Sort results by: Published date | Company name
Showing items 1-25

White Paper: Rapidly Respond to Advanced Attacks in Motion with Bit9 + Carbon Black [ Source: Bit9 ]

July 2014- Traditional incident response (IR) processes are being overwhelmed. The increased volume of attacks has caused the number of alerts from detection devices to balloon dramatically. Enterprises now realize it is no longer a matter of if they will get breached, but rather a matter of when.

Download this whitepaper to understand:

• Typical Response Scenario
• Evolving Enemies
• Kill Chain
• Incident Response Lifecycle
• Security ...

Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk [ Source: SurfWatch Labs ]

July 2014- The market for cyber liability insurance has been around for over a decade, but only recently has it experienced a spike in demand. The variety of recent high-profile data breaches have cast light on the importance of having coverage should a cyber-attack strike a business. No business is immune to a cyber-attack, which can wreak havoc not only on the IT environment, but also on the bottom line.

Despite all of this, cyber ...

Big Data, Big Mess: Sound Risk Intelligence Through Complete Context [ Source: SurfWatch Labs ]

July 2014- When it comes to cybersecurity, perhaps nothing has been as highly touted as the answer to every executive's prayers as big data. Cybercrime, being inherently technical, can provide vast droves of data to be analyzed.

The real challenge is translating complex, technical cyber data into practical information that can be easily understood by the business as well as security pros. Many variables come into play when it comes to understanding cyber risk: your ...

Top 10 Things Every Web Application Firewall Should Provide [ Source: Imperva ]

July 2014- Securing Web applications against cybercriminals, hacktivists, and state-sponsored hackers is a never-ending effort. Why?

• Hackers evade traditional network security defenses to take down websites and to steal data.

• Malicious users probe websites around-the-clock looking for vulnerabilities.

• Automation tools such as off-the-shelf attack toolkits and botnets make it easy to execute large-scale attacks.
Web application firewalls have become the central platform for protecting applications against ...

Forensic Domain Mapping: How to Reverse Engineer Domain Ownership in a Cyber Investigation [ Source: DomainTools ]

July 2014- For investigators tasked with identifying the perpetrator of online fraud, it's often the little things that can make the difference. Cyber investigators must work diligently to ferret out the smallest details in order to snare their quarry. Investigating a digital crime is not so dissimilar as investigating a crime in the 'real world'. While popular TV shows might have you believe that a single fiber found at the scene of a crime will lead directly ...

Domain Attribution: Piercing the Veil of Masked Domain Owners [ Source: DomainTools ]

July 2014- As the Internet has evolved to become a primary channel of trade and commerce, so has the sophistication of criminal organizations and other perpetrators of fraudulent schemes who take advantage of domain privacy features as a means by which to mask their true identity. Domain privacy, a controversial topic since its introduction in 2003, provides domain owners with the option to substitute the registrar's contract information for their own. While there are a variety of legitimate ...

Best Practices Guide: Using DNS Data for Threat Intelligence and Incident Forensics [ Source: DomainTools ]

July 2014- Cybercrime represents a major threat to both government and businesses, costing the economy hundreds of billions of dollars in losses every year. Often, the most challenging part for an investigator is discovering the who behind an attack. Is it a coordinated attack orchestrated by a criminal syndicate or an amateur hacker looking for a backdoor into your network? If the actual individual cannot be identified-as is too often the case-then investigators can build a Threat ...

Single-Vendor Security Ecosystems Offer Concrete Benefits Over Point Solutions [ Source: Trend Micro ]

July 2014- This Trend Micro-commissioned profile of North American, European, and Asia Pacific IT security decision-makers from companies with 100 to 5,000 employees evaluates the current endpoint security solution market based on Forrester’s own market data, and a custom study of the same audience.

NSS Labs Report: Breach Detection Systems Comparative Analysis [ Source: Trend Micro ]

July 2014- In recent NSS Labs testing, Trend Micro Deep Discovery scored the highest in breach detection of all products, including those from AhnLab, Fidelis, FireEye, Fortinet, and Sourcefire.

Download NSS Labs' 2014 Security Value Map (SVM) for Breach Detection Systems to compare test results and see why Deep Discovery should be on your product short list.

3 Questions to Ask Your DNS Host [ Source: Neustar ]

June 2014- Learn the three key questions you should be asking your DNS host when it comes to protection against DDoS Attacks.

The Insider Threat: Detecting Indicators of Human Compromise [ Source: Tripwire ]

June 2014- Your organization's greatest asset is also its greatest risk. The employees, contractors and trusted business partners you rely on to keep your organization running can also cause it the most damage. A malicious insider can use authorized credentials to do unauthorized things, bring your network down or repeatedly steal data from your organization without being detected.

Learn about the Insider Threat Kill Chain and what you can do to protect your organization from ...

2014 Neustar Annual DDoS Attacks and Impact Report: A Neustar High-Tech Brief [ Source: Neustar ]

June 2014- DDoS attacks against high-tech firms have started to take a dangerous turn. It's called DDoS smokescreening - attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property. This is just one insight in Neustar's 2014 Annual DDoS Attacks and Impact Survey. The resulting report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology products and/or services such as ...

It's Time for a Serious Talk: 3 Questions to Ask Your DNS Host about Lowering DDoS Risks [ Source: Neustar ]

June 2014- It's no secret that DDoS attacks are worsening by the day. From the largest financial institutions to smaller Internet companies, everyone's a target. Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size. Most of these conversations boil down to three key questions and form the conversation you should be having, too-whether you use Neustar, another provider or your in-house team to ...

