Your search for advanced persistent threats returned 27 results.

Sort results:

Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.

Brief SINET panel sees uptick in bad actors, expanding attack surface

SINET panel sees uptick in bad actors, expanding attack surface

A panel at the SINET Innovation Summit agreed that while threats aren't more advanced they are persistent.

Webcast

Strategies that work for Advanced Persistent Threat Prevention

Advanced Persistent Threats (APTs) are being used to compromise organizations around the globe with increasing sophistication, persistence, and evasive attack methods.

News Survey: real-time SIEM solutions help orgs detect attacks within minutes

Survey: real-time SIEM solutions help orgs detect attacks within minutes

Real-time security information and event management solutions help organizations detect targeted attacks and advanced persistent threats within minutes, according to a McAfee survey.

Webcast

Best practices for removing admin rights: A step-by-step approach

Careful control of administrator rights in the very foundation of IT Security. Allowing admin rights exposes a dangerous security risk, creating an easy entry point for advanced persistent threats, zero-day attacks and sophisticated malware.

Opinion Is your organization prepared for targeted cyber attacks?

Is your organization prepared for targeted cyber attacks?

Hackers are finding new attack vectors to exploit and it is becoming harder for us "security professionals" to defend our organizations, says Zouhair Guelzim, CISO, L'Oréal Americas.

News Study: Majority of enterprises breached in first half of 2014, regardless of vertical

Study: Majority of enterprises breached in first half of 2014, regardless of vertical

FireEye found that a majority of enterprises had their systems breached during the first half of 2014, and often times, advanced malware allowed for the intrusion.

News Study: AV, anti-malware most used controls for APT defense

Study: AV, anti-malware most used controls for APT defense

Ninety-six percent of security pros employed AV and anti-malware solutions to protect data from APT attacks, while protections for mobile entry points fell at the bottom of the list.

News

Survey: 53 percent change privileged logins quarterly

A Lieberman Software survey highlights the issue or poor password management, even among security pros.

Opinion Rethink your cybersecurity strategy

Rethink your cybersecurity strategy

Even the most sophisticated, well-intentioned perimeter-focused cybersecurity strategy cannot possibly be 100 percent effective, says Oliver Tavakoli, CTO, Vectra.

News An answer to ransomware?

An answer to ransomware?

In recent years we've seen increasing numbers of companies fall victim to ransomware that encrypts a compromised computer's files.

Opinion Know your traffic: The case for egress monitoring and filtering

Know your traffic: The case for egress monitoring and filtering

Our networks are our field; no one knows our network better than us, the people who maintain it. We need to use that to our advantage.

Opinion Next-generation malware: Think like the enemy and avoid the car alarm problem

Next-generation malware: Think like the enemy and avoid the car alarm problem

When it comes to enterprise security, one rule remains constant - attacks will continue to increase in sophistication and attackers will seek to outmaneuver existing defenses.

Opinion Beware of the malware walking dead

Beware of the malware walking dead

This Hallows Eve might be a good time to remind ourselves that zombies can be just as deadly, and I'm referring to recycled tools and techniques from years gone by.

News Chinese hackers breach 50 U.S. gov't contractors' systems in one year

Chinese hackers breach 50 U.S. gov't contractors' systems in one year

A new report from the U.S. Senate Armed Services Committee found that multiple successful attempts were made to access and steal information from contractors' systems, and often times, the government didn't know it happened.

Product Review Invincea Platform v3.3/4.0

Invincea Platform v3.3/4.0

Invincea provides an additional layer of security at the endpoint by adding in protection for web browsing and document use.

Group Test

Emerging products: Threat intelligence

Having the right products to provide solid intelligence analysis can go a long way toward protecting you against the ravages of a Sony-style compromise, says Peter Stephenson.

Feature Reboot 25: Top management

Reboot 25: Top management

From childhood fascinations and unlikely epiphanies to unexpected opportunities and market surges, top security managers find inspiration in almost anything - and they're willing to seize opportunity and take responsibility to lead their teams.

News Study reveals industry pros troubled most by ransomware threat, damage

Study reveals industry pros troubled most by ransomware threat, damage

A survey of IT security pros commissioned by Malwarebytes revealed that ransomware topped the list of security threats.

News DDoS attacks grew in size, threats became more complex, Q3 reports say

DDoS attacks grew in size, threats became more complex, Q3 reports say

A trio of third quarter reports from security firms reveal changes and complexities in the threat landscape.

Feature In search of intelligence...

In search of intelligence...

The interruption of the cyberattack kill chain through the use of intelligence-driven security has been touted as the better way forward.

Page 1 of 2

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US