The intrusion prevention system is a mainstay of any organization's perimeter-focused security infrastructure, but its days may be numbered as a standalone technology. Yet, its purpose lives on.
It's one thing to be a victim of a phishing campaign, but it's an entirely different ball game when you're at the receiving end of a targeted attack.
Exposing and defeating cyber criminal campaigns out for financial gain or trade secrets is the challenge of the day, but there are strategies and tools available to help.
A new trojan is targeting the same Java vulnerability that the Flashback malware took advantage of last week.
The attack du jour, APTs, or advanced persistent threats, are real threats.
Hackers and computer criminals have shown an ongoing ability to stay one step ahead of the security professional, but there are strategies and tools to help thwart their efforts.
Hacker groups Anonymous and LulzSec have made a name for themselves by scanning large organizations until they find the one weak system ready to be exploited. You can prevent an attack.
Today, the best overall security solution includes technologies that can help you quickly respond to an inevitable attack.
Companies targeted by APT will need to upgrade their defenses strategy to include multiple, integrated layers of extremely sensitive anomaly detection and mitigation.
Many managers of utilities companies don't understand or appreciate the value of IT security...at their, the facilities' and the community's peril.
Intelligence-driven information security is the future of battling advanced persistent threats, according to a new report.
"Cyber Atlantic 2011" aimed to clarify how the two nations can best communicate about cyber incidents that occur on government systems or critical infrastructure.
The attacks, which occurred at four department locations, were not described in detail, but were deemed "successful" for adversaries, according to the annual audit.
Hiding the facts behind a cyberattack only stands to benefit the criminal.
McAfee has fired back at critics of its report on Operation Shady RAT, and said the CEO of rival anti-virus maker Kaspersky Lab, who called the report "alarmist," missed the whole point of the expose.
Let's forgo the APT hysteria long enough to make sure we're doing a good job on the fundamentals.
The term "APT" is now becoming synonymous with any form of cyberattack, distracting attention away from the real challenge.
In today's sophisticated malware and intrusion tactics, organizations should already assume they have been compromised. The key is readiness, says Larry Whiteside, CISO, Visiting Nurse Service of N.Y.
Sign up to our newsletters
SC Magazine Articles
- Long list of devices believed to be affected by NetUSB vulnerability
- Scammers target oil companies with sneaky attack
- CareFirst BlueCross BlueShield breached, more than one million individuals notified
- Study: Employees acknowledge risky security behavior, continue to engage in it
- Hack of airplane systems described in FBI docs raises security questions
- Hackers exploit Starbucks auto-reload feature to steal from customers
- Study: Nearly all SAP systems remain unpatched and vulnerable to attacks
- Former Nuclear Regulatory Commission employee arrested for alleged spear phishing campaign
- Millions of WordPress websites vulnerable to XSS bug
- FireEye first cybersecurity firm awarded DHS SAFETY Act certification
- Thousands of Bellevue Hospital Center patients notified of data breach
- Study: 86 percent of websites contain at least one 'serious' vulnerability
- Investigation ongoing in reported multimillion member Adult FriendFinder breach
- Report: $19M breach settlement between MasterCard, Target terminated
- FTC gives thumbs up to companies that cooperate during breach probes