In 2015 we expect to see cyber criminals, fueled by the success of many high profile hacks, continue to innovate with an even greater focus on deceiving and evading existing security solutions. As attacks continue to become more advanced, so must the security solutions used by organizations to protect themselves. ...
Sophisticated attacks yielded big rewards in 2014 and the 2015 threat landscape shows no sign of slowing down. Sandboxing is a hot topic in enterprise security however advanced threat protection requires more than just adding a standalone sandbox.
In this white paper you'll learn:
Lifecycle of an advanced...
Advanced attacks use new variations on old themes to infiltrate organizations and threats hidden in Microsoft Office files are still an issue. Learn about the most common MS Office threats and how sandboxing can help protect against these threats.
Read the solution brief to learn:
Why patches are not the...
Email has long been a preferred attack vector for Cybercriminals and nearly all mid to large businesses use a Secure Email Gateway (SEG).
However, today's Advanced Persistent Threats (APTs) are specifically crafted to bypass traditional security techniques. This is why leading
Secure Email Gateways continue to...
It is well documented in high profile data breaches, industry reports and analyst briefs that today's sophisticated attacks often begin with email and end in exfiltration of sensitive data. What is not always clear are the criminal steps that occur in between.
Download this white paper to explore:
What role...
Read this 18 page in-depth NSS Labs report on the FortiWeb-1000D which achieved an overall block rate of 99.85% at $3 TCO per protected Connection Per Second (CPS) placing it in the "Recommended" section of NSS Labs Web Application Firewall Security Value Map.
Download this report to explore:
How, using advanced...
Hackers have been stealing the secret trading algorithms that are the lifeblood of many hedge funds and high-frequency trading firms, according to two security companies. What can be done to mitigate the risks?
The hacking group Lizard Squad has claimed credit for hijacking the website of Lenovo.com and redirecting visitors to an attacker-controlled site. It also indicates that it's now sitting on a cache of stolen Lenovo e-mail messages.
Talking about the threat landscape is no substitute for experiencing it first-hand. "M-Trends 2015: A View from the Front Lines," distills the insights gleaned from hundreds of Mandiant incident response investigations in more than 30 industry sectors. The report provides key insights, statistics, and case studies...
Large organizations are under constant cyber-attack and many are breached each day. How many? Aside from the infamous breaches at Neiman-Marcus, the New York Times, and Target in 2013, ESG research indicates that nearly half of all enterprise organizations experienced at least one successful malware-based attack over...
Mention endpoint security to an infosec professional and he or she will likely think of antivirus software, vulnerability scanning, and patch management. These three areas have made up the essence of endpoint security since organizations first connected to the Internet. Antivirus software, vulnerability scanning, and...
Los Angeles World Airports (LAWA) is the airport oversight and operations department for the city of Los Angeles, California and is headquartered on the grounds of Los Angeles International Airport. Bob Cheong, CISO of LA World Airports, discusses Achieving Control and Visibility with RSA Security Analytics, ECAT...
Target's breach-related expenses not covered by insurance have totaled $162 million so far, its latest financial report shows. And experts say the breach could continue to have a financial impact for years to come.
Authorities have disrupted a botnet that was serving up the Ramnit banking malware, which has infected 3 million PCs worldwide. But information security experts warn that the disruption will likely be temporary.
Were DDoS attacks against major American banks in 2012 waged in retribution for U.S. government actions? A recently leaked top-secret memo prepared in 2013 for Keith Alexander, who was then NSA director, seems to confirm that's the case.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.