Gartner Advice on Defending Against 4 Attack Threats
This was taken from an article from Dark Reading, covering a recent Gartner Security & Risk Management Summit. Gartner experts were discussing how to defend against 4 main types of attack threats. (more…)
Verizon 2012 Data Breach Report
If you haven’t read the Verizon 2012 Data Breach Report, you may want to check it out. Contains a wealth of information on what’s going on in information security breaches. Here’s a link: (more…)
Security Worm Targets Design Documents
I thought this was an interesting article out of Dark Reading lately – “AutoCAD Worm Targets Design Documents in Possible Espionage Campaign”. (more…)
Security awareness training is more important than ever.
Can’t state it often enough – Cyber security awareness training is more important than ever. Many of the incidents we respond to are caused by malware being downloaded by users. Once it’s in your network, it’s only going to propagate. It’s like a bad roach infestation. (more…)
Cyber Attacks on our Critical Infrastructure
Recent article from Dark Reading, June 29: U.S. Critical Infrastructure Cyber Attack Reports Jump Dramatically. (more…)
Protecting against zero-day malware.
Let’s talk a bit about advanced malware. Many folks we talk with feel they are doing well with protecting their network perimeter. They’ve got firewalls in place, anti-virus, IDS/IPS. The issue is, that these are all signature based solutions. They don’t protect against zero-day malware. (more…)
You cannot see what you do not have
We see time and time again in our incident response practice department scenarios where long-term systemic malware resides in a seemingly secure environment for months at a time. (more…)
10 Years of Malware and Threats
Again, from a Dark Reading article, Microsoft Studies 10 Years of Malware and Threats. Microsoft, in celebration of the 10-year anniversary of the launch of its Trustworthy Computing Initiative, published a special edition of its Security Intelligence Report. They looked at the past 10 years and how the cyber threat landscape has evolved. (more…)
The Modern Malware EcoSystem
Modern malware attacks are dominating the headlines and most of the focus is directed at the impact of an attack, the potential data loss factor or oftentimes the suspected perpetrator. An important element to understanding the full spectrum of these attacks is to understand the modern malware ecosystem. (more…)
Would You Bet on the IT Security of Your Network?
This was from an article published on Dark Reading recently. It was from a survey of 300 IT professionals, conducted by PhoneFactor, an authentication tool vendor. (more…)