Click on a filter below to refine your search. Remove filter to broaden your search.
|Last 12 months||remove|
Your search for advanced persistent threats returned 22 results.Sort results:
Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.
A panel at the SINET Innovation Summit agreed that while threats aren't more advanced they are persistent.
Real-time security information and event management solutions help organizations detect targeted attacks and advanced persistent threats within minutes, according to a McAfee survey.
Hackers are finding new attack vectors to exploit and it is becoming harder for us "security professionals" to defend our organizations, says Zouhair Guelzim, CISO, L'Oréal Americas.
Skycure has announced results of its first Mobile Threat Intelligence Report which found a growth in threats to enterprise and personal mobile devices.
FireEye found that a majority of enterprises had their systems breached during the first half of 2014, and often times, advanced malware allowed for the intrusion.
Even the most sophisticated, well-intentioned perimeter-focused cybersecurity strategy cannot possibly be 100 percent effective, says Oliver Tavakoli, CTO, Vectra.
Security researchers at cyber threat intelligence company iSight Partners identified malware - called ModPOS - that targets retail point-of-sale systems.
In recent years we've seen increasing numbers of companies fall victim to ransomware that encrypts a compromised computer's files.
Cybersecurity firm FireEye released a new report on APT29's complex malware HAMMERTOSS.
Ireland's Central Bank's deputy governor, Cyril Roux, has warned that it may only be a matter of time before a cyber-attack builds a problem that descends across the broader financial industry.
Vulnerabilities and other threats exposed in the Hacking Team leaks has spurred Rook Security and Facebook to each release free security tools.
Having the right products to provide solid intelligence analysis can go a long way toward protecting you against the ravages of a Sony-style compromise, says Peter Stephenson.
From childhood fascinations and unlikely epiphanies to unexpected opportunities and market surges, top security managers find inspiration in almost anything - and they're willing to seize opportunity and take responsibility to lead their teams.
A survey of IT security pros commissioned by Malwarebytes revealed that ransomware topped the list of security threats.
A trio of third quarter reports from security firms reveal changes and complexities in the threat landscape.
Questions have been raised over the security of the Microsoft Outlook Web Access (OWA) server, which "uniquely" connects protected internal systems to the internet.
In a recent survey, most, but not all, security professionals said they'd refuse to negotiate with cybercriminals.
This suite of tools from Alert Logic protects data in multiple locations, including on-premises.
Blessed are the influencers for they will make a true difference - through policy, vision, drive, innovation and ideas - in the course of information security. What sets our selection apart is that they've held significant sway on the direction of IT security.
The highly anticipated SC Awards U.S. are just around the corner. Here's the full list of finalists competing to take home a trophy on the big night in San Francisco.
Sign up to our newsletters
SC Magazine Articles
- Walmart partnered with Lockheed Martin, FBI for employee surveillance
- Tech support scams join forces with Nuclear EKs to distribute ransomware
- Aramada Collective demands ransom to stop DDoS attacks on Greek banks
- Google, tech groups oppose SEC's request for exemption from email privacy bill
- Contents of Calyx National Security Letter revealed