Blog Posts Tagged with "Advanced Persistent Threats"


Security Vendors Vow to Defend Against Cyber-Boogeyman

March 21, 2011 Added by:J. Oquendo

McAfee is making a run to become the security industry's "Minitru". Regardless of my view of the security landscape, I believe that there is an increasing need to share information between companies that are under attack or that have been compromised. However, I doubt this could ever happen...

Comments  (4)


Companies Need to be Proactive About Corporate Security

March 16, 2011 Added by:Lindsay Walker

Managing and monitoring corporate security requires a strong commitment from everyone in an organization. Systems need to be updated regularly, IT personnel need to stay up to date on new security trends and employees require ongoing training to ensure they are doing their part to help out...

Comments  (0)


Top Five Security Threats to Monitor

February 25, 2011 Added by:Headlines

One of the biggest problems Khan notes is the inability of targeted entities to produce accurate information pertaining to attack attribution, citing a report by the ITRC which stated that out of the 662 registered breaches, forty percent of targets could not identify the origin of the attacks...

Comments  (0)


Internet Security Alliance News and Upcoming Events

February 02, 2011 Added by:Marjorie Morgan

Larry Clinton will be featured on a Federal News Radio panel that will discuss Advanced Persistent Threats and the industrial strength hacking. The discussion will explore how the threat has evolved, the implications are for business, government officials, society, and the growing challenge...

Comments  (0)


Defending Against Advanced Threats and IPv6 Attacks

January 24, 2011 Added by:Dan Dieterle

So what will Cyber Defense look like in the future? I believe the answer will be a mix of high-speed hardware with offensive capabilities, network security monitoring & analysis and a united front from the government, private sector and our allies...

Comments  (1)


Government to Provide Intelligence on Cyber Threats

January 19, 2011 Added by:Headlines

"I think we all recognize that the government has unique access to information. We need to continue to look for ways to share that information, but also give our universities and our businesses information to be able to protect themselves..."

Comments  (0)


McAfee's Top Targets for Emerging Threats in 2011

January 17, 2011 Added by:Robert Siciliano

This is McAfee Labs list comprises 2010′s most buzzed about platforms and services, all of which are expected to be major targets for cybercriminals in the coming year...

Comments  (2)


Welcome to the Post Zeus-Stuxnet World

January 14, 2011 Added by:Brent Huston

While we were all focused on the economy last year, the entire information security threatscape suddenly changed, under the watchful eyes of our security teams. To me, the overall effectiveness, capability and tenacity of both Zeus and Stuxnet is an Oppenheimer moment in information security...

Comments  (0)


Getting Results the Wrong Way

January 03, 2011 Added by:Andy Willingham

Right results are not the measurement of success. How you arrive at the results is more important. It is not all about results. Of course results are important, done the right way. Lots of us in the community have been saying that the industry is broke and that we’re looking for ways to fix it...

Comments  (0)


Top Eight Security Threats for 2011

December 28, 2010 Added by:Headlines

McAfee Labs threat research Vice President Dmitri Alperovitch has outlined his top eight picks for the security threats to be aware of over the next year. "We are seeing an escalating threat landscape in 2011," said Alperovitch...

Comments  (0)


2010: The Year Cyber Threats Went Social

December 20, 2010 Added by:Simon Heron

We have gone from rogue nations launching attacks on their rivals’ military services to political activists who want to help bring down websites in the run up to Christmas as a form of protest against perceived censorship. One thing is certain, the cyber threat landscape is always adapting...

Comments  (0)


Less Privacy, Better Security

December 18, 2010 Added by:Rahul Neel Mani

Information is the lifeblood of not just corporations but organized crime and terrorism, says Steve Durbin of the Information Security Forum. Durbin says we may have to give up some individual privacy in return for security...

Comments  (0)


Ex-Employee Stole Trade Secrets Worth Over $50M

November 24, 2010 Added by:Headlines

The theft of trade secrets has widespread consequences, as it causes companies to lose their competitive edge, can make it difficult to realize a return on billions of dollars worth of research and development efforts, and ultimately devalues shareholder value...

Comments  (2)


Creating a Cyber Defense Team Part Two

November 16, 2010 Added by:Richard Stiennon

Banks, long the target of cyber crime, and casinos, with vast experience fighting insider threats, have had this type of interaction with their peers for years. It is time for manufacturers, non-profits, universities, state and local governments to do the same...

Comments  (1)


Imperva Releases Top 10 Security Threats for 2011

November 15, 2010 Added by:Headlines

The predictions for the top ten information security trends expected in 2011, compiled by Imperva’s Application Defense Center, are based on analysis of incident and vulnerability data from the past year as well as findings from the company’s Hacker Intelligence Initiative...

Comments  (0)


Creating a Cyber Defense Team

November 07, 2010 Added by:Richard Stiennon

New threats and new measures to counter them call for a reorganization of IT security teams. The rise of targeted attacks must be met by organizational enhancements. The roles and responsibilities described here are required to mount an effective cyber defense...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »