Sort results by: Published date | Company name
Showing items 1-25

Snake Campaign & Cyber Espionage Toolkit [ Source: BAE Systems Applied Intelligence ]

April 2014- This new report from BAE Systems Applied Intelligence provides further details on how the recently disclosed 'Snake' cyber espionage toolkit operates. Timelines of the malware development show this to be much bigger campaign than previously known. Specifically it reveals that the malware has actually been in development since at least 2005. From the complexity of the malware, and the range of variants and techniques used to support its operation, the research also suggests that Snake's authors ...

Endpoint Buyers Guide [ Source: Sophos ]

March 2014- It takes more than antivirus to stop today's advanced threats. An endpoint protection solution is an important part of your IT security strategy to protect corporate assets. Evaluating the many components that make up an endpoint security solution may seem overwhelming. Get independent research and test results to help you determine your requirements and identify the vendor that best meets your needs.

Safeguarding businesses in A Time of Expanding And Evolving Cyber Threats [ Source: Verizon ]

November 2013- Every security breach represents a battle between attacker and target. It's a battle of speed, a battle of skill, and often begins before a potential attacker takes a single physical action.

Over the nine years Verizon has conducted its Data Breach Investigations Report (DBIR), that battleground has continued to evolve. It has become more complex, rife with pitfalls and has opened up new opportunities for surprises.

Attackers remain varied, motivated by ...

Securing Banks in Changing Times [ Source: F5 ]

October 2013- The financial services industry is facing significant pressure from customers, competitors, and governments to secure and improve all types of networked applications while meeting customer demand for increased channel access and complying with new regulations. F5 ADCs can speed compliance and time to market while increasing security on public-facing websites.

12 Things IPS Systems Should Do [ Source: Dell Software ]

August 2013- Do you know what to look for in an intrusion protection system? Read our e-book, "12 Things Effective Intrusion Protection Systems Should Do." Don't leave your organization vulnerable to attacks. The attackers have extremely sophisticated evasion techniques to escape detection. Does your current IPS deliver an effective counter attack? Today's intrusion prevention systems provide advanced security intelligence and the ability to identify and block malware before it can enter your network. Learn how to detect and ...

10 Ways To Securely Optimize Your Network [ Source: Dell Software ]

August 2013- Web 2.0 and social networking applications have created an entirely new set of IT requirements for securing, controlling, and ensuring bandwidth in the new enterprise network. In this e-book, see how you can securely optimize your network with Dell SonicWALL's advanced security platform. It combines core next-generation firewall application intelligence, control and visualization, gateway protection and SSL inspection for enterprises, with WAN acceleration for distributed offices - elements that work seamlessly to maximize security and control. ...

How to Build a Massively Scalable Next-Generation Firewall [ Source: Dell Software ]

August 2013- Learn how to build a massively scalable next-generation firewall (NGFW) in this comprehensive white paper. The paper discusses seven measures of scalability, and how to use them to evaluate NGFWs. The paper also outlines the kind of technical innovations needed to produce a massively scalable NGFW. You'll also see results from a benchmark test comparing the four leading next-generation firewalls. In the most demanding test in the series - scanning SSL traffic with firewall, anti-virus, ...

Fight back against stealthy attacks with security beyond the OS [ Source: McAfee ]

May 2013- Today's anti-malware solutions running as applications above the operating system are no match for the stealth techniques used by today's malware developers. Hardware-assisted security products like McAfee Deep Defender take advantage of a "deeper" security footprint.

Researchers discover an average of 2,000 rootkits each day, according to McAfee® Labs™. Rootkits are an increasingly common form of malware built explicitly to hide malicious code. Once installed, a rootkit conceals itself and looks innocent ...

Dennis Technology Labs - Effectiveness in Virtual Environments [ Source: Symantec ]

October 2012- This report from Dennis Technology Labs compares the effectiveness of anti-malware products designed to run in virtual desktop environments. This test aims to compare the effectiveness of the most recent releases of anti-malware products designed to run in virtual desktop environments.

Cybersecurity in Action [ Source: Guidance Software ]

October 2012- 4 Days, 465 Systems, 3 continents

The Zeus Trojan virus was destructive enough, but the tech media are constantly alerting us to evolving threats to every industry. The good news is that you can transform the way your organization exposes, analyzes, and respond to advanced endpoint threats and errant sensitive data.

Here are seven quick case studies to prove it. Download these real-world examples of how customers in industries such as financial services, hospitality, ...

Achieving Compliance in Digital Investigations [ Source: Guidance Software ]

October 2012- 80% of organizations suffering payment card breaches had not achieved compliance with PCI DSS at the time of the breach. – Verizon 2011 Data Breach Investigation Report

As regulation and litigation increase, internal investigators must support an alphabet soup of compliance obligations: SOX, GLBA, FISMA, HIPAA, PCI DSS, regional privacy laws, and more. Although each regulation is different, these laws share common investigation requirements in three areas: policy, control infrastructure, and incident response.

This ...

How Three Cyber Threats Transform the Role of Incident Response [ Source: Guidance Software ]

October 2012- “The theft began with an instant message sent to a Google employee in China who was using Microsoft’s Messenger program… Ultimately, the intruders were able to gain control of a software repository used by the development team.” - New York Times - Cyberattack on Google Said to Hit Password System

While we still use many of the same old names - viruses, Trojans, and worms - today’s malware enables potent multistage ...

