Sort results by: Published date | Company name
Showing items 1-25

Beyond Whois: How Extended Domain Profiles Can Yield Unexpected Insights [ Source: DomainTools ]

November 2014- Every investigation has a starting point. A basic Whois query takes just a few seconds but can quickly provide the foundation for a successful investigation However, it's often the data that does NOT reside in a Whois record that can be truly illuminating. Like a CarFax report that goes beyond the vehicle title, there is a wealth of knowledge captured in other public data that can be invaluable to an investigator when leveraged appropriately. This ...

Using DNS Data in Cybercrime Intelligence and Incident Forensics [ Source: DomainTools ]

October 2014- When cybercrime happens, it is imperative to discover as much as possible about the scope of activity and the entity behind the crime. The right set of data and tools can help unmask hostname and IP address ownership, can highlight connections between nefarious online resources and accelerate your investigation into malicious activity and criminal attribution. Read our Cybercrime Investigation Guide to learn how DNS Intel can help you in developing a suspect profile, mapping associated ...

Supercharge Your SIEM: How Domain Intel Enhances Situational Awareness [ Source: DomainTools ]

April 2015- Security Information and Event Management (SIEM) tools have become indispensable for the modern enterprise. These are the eyes and ears of a security team, providing them with the ability to detect network anomalies and track down threats. But even the best SIEM tool falls short when it comes to situational awareness of key "outside the firewall" aspects of an attack. Security professionals have long understood that they must evolve quickly to meet the challenges of ...

Best Practices for Dealing with Phishing and Next-Generation Malware [ Source: ThreatTrack Security ]

April 2015- Despite the billions of dollars spent each year on anti-phishing, anti-malware, antianti- spam and other security solutions, threats still find their way into most organizations despite the best efforts of security teams to stop them. In fact, for many organizations the problem is actually getting worse over time. The consequences of these incursions can be severe, and in some extreme cases cause a business to go bankrupt.

Cybercriminals Wreak Havoc Beyond Big Enterprises [ Source: ThreatTrack Security ]

April 2015- Breaches at large enterprises grab headlines, but cybercriminals are developing a taste for smaller businesses. The mid-market (companies with 500 to 2,500 employees) is becoming fertile ground for cybercriminals looking to exploit unsuspecting organizations with valuable data to steal and much more to lose.

IDG: Why Application Security is a Business Imperative [ Source: Veracode ]

April 2015- The harsh reality is that most internally developed applications are not assessed for critical security vulnerabilities such as SQL injection. IDG Research Services recently surveyed top IT and security executives at enterprises across a variety of industries in the U.S., U.K. and Germany to better understand the enterprise security landscape. This paper examines the survey results.

Why Security Analysts Can't Live Without Big Data [ Source: Platfora ]

April 2015- Recent high-profile data breaches in financial services, retail, healthcare, and other major industries underscore two things for today's organizations: determined cybercriminals are adept at finding and fully exploiting even the smallest security gap, and detection of their activity often comes much too late - and at great cost for the business.

But with almost no purpose-built tools to help analyze security incidents, detect root causes, and unearth larger attacks before adversaries succeed at ...

Cybersecurity and the C-Suite: How Executives Can Understand Cyber Risks and Ensure Governance [ Source: SurfWatch Labs ]

April 2015- This paper is written for business decision-makers to help understand the risk landscape and learn how to incorporate a sound cyber risk framework that is based on a business intelligence approach.

Cybersecurity and the C-Suite: How Executives Can Understand Cyber Risks and Ensure Governance [ Source: SurfWatch Labs ]

April 2015- This paper is written for business decision-makers to help understand the risk landscape and learn how to incorporate a sound cyber risk framework that is based on a business intelligence approach.

Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk [ Source: SurfWatch Labs ]

April 2015- This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this information to determine which cyber insurance options make the most sense based on your business.

Cybersecurity and the C-Suite: How Executives Can Understand Cyber Risks and Ensure Governance [ Source: SurfWatch Labs ]

April 2015- This paper is written for business decision-makers to help understand the risk landscape and learn how to incorporate a sound cyber risk framework that is based on a business intelligence approach.

Big Data, Big Mess: Sound Risk Intelligence Through Complete Context [ Source: SurfWatch Labs ]

April 2015- This paper explores the good, bad and ugly of big data in cybersecurity and provides tips for understanding cyber risk in complete business context that includes your industry sector, infrastructure, company size, supply chain, location, your online presence, and many more factors.

5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain [ Source: SurfWatch Labs ]

April 2015- As business becomes more connected and as data moves further outside the organizational walls, the supply chain has become a critical chink in the security armor. This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.

How to Prevent Security Breaches in Your Retail Network [ Source: Dell SonicWALL ]

April 2015- In today's era of multi-vector attacks, IT security for retail requires more than blocking threats at the perimeter. Cutting-edge IT managers are now adopting a multilayer security blueprint to detect intrusions inside the network. Find out how you can do the same for your retail environment.

