The Latest in IT Security

Posts Tagged ‘network traffic analysis’

The march towards digital transformation and the increasing volume of cyberattacks are finally driving IT security and network teams towards better collaboration. This idea isn’t new, but it’s finally being put into practice at many major enterprises. Network traffic analysis and security The reasons are fairly straightforward: all those new transformation initiatives – moving workloads […]

Read more ...

Command-and-control (C&C) server communication is essential for botnet creators to control zombie computers (or bots). To hide this from security researchers, they often use rootkits and other “tricks”. However, hiding the network traffic – specifically from monitoring outside an infected computer – is not an easy task, but is something that the botnet creators have […]

Read more ...

Sr. Malware Researcher Posted: 9 May 2012 Company name: FireEye Location: Milpitas CA United States Travel: none Poster represents: employer Terms of employment: Salaried employee Hours: full time Onsite: yes Description:*Perform leading edge malware research, analysis (data-mining) and generate content for use in our products *Enhance FireEye’s security content infrastructure, process workflow, and the malware […]

Read more ...


Categories

SATURDAY, APRIL 20, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments