Sort results by: Published date | Company name
Showing items 1-25

Snake Campaign & Cyber Espionage Toolkit [ Source: BAE Systems Applied Intelligence ]

April 2014- This new report from BAE Systems Applied Intelligence provides further details on how the recently disclosed 'Snake' cyber espionage toolkit operates. Timelines of the malware development show this to be much bigger campaign than previously known. Specifically it reveals that the malware has actually been in development since at least 2005. From the complexity of the malware, and the range of variants and techniques used to support its operation, the research also suggests that Snake's authors ...

The Threat Landscape [ Source: Kaspersky Lab ]

April 2014- Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with new malware and evolving cybercriminal tricks?

Thankfully, Kaspersky Lab security experts have got you covered. Download our Guide to the Threat Landscape to have access to a wealth of IT security intelligence, including:

A concise overview of malware and tactics
Common vulnerabilities and exploits
Practical advice ...

The State Of Advanced Persistent Threats [ Source: Trusteer ]

March 2014- Sponsored by Trusteer, we are pleased to present the findings of The State of Advanced Persistent Threats (APTs). This study examines how organizations are responding to a plethora of advanced targeted malware attacks. To ensure knowledgeable participants in this research, we surveyed 755 bona fide IT and IT security practitioners who have involvement in defensive efforts to prevent and/or detect APTs launched against their organization. Sixty-eight percent of these respondents say zero day attacks are ...

Committed To Memory: Protecting Against Memory-Based Attacks [ Source: Lumension ]

March 2014- Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Here's what you need to know about memory-based attacks-and how to effectively protect against them.

Closing The Antivirus Protection Gap: A Comparative Study On Effective Endpoint Protection Strategies [ Source: Lumension ]

March 2014- Corporate economic concerns have put increased pressure on already limited IT resources in recent years as the onslaught of malware and sophistication of cyber attacks continues to grow at exponential rates. As a result, 50% of endpoint operating costs are directly attributable to malware, yet corporate IT budgets are still focused on maintaining stand alone antivirus as the keystone in endpoint security. In this paper, we will benchmark the effectiveness of standalone AV and O/S ...

Threat Intelligence & Incident Response: A Study of U.S. & EMEA Organizations [ Source: AccessData ]

February 2014- Threat Intelligence & Incident Response: A Study of U.S. & EMEA Organizations, sponsored by AccessData, surveyed 1,083 CISOs and security technicians in the United States and EMEA about how their company handles the immediate aftermath of a cyber-attack and what would help their teams more successfully detect and remediate these events.

Learn the unsettling truth about how limited today?s information security departments really are when it comes to defending their domains, including:

&...

Seriously Organized Crime: Tackling Cyber Enabled Financial Fraud [ Source: BAE Systems Applied Intelligence ]

March 2014- Commercial organizations are under increasing attack from financial crime. And as those carrying out traditional fraud are adopting new techniques, that until recently were the domain of sophisticated cyber espionage groups, so commerce now has to manage a growing strategic risk to both their bottom-line and their brand reputation.

The following issues are highlighted in this new whitepaper:

•So what's happening?
•The attack components
•Taking control<...

Lumension Guide To Device Control Best Practices [ Source: Lumension ]

March 2014- USB flash drives and other removable storage devices continue to proliferate throughout organizations. This could result in the loss or theft of your sensitive corporate and customer data, or in the propagation of malware like Stuxnet. Fortunately, powerful data protection tools are now available to help mitigate these risks, while still enabling flexible and managed use of these productivity devices. Learn about the best practices for deploying device control within your environment. Walk away with ...

Who's Spying on You? [ Source: Kaspersky Lab ]

February 2014- You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations.

Don't get caught in the crossfire. Read our special report "Who's spying on you?" to find out more:

Techniques cybercriminals use
Common exploited vulnerabilities
Collateral damage from cyberespionage
Protecting your business ...

Financial Security: What Smaller Institutions Can Learn From DDoS Attacks On Big Banks [ Source: Neustar ]

February 2014- Since last fall, several waves of distributed denial of service (DDoS) attacks have targeted major players in the U.S. banking industry. JPMorgan Chase, Wells Fargo and PNC were among the first to sustain intermittent damage. Eventually, the top 50 institutions found themselves in the crosshairs. Websites crashed, customers couldn't connect to make transactions and banks scrambled to get back online- and stay there as long as they could. In the months to come, security experts ...

Ecommerce Site Needs Protection Against Cyber 'Pirate' [ Source: Neustar ]

February 2014- There are over 7,000 DDoS attacks every single day and they can happen to anyone, at any time. In this case study, learn how a business with 95% of revenues generated online was hit by DDoS attacks over a 6-month period, resulting in lost sales and damage to its brand. However, by assessing the threat and using Neustar SiteProtect and UltraDNS solutions, they were able to mitigate and protect their Website from future attacks. Read this case ...

Big Data Turns Government Challenges into Opportunities [ Source: IBM ]

August 2013- The sheer volume of data, the speed at which it is growing and the increasing variety of types of data have given rise to the term big data - data sets whose size or type is beyond the ability of traditional relational databases to capture, manage and process the data quickly and efficiently. Yet it's precisely this type of data that is so important to government today. Big data, mined and analyzed effectively, offers government ...

How To Protect Against the Top 6 Vulnerability Trends [ Source: HP ]

July 2013- This in-depth report provides a broad view of the cyber vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including Web and mobile. Download this valuable report to gain the security intelligence you need to better understand how to deploy limited enterprise resources and best minimize security risks.

