|
|
|
|
Defensio™ 2.0: Next Generation Security for the Social Web |
| |
|
|
Does your website allow users to contribute content? Is your website’s security equipped to block spam and prevent malicious content and profanity in real time? Websense® just unveiled the next generation of security for the social Web with Defensio 2.0 — the leading security solution for your personal or corporate site, including company blogs and Facebook pages. Several new enhancements combine the Web security analytics and expertise of Websense with the security platform of Defensio. Together, they deliver superior security against new threats, and improved management and control of content posted on any site. |
MORE |
|
|
|
LINK ANALYSIS |
What Links Are People Sharing? |
Are you curious to see which links are being posted on social networks and where these links go? Websense technology analyzes links in real time. In a recent analysis, Websense studied nearly 250,000 links and found out there are three top categories of links in Facebook and Twitter. Check out the breakdown... |
MORE |
|
|
RESEARCH DESIGN |
Win an iPad! Help Design New Features |
Here’s your chance to help design new features in our Websense security solutions! Take our brief survey. Enter to win an iPad! Congratulations to last month’s winner: Jeff Dessert of the Canadian Nuclear Safety Commission.
|
|
|
| |
|
|
|
57% of data-stealing attacks are conducted over the Web.
—Websense Security Labs™, State of Internet Security, Q3-Q4 2009 |
|
|
|
|
|
|
WHITE PAPERS, WEBCASTS, AND MORE |
|
|
|
Webinar: Websense SpeakUp – How have cloud computing and collaborative networks redefined Web security? |
Our interactive webcast featuring analysts and industry speakers will discuss how migrating to the cloud and greater collaboration has come at the expense of risks from new malware, methods of attack, and loss of confidential data. |
MORE |
|
|
|
Video: Best Practices Security for the Social Web and Modern Malware |
Organizations worldwide are racing to take advantage of Web destinations like Facebook, LinkedIn, YouTube and SalesForce.com. But these opportunities also bring new risks. In this video, leading experts from Gartner and Websense look at the emerging Web security risks, the total cost of ownership of a Secure Web Gateway, on-premise versus SaaS deployment tradeoffs, and what to look for in a Secure Web Gateway solution |
MORE |
|
|
|
White paper: Next Generation Secure Web Gateways: The Case and Criteria for Embedded Data Loss Prevention (DLP) |
Web 2.0 technology has transformed the Web into a core business communication platform. Unfortunately, it’s also become much easier to accidentally or intentionally disclose sensitive data. This white paper makes the case for DLP as an embedded capability within secure Web gateways, and defines what customers should look for in a solution. |
MORE |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
INDUSTRY ANALYST CORNER |
What's Hiding Behind that Tiny.cc Link? |
|
|
|
By Robert Ayoub, Frost & Sullivan
Since social networks are self contained messaging platforms, it should be no surprise that many of the same threats that have plagued users for years have found their way onto social networks. Some of the most popular methods for attack include… |
MORE |
|
|
|
|
Keeping Social Networking a Boon Not a Bust |
Would it surprise you to hear that more than three-quarters of the Fortune Global 100 companies are using at least one of the most popular social media platforms (Twitter, Facebook, YouTube, and corporate blogs) to actively engage with stakeholders? The use of social networking sites is becoming highly prevalent in business today, but along with that growth comes significant security risks.
|
MORE |
|
|
|
|
Phoenix Exploit Kit: More Malicious Emails Detected |
In the recent weeks, blended attacks are being used more than ever before. Earlier, we saw spammers enticing users to pharma spam, exploiting the death of a football player, and offering Evite invitations. This time, they are attempting to lure users with genuine-looking email attachments that, when opened, launch them into a redirection chain that ends up on a page containing the Phoenix Exploit Kit.
|
MORE |
|
|
|
|
|
|
|
|
|