All attack investigation

Attack Investigation and Recovery

Are you building an incident response system? Does it include tools that allow for attack investigation and recovery? Earlier this year I wrote a three...

Salesforce Data.com Used as Conduit to Push Malware

Companies using Data.com which is maintained by Salesforce could be in for an infection if they aren’t careful what they click on.  These days...