Sponsored by:

The Risks of "Do It Yourself" Recovery [ Source: IBM ]

July 2013- Are you considering in-house disaster recovery management? In the last five years, many companies have. But did you know that without the proper resources in place, managing disaster recovery yourself can put a strain on your budget, your staff and your disaster preparedness? Read this IBM-Forrester global study ?The Risks of ?Do It Yourself? Disaster Recovery? to learn the critical components that make a disaster recovery strategy successful, and the key questions you need to ...

Rethinking your enterprise security [ Source: HP ]

July 2013- The world is constantly evolving and always connected, and your enterprise must be too. Forward-thinking enterprises realize that they need a sustainable approach to security and risk management-one that addresses the new wave of vulnerabilities that prevail due to increasing trends in IT consumerization, mobility, social media, cloud computing, cybercrime, and nation-state attacks.

Sponsored by:

HP 2012 Cyber Risk Report [ Source: HP ]

July 2013- Did you know it takes an average of 416 days to detect a security breach? Read the 2012 HP Cyber Risk Report for information that will guide you in deploying security programs to minimize risk and protect against breaches. You'll gain insight into the top vulnerability trends, web application vulnerabilities, and mobile application security, and you?ll learn what to look for in the year ahead to keep your enterprise secure.

Sponsored by:<...

Overcoming Fragmentation and Blind Spots in Network, Endpoint and Server Security [ Source: Bit9 ]

June 2013- Despite the fact that today's IT security threats have advanced across a spectrum of sophistication and scale, defenses continue to fail with alarming consistency. The evolution of defense has produced fragmentation among security tools that keeps them from working together to deliver more effective response. The gap between network security technologies and defenses on endpoints and servers is a particularly pointed example.

Download this whitepaper and learn how to close these gaps and ...

APT Confidential: 14 Lessons Learned from Real Attacks [ Source: Bit9 ]

June 2013- It's an unprecedented time of cyber attacks and information about attacker methods is difficult to obtain unless you are the victim, and let's face it, by then, it's too late.

This whitepaper details lessons learned about cyber attacks from extensive interviews with security analysts. One common thread that emerged was the difficulty of preventing the delivery of APT malware to systems and quickly detecting the attack once the malware was active. In between ...

What You Don't Know Can Hurt You: Detecting Unknown Threats and Reducing Response Times [ Source: AccessData Group ]

June 2013- Protecting enterprise operations from hacks, malware, targeted attacks, advanced persistent threats (APTs) and other malicious activity remains a challenge for organizations, large and small. The number of breaches continues to grow and shows no signs of slowing despite technology advances and a market flush with cybersecurity products. In fact, according to the 2013 Verizon Data Breach Investigations Report (DBIR), 66 percent of surveyed organizations didn't discover security breaches until months after the fact, and 69 percent of these ...

Combining Cloud-Based DDoS Protection and Managed DNS Services to Thwart Large Attacks. [ Source: Verisign ]

May 2013- As businesses continue to move critical operations online, distributed denial of service (DDoS) attacks are increasing in frequency, sophistication and range of targets. In a 2011 Verisign study, 63 percent of respondents reported experiencing at least one attack that year, while 51 percent reported revenue loss as a result of downtime from the attack. Those numbers are undoubtedly higher today as the size, frequency and complexity of DDoS attacks continue to grow.

Mitigation against these types ...

DDos Malware [ Source: Verisign ]

May 2013- The most recent financial institution attacks have been launched via the BroBot/itsoknobroblembro toolkit. This advanced toolkit supports multiple attack methods, including HTTP, HTTPS and DNS.

DDoS and Downtime Considerations for Risk Management [ Source: Verisign ]

May 2013- While most enterprise risk managers are accustomed to addressing regulatory compliance, data integrity and data privacy within an IT risk management framework, many have not fully accounted for IT availability as it relates to business continuity. Even risk managers who do consider IT availability may focus only on operational and environmental threats (e.g., human error, fires and floods) while overlooking distributed denial of service (DDoS) attacks, which are one of the leading causes of ...

3 Strategies To Protect Endpoints From Risky Applications [ Source: Dell ]

May 2013- Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today's IT environment. That's because as the typical IT organization has worked on reducing the risk profile of PC and server operating systems, cyber criminals have started to look for greener pastures - namely among third-party applications. This white ...

Reality Check: Putting Next Generation Threat Detection to the Test [ Source: Websense ]

May 2013- Unfortunately, stopping known threats isn't enough to protect real-world networks. Solutions must also stop unknown threats at every stage of an attack. This white paper reveals the results, conducted by the leading independent test laboratory Miercom, from over 2.2 million live web requests of unknown nature simulated as a typical day on a network like yours.

2012 IBM X-Force Annual Trend and Risk Report [ Source: IBM ]

May 2013- The IBM X-Force Trend and Risk Report is produced twice per year: once at mid-year and once at year-end. This report provides statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity. They are intended to help customers, fellow researchers, and the public at large understand the changing nature of the threat landscape and what might be done ...

Protect Your Systems from Stealthy Attacks [ Source: McAfee ]

May 2013- The most menacing type of cyberattack is invisible. Using sophisticated techniques to hide its presence, a stealth attack may operate outside of the OS or move dynamically across endpoints to conceal the attackers' actions. The risk to enterprises is real, with high-profile attacks such as Operation High Roller impacting companies around the globe. Traditional antivirus or intrusion prevention systems are no match for this new breed of attack; instead, enterprises need layered security controls that ...

Next 25