Blog Posts Tagged with "Advanced Persistent Threats"

850c7a8a30fa40cf01a9db756b49155a

Security Vendors Vow to Defend Against Cyber-Boogeyman

March 21, 2011 Added by:J. Oquendo

McAfee is making a run to become the security industry's "Minitru". Regardless of my view of the security landscape, I believe that there is an increasing need to share information between companies that are under attack or that have been compromised. However, I doubt this could ever happen...

Comments  (4)

0c4ca84ec3f3f2d57194f8e0cbd5ba85

Companies Need to be Proactive About Corporate Security

March 16, 2011 Added by:Lindsay Walker

Managing and monitoring corporate security requires a strong commitment from everyone in an organization. Systems need to be updated regularly, IT personnel need to stay up to date on new security trends and employees require ongoing training to ensure they are doing their part to help out...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Top Five Security Threats to Monitor

February 25, 2011 Added by:Headlines

One of the biggest problems Khan notes is the inability of targeted entities to produce accurate information pertaining to attack attribution, citing a report by the ITRC which stated that out of the 662 registered breaches, forty percent of targets could not identify the origin of the attacks...

Comments  (0)

509ea0c1f4a210534eb004d35c10aa2d

Internet Security Alliance News and Upcoming Events

February 02, 2011 Added by:Marjorie Morgan

Larry Clinton will be featured on a Federal News Radio panel that will discuss Advanced Persistent Threats and the industrial strength hacking. The discussion will explore how the threat has evolved, the implications are for business, government officials, society, and the growing challenge...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Defending Against Advanced Threats and IPv6 Attacks

January 24, 2011 Added by:Dan Dieterle

So what will Cyber Defense look like in the future? I believe the answer will be a mix of high-speed hardware with offensive capabilities, network security monitoring & analysis and a united front from the government, private sector and our allies...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Government to Provide Intelligence on Cyber Threats

January 19, 2011 Added by:Headlines

"I think we all recognize that the government has unique access to information. We need to continue to look for ways to share that information, but also give our universities and our businesses information to be able to protect themselves..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

McAfee's Top Targets for Emerging Threats in 2011

January 17, 2011 Added by:Robert Siciliano

This is McAfee Labs list comprises 2010′s most buzzed about platforms and services, all of which are expected to be major targets for cybercriminals in the coming year...

Comments  (2)

E313765e3bec84b2852c1c758f7244b6

Welcome to the Post Zeus-Stuxnet World

January 14, 2011 Added by:Brent Huston

While we were all focused on the economy last year, the entire information security threatscape suddenly changed, under the watchful eyes of our security teams. To me, the overall effectiveness, capability and tenacity of both Zeus and Stuxnet is an Oppenheimer moment in information security...

Comments  (0)

11146d62a6c31fb9fac8ac8ac991e08d

Getting Results the Wrong Way

January 03, 2011 Added by:Andy Willingham

Right results are not the measurement of success. How you arrive at the results is more important. It is not all about results. Of course results are important, done the right way. Lots of us in the community have been saying that the industry is broke and that we’re looking for ways to fix it...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Top Eight Security Threats for 2011

December 28, 2010 Added by:Headlines

McAfee Labs threat research Vice President Dmitri Alperovitch has outlined his top eight picks for the security threats to be aware of over the next year. "We are seeing an escalating threat landscape in 2011," said Alperovitch...

Comments  (0)

A88973e7d0943d295c99820ab9aeed27

2010: The Year Cyber Threats Went Social

December 20, 2010 Added by:Simon Heron

We have gone from rogue nations launching attacks on their rivals’ military services to political activists who want to help bring down websites in the run up to Christmas as a form of protest against perceived censorship. One thing is certain, the cyber threat landscape is always adapting...

Comments  (0)

F520f65cba281c31e29c857faa651872

Less Privacy, Better Security

December 18, 2010 Added by:Rahul Neel Mani

Information is the lifeblood of not just corporations but organized crime and terrorism, says Steve Durbin of the Information Security Forum. Durbin says we may have to give up some individual privacy in return for security...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Ex-Employee Stole Trade Secrets Worth Over $50M

November 24, 2010 Added by:Headlines

The theft of trade secrets has widespread consequences, as it causes companies to lose their competitive edge, can make it difficult to realize a return on billions of dollars worth of research and development efforts, and ultimately devalues shareholder value...

Comments  (2)

924ce315203c17e05d9e04b59648a942

Creating a Cyber Defense Team Part Two

November 16, 2010 Added by:Richard Stiennon

Banks, long the target of cyber crime, and casinos, with vast experience fighting insider threats, have had this type of interaction with their peers for years. It is time for manufacturers, non-profits, universities, state and local governments to do the same...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Imperva Releases Top 10 Security Threats for 2011

November 15, 2010 Added by:Headlines

The predictions for the top ten information security trends expected in 2011, compiled by Imperva’s Application Defense Center, are based on analysis of incident and vulnerability data from the past year as well as findings from the company’s Hacker Intelligence Initiative...

Comments  (0)

924ce315203c17e05d9e04b59648a942

Creating a Cyber Defense Team

November 07, 2010 Added by:Richard Stiennon

New threats and new measures to counter them call for a reorganization of IT security teams. The rise of targeted attacks must be met by organizational enhancements. The roles and responsibilities described here are required to mount an effective cyber defense...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »