Sort results by: Published date | Company name
Showing items 1-25

Business and the Cyber Threat: The Rise of Digital Criminality [ Source: BAE Systems Applied Intelligence ]

April 2014- Across the world, cyber attacks are now taking place on an industrial scale. The World Economic Forum has warned that the theft of information and the intentional disruption of online or digital processes are among the very top business risks that major institutions face. It also suggests, however, that improved cyber security could save the world economy trillions of dollars.

Recent high profile attacks have highlighted just how much cyber crime can cost ...

Snake Campaign & Cyber Espionage Toolkit [ Source: BAE Systems Applied Intelligence ]

April 2014- This new report from BAE Systems Applied Intelligence provides further details on how the recently disclosed 'Snake' cyber espionage toolkit operates. Timelines of the malware development show this to be much bigger campaign than previously known. Specifically it reveals that the malware has actually been in development since at least 2005. From the complexity of the malware, and the range of variants and techniques used to support its operation, the research also suggests that Snake's authors ...

The Threat Landscape [ Source: Kaspersky Lab ]

April 2014- Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with new malware and evolving cybercriminal tricks?

Thankfully, Kaspersky Lab security experts have got you covered. Download our Guide to the Threat Landscape to have access to a wealth of IT security intelligence, including:

A concise overview of malware and tactics
Common vulnerabilities and exploits
Practical advice ...

IT Security by the Numbers: Calculating the Total Cost of Protection [ Source: Kaspersky Lab ]

April 2014- Humorist Franklin P. Jones may have said it best: "When you get something for nothing, you just haven't been billed for it yet." These are wise words of warning for businesses counting on so-called "free" IT security software.

Kaspersky Lab has created an eBook to help you calculate the true cost of protecting your business infrastructure, intelligence, and reputation. Download "IT Security by the Numbers: Calculating the Total Cost of Protection" to learn ...

Windows XP End of Life Handbook for Upgrade Latecomers [ Source: Bit9 ]

April 2014- April 8, 2014, is the end-of-life date for Windows XP and Microsoft Office 2003. After that date, there will be NO MORE security updates and critical patches available unless you pay the high cost of out-of-band support. You considered upgrading to Windows 7 or Windows 8 but your hardware won't run these operating systems, or your XP applications won?t run on the newer operating systems, or you simply can?t afford to upgrade. If you do nothing, you know ...

The Convergence of Security and Compliance [ Source: Bit9 ]

April 2014- This white paper explains how a single, positive security solution, such as Bit9, facilitates the convergence of compliance and security-one agent that provides visibility, detection, response and protection and can automate and manage compliance for PCI-DSS, SOX, HIPAA, FISMA, GLBA, GPG 13, NERC CIP and other regulations.

IT security and compliance professionals must take proactive measures to prove continuous compliance with industry regulations or face steep noncompliance fees and/or damage to their company's ...

10 Ways to Protect your Company from a Data Breach [ Source: Bit9 ]

April 2014- As a result of the recent spate of high-profile data breaches at brand name retailers, compromising credit and debit card and other personally identifiable information for hundreds of millions of consumers in the process, data security has become priority No. 1 for many retailers in 2014. And for good reason: The consequences of suffering a data breach are numerous, and none of them are positive - consumer mistrust, a drop in traffic and a decrease in sales, ...

Server Security: A Reality Check [ Source: Bit9 ]

April 2014- Regardless of how they initially enter the organization, most attackers today still aim to compromise internal servers to steal user credentials, steal sensitive data, and turn compromised servers into hosting platforms used to help attackers steal even more assets. This webcast will discuss the methodology of internal and external attacks on data center servers and the applications running on them. It will discuss why, even with our layers of security in place today, servers are ...

Advanced Endpoint and Server Protection [ Source: Bit9 ]

April 2014- Endpoint protection has become the punching bag of security. For every successful attack, the blame seems to point directly to a failure of endpoint protection. Not that this is totally unjustified - most solutions for endpoint protection have failed to keep pace with attackers.

This Advanced Endpoint and Server Protection paper will dig into protecting devices against advanced attackers. We will highlight a number of new alternatives for preventing and detecting advanced malware, ...

Simplifying Employee Investigations [ Source: SpectorSoft Corporation ]

March 2014- You just got news of yet another issue that just happened in your business that now you need to deal with - it could be a sexual harassment claim, a tip on an employee stealing, or just someone goofing off on the Internet for way too long. Some issues only require the employees involved to get in a room with HR to address, while others require extensive detective work by the good folks in IT. ...

Insider Threat Survey Report [ Source: SpectorSoft Corporation ]

March 2014- Are you Catching the Signals

The insider threat is alive, thriving and often responsible for major data breaches that expose everything from consumer credit-card information to valuable intellectual property (IP), and the findings of our most recent survey support this assertion. The results from a pool of 419 enterprise-security respondents revealed that 23 percent of enterprises have experienced insider-driven data breaches.

Download this report and read more about 10 alarming Insider Threat trends.

Implementing an Employee Monitoring Program [ Source: SpectorSoft Corporation ]

March 2014- Security & Risk professionals recognize the value and benefits of implementing an employee-monitoring program. Privacy advocates and Legal and Human Resources professionals see potentially unwarranted invasion of employee privacy as reasons not to monitor, or at least to restrict monitoring to instances where enough "probable cause" exists to warrant tilting the balance between the privacy of an employee and the interests of the company.

In this whitepaper you will learn how to assist company ...

Network protection and UTM Buyers Guide [ Source: Sophos ]

March 2014- Using a UTM solution for your network protection used to be a compromise - while you gained in resource savings and ease of use, there was a payoff in terms of protection capabilities. This buyers guide looks at the factors you should consider when evaluating solutions to ensure you have the protection and functionality you need.

