Blog

A perspective on next generation cybersecurity, vulnerabilities, and the cloud.
Kiosk & USB Security
25 Aug 2014

Detecting and Mitigating USB-based Threats

The flexibility of the USB protocol and the inherent trust given by Windows, Mac, and Linux operating systems to Human Interface Devices (HIDs), such as...
Certification
30 May 2014

OPSWAT Certifications for May

Here are our latest OPSWAT Certifications for the month of May. Please give a warm welcome to our new partners Elex Technologies and Tech...
Certification
4 May 2014

OPSWAT Certification

Here is our latest batch of OPSWAT Certifications. Please give a warm welcome to our new...
Advanced Threat Prevention
14 Apr 2014

Scanning for Malware in Android Applications

Android applications are available through a number of different stores and sites. At some stores, you can even download the app file to your PC and apply it...
Advanced Threat Prevention
7 Apr 2014

Using File Type Conversions to Eliminate Malware

There have been several stories in the news recently (here and here) about the variant of the Zeus/Zbot Trojan that was found to be using images to hide...

Sign up for Blog updates

Get information and insight from the leaders in advanced threat prevention.