Shellshock and Future Vulnerabilities - Buying Precious Time [ Source: Dell SonicWALL ]

April 2015- Shellshock wasn't the first widespread network vulnerability to grab headlines, and it won't be the last. Find out how attackers are able to exploit your network vulnerabilities, and how IT managers and network administrators can be better prepared.

Rules of Engagement: A Call to Action to Automate Breach Response [ Source: Digital Guardian ]

December 2014- This Forrester report is a call to action for a more automated threat response process based on developing a set of cyber "rules of engagement" that will empower security teams to act more quickly and aggressively to stop data breaches before they can threaten the business.

Dealing with Data Breaches and Data Loss Prevention [ Source: Proofpoint ]

April 2015- As data grows and organizations become more vast, the risk of sensitive data being breached increases at an alarming pace. With data breaches making the headlines more than ever, organizations are forced to consider the safety of their data, the policies they have in place to protect it, and the strategies and tools at their disposal for breach mitigation.

Download the latest research report from Osterman Research, Inc., Dealing with Data Breaches and ...

The New Phishing Threat: Phishing Attacks [ Source: Proofpoint ]

April 2015- The threat of email borne attacks is greater than ever with malware volumes increasing drastically. One of the most common, and difficult to detect, email threats comes in the form of phishing and spear-phishing emails.

Historically, phishing attacks targeted end-users with attackers going after credentials to financial accounts. But modern phishing attacks have evolved toward targeting sensitive corporate data as evidenced by the high profile data breaches targeted at diverse organizations including RSA ...

Defending Against Advanced Threats - Addressing the Cyber Kill Chain [ Source: Proofpoint ]

April 2015- As clearly evidenced by the daily headlines about security breaches, traditional defense tools are failing to protect enterprises from advanced targeted attacks. A deeper understanding of these attacks and how cybercriminals approach them is key to ensuring your organization is protected.

Understanding the Cyber Kill Chain model and how attackers use the cycle of compromise, persistence and exfiltration against an organization is simple but creating an architecture and supporting policies to address it ...

Security experts' guide to the cloud [ Source: ControlNow ]

April 2015- Cloud and security are two terms that were rarely uttered in the same sentence: For many sceptics, the two did not go together. That viewpoint has changed considerably over the past couple of years with cloud-based solution providers beefing up security to the extent that it is more reliable than what a small to mid-sized business can ever muster. In this ebook, tech influencers share their views on security and the cloud and give advice ...

The giant's advantage - Why cloud computing levels the playing field for SMBs [ Source: ControlNow ]

April 2015- Decision makers in SMBs often raise concerns about cloud computing. There is a belief that cloud-based solutions cause SMBs to sacrifice security and control of their business-critical data. But, according to recent IBM research, businesses relying on cloud computing have a competitive advantage. And it's generating twice the revenue - and profit - of their slower-to-adapt rivals.

Layered Protection - Thirteen Days of Cybercrime [ Source: ControlNow ]

April 2015- Did you know that most companies usually find out about the security breach around 200 days after the occurrence ( By that time, their confidential information is all over the web and it takes time and money to bring everything back to normal and regain your customers trust. Read our whitepaper to see why your business needs multiple layers of protection to stay secure.

Email security in small and medium-sized businesses [ Source: ControlNow ]

April 2015- Nowadays, organizations can't afford to operate without an email security strategy. The threat landscape is constantly changing with new threats appearing every day. This white paper looks at email security in small and medium businesses (SMBs), the solutions available and what features SMBs cannot do without.

Cracking the Endpoint: Insider Tips for Endpoint Security [ Source: Bit9 ]

April 2015- Despite decades of attacks, many organizations continue to struggle with the fundamentals of endpoint security. IT organizations, large and small, continue to wrestle with basic endpoint challenges such as understanding what applications are running in their environment, who has administrative privileges, and what versions of software are installed on endpoints. In today's dynamic security landscape, each new day brings new and different threats targeting your organization. Cyber criminals today are more sophisticated than in day's ...

Why Are You Still Paying for Antivirus? [ Source: Bit9 ]

April 2015- The front lines of the cyber war have moved away from the perimeter and onto the endpoint. End user desktops and laptops are under fire from two types of security issues: nuisance malware and advanced threats. Nuisance malware can damage productivity and consume IT time, but advanced threats can cripple a company. As advanced attacks increase in both sophistication and quantity, the potential risk and damage they pose to organizations has increased exponentially. While antivirus (...

Breach Detection: What you need to know [ Source: Bit9 ]

April 2015- Today's cyber attacks have changed in sophistication, in focus, and in their potential impact on your business. This eBook will outline the tactics today's advanced attackers are using to break into your organization and why you require a defense-in-depth cybersecurity program that incorporates automatic detection and incident response. The goal of this ebook is to leave you with the knowledge you need to effectively protect your business against today's advanced attacks. Who should read this ...

Next 25