Cybercrime Spotlight

Malware
Bradley Barth,
Jan 19, 2017

Cybercrime News Feature
 
The Carbanak cybergang has been spotted using Google for its malware command-and-control channel.
Also in this feature

Product Reviews

NNT Change Tracker Generation 7

Verdict: For the change management required for compliance in just about all regulatory requirements, this is a very strong contender.

Allgress Insight Risk Manager

Verdict: Well worth looking at for those with a need for a complete risk management tool.

Tufin Orchestration Suite

Verdict: We would like to see some form of auto discovery beyond what is available currently. Verdict This one is well worth your time, but be sure that you have everything on your enterprise identified so that the Suite can access it and collect data.

Modulo Risk Manager

Verdict: This is a gold standard of GRC systems. It has all of the bells and whistles that you need and just about nothing that you don’t.

LockPath Keylight Platform

Verdict: Solid, hard-core GRC.

Acuity Risk Management STREAM Integrated Risk Manager

Verdict: Solid, versatile risk management tool that can fit organizations of just about any size – from the single consultant to large enterprises.

AlgoSec Security Management Solution

Verdict: This is an excellent tool, especially for mid- to large-sized organizations. It has everything you need and is comfortably manageable. We compare it to a sailboat – even though it’s fairly large and complex, can be sailed effectively by a single person.

Whitepapers

The Definitive Guide to Office 365

How do you protect against security threats to Office 365? Download this comprehensive guide to learn best practices for deploying Office 365 and tips for making the most of Microsoft’s...

Be Wary of What Travels Inside

Encrypted web communication routinely bypasses enterprise security controls. This paper examines the malicious use of encryption, including statistics, details on encrypted threats...

5 Essentials For Cloud Archiving Success

Your organization can’t survive without email. In turn, the data held within email is an invaluable resource for compliance and efficiency. Moving to the cloud involves its own set...

This is How We Do It: A Financial Giant's Threat ...

This is the story of how a Fortune 100 financial services organization integrated its security infrastructure, increased the efficiency of its cybersecurity team, and thereby identified...

Sponsored Links