How to Secure Your Wireless Network [ Source: Sophos ]

March 2014- It isn?t hard to set up security for the wireless router in your basement: change the SSID, pick a strong password and perhaps install VPN software for remote access. But securing wireless networks in a business environment is much more demanding. Learn best practices that can help administrators go beyond the basics of wireless security to provide advanced security, manageability and accessibility.

A Managers Guide to Unified Threat Management and Next-Gen Firewalls [ Source: Sophos ]

March 2014- Unified threat management (UTM) systems are among the most widely used tools in the information security arsenal. The concept of unified threat management is very appealing: multiple critical security technologies, integrated on a single platform, provided by a single vendor. But the process of evaluating UTM options is not simple.

This guide covers the key factors you should consider when evaluating UTM and Next Gen Firewall solutions.

Protecting Your Roaming Workforce With Cloud-Based Security [ Source: Sophos ]

March 2014- Remote and roaming workers are constantly checking email, downloading data, and staying productive. Results are their top priority-security is not. IT organizations need to keep up with these high-performers to update their security software and scan their systems for viruses without reducing their productivity.

So how can you empower remote and roaming employees with the tools they need, while still protecting your computing resources and proprietary data-without busting the budget or hiring an ...

Managing BitLocker with SafeGuard Enterprise [ Source: Sophos ]

March 2014- Full-disk encryption is rapidly becoming a standard security solution, like antivirus or spam filters-a trend further accelerated by widespread use of Microsoft BitLocker. However, to support the flexibility of your workers today, full-disk encryption is not enough to prevent data loss. Your users are no longer confined to the office by their technology and their PCs, and work has become a thing people do rather than a place they go to.

This whitepaper ...

Advanced Persistent Threats: Detection, Protection and Prevention [ Source: Sophos ]

March 2014- The threat landscape is changing, or is it?

Many papers on the topic of advanced persistent threats (APTs) begin with ominous references to the changing threat landscape and stories of how highly sophisticated cyber attacks are becoming more prevalent. That can be misleading. The majority of attacks today still use many techniques that have been around for years-social engineering, phishing emails, backdoor exploits and drive-by downloads, to name the biggest ones.

...

Two Great Ways to Protect Virtual Machines From Malware [ Source: Sophos ]

March 2014- Virtualization promises to reduce operational costs, simplify management and increase availability of servers and virtual desktops. But how do you protect virtual machines from malware without compromising the performance and convenience that you expect from your investment in virtualization?

This paper aims to help IT professionals, including security and virtualization specialists, understand and choose between two modern approaches to securing virtual environments: agentless scanning using vShield Endpoint and client-based scanning optimized for virtual ...

Endpoint Buyers Guide [ Source: Sophos ]

March 2014- It takes more than antivirus to stop today's advanced threats. An endpoint protection solution is an important part of your IT security strategy to protect corporate assets. Evaluating the many components that make up an endpoint security solution may seem overwhelming. Get independent research and test results to help you determine your requirements and identify the vendor that best meets your needs.

Acheiving Trust After a Breach [ Source: Tripwire ]

March 2014- When an organization has been compromised, some of the first questions to ask are critical:

•Which systems can I trust?
• What was done to compromise my systems or data?
• How quickly can I figure out where I stand?

Tripwire is often called in after the fact to help answer these questions, even if the breached organization was not monitoring their systems with Tripwire technology. The following ...

Vulnerability Management Evolution: From Tactical Scanner to Strategic Platform [ Source: Tripwire ]

May 2012- Organizations have traditionally viewed vulnerability scanners as a tactical product, largely commoditized, and only providing value around audit time. How useful is a 100-page vulnerability report to an operations person trying to figure out what to fix next? But the tide is definitely turning?there is now a clear shift from a largely compliance-driven orientation to a more security-centric view. It?s widely acknowledged that compliance provides a low bar for security, and it just ...

Reducing Risk Through Prevention: Implementing Critical Security Controls 1-4 [ Source: Tripwire ]

March 2014- In almost every year since 2000, the Internet Crime Complaint Center has reported an increase in cybersecurity crime reports by individuals and organizations. Over the last dozen years, the number of attacks reported in the United States seems to grow consistently over time. After examining this trend, the question arises: Is there anything an organization can do to stop these attacks from occurring and protect their critical information systems from intruders?

Business leaders need ...

Tripwire Vulnerability Scoring System [ Source: Tripwire ]

March 2014- Measuring and managing the security risk associated with information and information technology remains one of the most challenging and elusive problems faced by all levels of an organization. The challenge of how to measure, and therefore how to manage, risk is ever-present and top of mind for information security professionals. Unfortunately, most of the tools for vulnerability and risk management that exist today do not provide a suitable metric and consequently do not improve an ...

Buyer's Guide to Choosing a Vulnerability Management Solution [ Source: Tripwire ]

March 2014- Most organizations understand the critical role that vulnerability management (VM) plays in helping them meet compliance requirements,ensure security and reduce risk. However, many organizations discover,only after investing in a solution, that it doesn't properly address their needs. Avoiding this costly mistake can be difficult though, because at first glance many VM solutions appear similar.

This guide helps you objectively choose a new or replacement VM solution by teasing out the real ...

Neustar SiteProtect | UltraDNS Solution: Double Your Protection [ Source: Neustar ]

March 2014- Learn how to protect against DNS DDoS attacks plus safeguard against cache poisoning with DNSSEC. UltraDNS manages and maintains its own industry leading resolver platform, as a non-open source platform, it isn't prone to hijacking, spoofing or viruses.

Next 25