic managed security services. We look forward to helping customers from around the world with their security challenges, said Justin Kallhoff, Infogressive CEO.”
Please visit http://www.fortisecurity.com today and let us know what you think!
Verizon Business released their annual Data Breach Report. They seem to be rapidly increasing their contributing list of vendors and organizations (50) in this always useful body of work. This year’s report is based on 1,367 confirmed data breaches, 63,437 security incidents and 95 countries represented. This is a sharp increase in 6 short years from their original report in 2008. We recommend this report for our clients to get a pulse on the ever-changing threat landscape and to learn from others breaches and mistakes.
Cisco recently released their 2014 Annual Security Report. Below are a few highlights that we found interesting. For the full report please click HERE.
- All organizations should assume they’ve been hacked, or at least agree that it’s not a question of if they will be targeted for an attack, but when.
- Java comprises 91 percent of web exploits; 76 percent of companies using Cisco Web Security services are running Java 6, an end-of-life, unsupported version.
- Ninety-nine percent of all mobile malware in 2013 targeted Android devices. Android users also have the highest encounter rate (71 percent) with all forms of web-delivered malware.
- 100 percent of business networks analyzed by Cisco have traffic going to websites that host malware.
- In the aftermath of the Boston Marathon bombing on April 15, 2013, two large-scale spam campaigns commenced—one on April 16 and another on April 17—designed to attract email users hungry for news of the event’s impact. At its peak, spam related to the Boston Marathon bombing made up 40 percent of all spam messages delivered worldwide on April 17, 2013.
Serving notice that “covered entities and business associates must understand that mobile device security is their obligation,” the HHS Office for Civil Rights has settled with two organizations for a combined $1,975,220 penalty after their unencrypted computers were stolen.
That’s a big number. And that’s because it’s meant to drive home the point that unencrypted laptops and mobile devices pose significant risks to the security of patient information, said Susan McAndrew, OCR’s deputy director of health information privacy. “Our message to these organizations is simple: Encryption is your best defense against these incidents,” she said.
Source: Healthcare IT News
Brian Krebs is at again, breaking news regarding another large data breach. This time is Irving, Texas-based Michaels Stores Inc. losing 3 Million credit card numbers.
Infogressive CEO, Justin Kallhoff was quoted in two different articles released this week by CRN:
FireEye, NSS Labs Continue To Trade Barbs Over Testing Report Credibility
Prevention Core To Palo Alto Networks’ Philosophy