Finding An Effective Antivirus Solution To Please Users & Administrators [ Source: ESET ]

October 2012- Does your anti-virus bring your systems to a crawl? Is it causing administrators to pull their hair out? This whitepaper shows you how to solve both problems with one product!

Options for Backing Up Your Computer [ Source: ESET ]

July 2012- While personal computers range in cost from a few hundred to a few thousand dollars, a computer is a physical object, and it can be replaced. What really makes your computer valuable is what's unique about it, and that is your data - your business records, pictures, audio and video recordings, and documents you have saved over the years. Read to learn more about how to keep your data safe.

Keeping Secrets: Good Password Practice [ Source: ESET ]

July 2012- Alternative and supplementary forms of authentication have become far more common (and affordable), but the humble password remains the somewhat crumbling gatehouse to many a security structure. Learn how to tighten the weakest link of your security system.

Ten Ways To Dodge CyberBullets: Reloaded [ Source: ESET ]

July 2012- In the frequently changing threat landscape, as cyber-criminals and security companies constantly introduce new techniques and countermeasures, the basic principles of self-defense stay the same, so even while detail changes, the underlying advice remains critical to protection.

Trends for 2012: Malware Goes Mobile [ Source: ESET ]

July 2012- The ways in which people are accustomed to using technology have always influenced and determined malware development and that trend will continue. With the significant growth in the use of mobile devices, malware developers have been working to make these platforms a viable entry point for malicious code infection.

The 5 New Laws of Anti-Malware [ Source: Sourcefire ]

July 2012- Malware has changed considerably since the early PC viruses first introduced more than 25 years ago. Today, it evolves so quickly that many customers find it nearly impossible to stay ahead of the latest threat.

If the explosion in malware variants wasn't enough, sophisticated Client Side Attacks and Advanced Persistent Threats (APT's) target victims in ways that completely evade traditional security measures.

Current research suggests as much as 75% of new viruses are ...

Top 5: The Largest Malware Delivery Networks [ Source: Blue Coat ]

November 2011- The Blue Coat 2011 Mid-Year Security Report described the powerful tools that make malware delivery networks successful: dynamic web links that enable cybercrime to change out payload servers and avoid detection. Last year, the malware web delivery infrastructure was hacking into popular and trusted domains where cybercriminals can display lures beyond the reach of reputation filters and web category blocking.

With an eye on acceptable-use policies, the lures often inhabit categories such as Online ...

Integrating the CorreLog Security Correlation Server with McAfee ePolicy Orchestrator (ePO) [ Source: CorreLog ]

October 2011- This white paper provides a detailed discussion of objectives and methodologies for integrating CorreLog software with McAfee ePolicy Orchestrator (ePO) software. This document also describes the features and capabilities of the implementation, intended as a top-level description of how to add CorreLog's Security Information and Event Management (SIEM) functions with the ePO software system, to create a single unified system.

Email Security in Small and Medium-Sized Businesses [ Source: GFI Software ]

July 2011- No organization can afford to operate without an email security strategy. The risk landscape is constantly changing with new threats surfacing every day. This white paper looks at email security in small and medium businesses, the solutions available and what features SMBs cannot do without.

See, Analyze and Fix all of Your Endpoints [ Source: Promisec ]

January 2011- Findings of an inspection of over 100,000 endpoints across multiple enterprises confirmed some type of breaches in security and compliance. Typically, 10-35% of endpoints demonstrated some kind of security threat or compliance issue. The most notable findings of the 2010 study were a dramatic rise in unmanaged machines and miss-configured anti-virus software and other third-party agents.

The 10 Scariest Web Threats and How to Eliminate Them [ Source: MessageLabs, Symantec Hosted Services ]

September 2010- This white paper raises real challenges for IT managers who have to protect the business against malware, keep internet bandwidth available for legitimate business needs and enforce acceptable use policies for the human resource department. Managers everywhere must also find a balance between allowing reasonable personal internet use at work and maintaining productivity and concentration in the office.

Targeted Trojans: The Silent Danger of a Clever Malware [ Source: MessageLabs, Symantec Hosted Services ]

September 2010- This white paper will discuss the history and progression of the modern Trojan attack. It will explore the methodology used by hackers in selecting a target and developing a compelling attack and will cite several examples of some successful targeted Trojans. Finally, this paper will look at the Symantec Hosted Services MessageLabs™ Complete Email Guard solution and how Symantec Hosted Services can help protect an organization against targeted Trojans in the future.

Gartner Magic Quadrant for Secure Email Gateway [ Source: MessageLabs, Symantec Hosted Services ]

September 2010- This industry report covers the email gateway market. Gartner, Inc. positions Symantec in the Leaders quadrant in its 2010 Magic Quadrant for Secure Email Gateways (anti-spam, anti-virus, outbound content filtering, email encryption, intrusion prevention). In this report, Gartner analysts note that, "The e-mail security market is very mature. Targeted phishing detection, outbound e-mail inspection, encryption and delivery form factor are the major differentiators." Please enter your contact information to view the complete Gartner Magic Quadrant for ...

Understanding the Value of Managed Security UTM Solutions [ Source: MegaPath ]

April 2010-  Couple the reality of IT staff resources stretched too thin with security threats that are increasingly sophisticated and destructive, and the corporate trend -- even at the low-end of SMB businesses -- toward relying on an experienced managed security services provider becomes clear. This Yankee Group paper describes why multiple security layers are needed to achieve comprehensive and cost-effective security solutions.

Next 25