10 Things Your Next Firewall Must Do [ Source: Palo Alto Networks ]

June 2014- For enterprises looking at Next-Generation Firewall's, the most important consideration is: Will this new technology empower your security teams to securely enable applications to the benefit of the organization? It's not about blocking applications, but safely enabling them.

In this booklet, you'll find practical advice on:

• The how and why of next-generation security

• How to turn security into a business enabler

• 10 critical functions your ...

Take Charge of Security in a Hyperconnected World [ Source: RSA ]

May 2014- Read how organizations can improve breach readiness and cyber security maturity and see recommendations for areas with greatest opportunity for improvement.

How Strong is Your Malware Testing? [ Source: Spirent ]

May 2014- Malware is a large and growing problem - with an estimated 32% of computers worldwide infected in 2012. Worryingly, many of those infected computers would have been on networks protected by anti-Malware security measures.

Malware, which is short for malicious software, covers a broad category of hostile software. It is used to disrupt computer operation, gather sensitive information or gain access to private computer systems. Although advanced security systems can detect and prevent malware, they ...

VM Article Anthology Vol. 1: Reduce Your Risk from Vulnerabilities and Threats [ Source: Tripwire ]

March 2014- This anthology of blog posts from Tripwire's award-winning blog, "The State of Security" provides five cybersecurity experts' views on vulnerability management."

HawkEye G: The Active Defense Grid [ Source: Hexis Cyber ]

May 2014- HawkEye G is a dynamic active defense system designed to leverage existing security assets while providing advanced cyber security analytics and automated countermeasure techniques. The combination of the traditional signature-based and new behavior-based heuristics leads to heightened awareness of standard network activity and deviations that could indicate a potentially disastrous situation. Understanding the full threat and defense landscape is crucial for cyber security mitigation and the HawkEye G team has invested the time and resources ...

Five Things To Do After An Attack The Unique Challenges of Dealing with an Advanced Persistent Threat [ Source: Hexis Cyber ]

May 2014- After an organization been hacked, reducing the amount of time an APT lives within the environment is paramount.

To get the job done organizations must deploy a methodical approach that includes steps to detect/identify, contain - or perhaps not, and remove/recover from the attack as quickly as possible. But the process can't stop there. Attackers are increasingly creative in their methods of attack. To truly gain an advantage against attackers, security ...

Mitigating Targeted Attacks Requires an Integrated Solution [ Source: Trend Micro ]

May 2014- Despite increased awareness and focus on defending against targeted attacks from both business and security leaders, organizations continue to be breached and suffer the consequences. Many of today's security investments are simply not aligned to defend against these targeted threat vectors. Advanced threat detection and response should not be a point solution but rather a combination of technologies and core competencies. Detecting and responding to advanced threats should involve tight integration of multiple security technologies, ...

2014 The Danger Deepens - Neustar Annual DDoS Attacks and Impact Report [ Source: Neustar ]

May 2014- For the third consecutive year, Neustar surveyed hundreds of companies on distributed denial of service (DDoS) attacks. Neustar's survey reveals evidence that the DDoS attack landscape is changing. The number of companies attacked is up, but attack duration is down. Larger attacks are more common, but most attacks are still less than 1 Gbps. More than half of attacked companies reported theft of funds, data or intellectual property. Read the full report to learn how DDoS ...

KuppingerCole Leadership Compass: Identity Provisioning [ Source: Dell Software ]

May 2014- Identity Provisioning is still an important part of the Identity and Access Management market. That's why the field is crowded with vendors claiming to have the solution your business needs. But which one is right for your company?

This Leadership Compass delivers an overview of those market segments. Learn more about established vendors, smaller or regional vendors with good growth potential, and which vendors your company should take a close look at when ...

KuppingerCole Leadership Compass: Access Governance [ Source: Dell Software ]

May 2014- Access Governance is a fast-growing component in the Identity and Access Management market - so trusting a solution to manage it is crucial for the success of your business.

In this white paper, see why Dell One Identity Manager is identified as an Overall Leader in the KuppergerCole Leadership Compass: Access Governance report. You'll also get a detailed overview and analysis of the Access Governance market segement, and the solutions available in it.

IAM for the Real World: Identity Governance eBook [ Source: Dell Software ]

May 2014- Managing identity and access across the enterprise is difficult enough, and even simple provisioning can be tough. Factor in regulating compliance and navigating complex IT and user environments, and you?re looking at pretty sizable challenge.

In this eBook, discover best practices to solve your identity governance challenges. Topics include:

• A comprehensive view of governance that covers not only application access, but also data and privileged accounts.

• The key ...

Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems [ Source: Dell Software ]

April 2014- Learn why anti-evasion is a critical component for your intrusion prevention system. Sophisticated exploits that utilize advanced evasion techniques are all too common.

Intrusion prevention systems (IPS) are designed to prevent known attack traffic patterns from penetrating systems on the network. But there’s an inherent problem with the technology, since it can block only the attacks it sees and is already familiar with. If malicious code is cleverly disguised, it can slip ...

Guarding The Castle: The Strategies and Tools of Cybercriminals and How To Defeat Them [ Source: Dell Software ]

April 2014- Discover the top four strategies and tools that cybercriminals use to infiltrate your network, and how you can stop them. You need to understand your enemies before you can defeat them. This e-book will teach you why it is important that you know how you can secure your network every minute of the day against all types of malware, with a high performance firewall that protects against the latest global threats.

Find out ...

Next 25