Skip to content
Let's Find Your Solution: (800) 905-8622

DO UNTO YOUR CUSTOMERS, AS YOU WOULD HAVE DONE UNTO YOU

Donna Smith – Director of Marketing Do Unto Your Customers, As You Would Have Done Unto You One of the best things you can do as a Marketing or Sales person is to put yourself in the prospective buyer’s shoes. However, this is more than just speculating their purchasing habits and what would most quickly…

Read More

I REMEMBER MY FIRST TIME… (MY FIRST MALWARE EXPERIENCE)

Joe Milliken, Sales Manager  I Remember My First Time… (My First Malware Experience) With the recent increase in ransomware attacks, I can’t help but to think back to my first experience with malware, about 15 years ago, with the lovely and talented Anna Kournikova*. I’m a pretty big tennis fan and I had just the…

Read More

ROLL YOUR OWN AV SIGNATURES

Kevin Wilkins CISSP – CTO iSecure LLC Roll Your Own AV Signatures There have been a lot of changes in AV and Host-Based Security in the past few years. It has become clear that there are many more instances of malware produced from day-to-day than legitimate software.  This causes AV signature databases to grow in…

Read More

Check Point: A New Model for Security Management

Be More Efficient, Effective and Organized in Managing Your Security Today’s business demands for rapid innovation, coupled with emerging technologies like cloud computing and the proliferation of connected devices, are causing a disruption in IT security. Traditional approaches to managing security can no longer keep pace in these dynamic environments. A different approach is needed.…

Read More

Check Point: Mobile Attacks Storm the Doors of the Enterprise: Are you ready?

Cyber thieves are banging on smartphones and tablets with terrible brute force. They know the mobile devices your employees use for personal and work purposes are treasure troves of valuable, unprotected data. But bolstering your security to protect against new, unknown mobile threats is tricky. Join our webinar to hear how security experts at Samsung…

Read More

Cylance: Stuart McClure talks with Richard Stiennon

CEO Stuart McClure discusses how Cylance® is revolutionizing cyber threat protection by applying artificial intelligence and machine learning to make security silent. Watch the video to understand how Cylance can help your company stop malware attacks before they execute and wreak havoc on your endpoints. 

Read More

March 2016

March 2016 Newsletter New Case Study Published: Binghamton University MILPITAS, Calif. & PITTSFORD, N.Y.–(Business Wire) – Array Networks Inc., a global leader in application delivery networking, announces that Binghamton University, part of the State University of New York (SUNY) system, has selected Array’s APV series application delivery controllers for high availability and guaranteed performance of mission-critical student…

Read More

Imperva: Technical Deep Dive: Imperva Skyfence

The “bring-your own” cloud app trend has created a blind spot that is not addressed by traditional perimeter and endpoint controls. IT has little or no visibility into which cloud apps are in use, who is accessing what information, and who is performing privileged activities. Join us for a 30-minute live product demonstration and Q&A…

Read More

February 2016

February 2016 Newsletter BBQ, Beers, & InfoSec Peers: March 9th & 10th These are free events for Information Security executives, managers, and directors to hear from experienced security leaders on today’s threat landscape, current security trends, and remediation strategies. BBQ Lunch Buffet Provided Two InfoSec Presentations (Topics TBA Soon) Open Beer Tap (& Non-Alcoholic Beverages) Cyber Security…

Read More

January 2016

January 2016 Newsletter iSECURE’s Certified Hackers: Uncover Your Greatest Risk!  iSECURE’s Certified Hackers: Uncover Your Greatest Risk! iSECURE certified engineers offer a variety of security services. Some of these services include:⦁ Penetration Testing⦁ Physical or Infrastructure Audits⦁ Web Application Assessments⦁ Network Vulnerabililty Assessments⦁ Policy & Procedure Consulting⦁ SIEM, Firewall, or IPS AuditClick here to check out some of…

Read More