The 2013 Live Threat Intelligence Impact Report from the Ponemon Institute, sponsored by Norse reveals how 700+ respondents from 378 enterprises defines
Browsing: Threat Intelligence
It makes lots of sense for a Hacktivist group that wishes to display their message and show that they exist – to go after high end media
London conference themed “New Era, New Edge” brings global experts together to examine assurance, risk and security
In-browser security specialist Trusteer has published a white paper – Stepping Up the Battle Against Advanced Threats – and which says the endpoint has become the path of least resistance for cybercriminals
A new study of the ZeroAccess rootkit, believed to have infected 2.2 million home networks worldwide at the end of last year, has demonstrated that it continues to evolve, with new techniques to evade detection and hinder removal.
My last blog argued that the technical reliance on anti-malware must end if we are to meet the challenges of contemporary cyber threats to both consumers and enterprises.
Over the last number of years there has been a noticeable rise in the number of reported targeted attacks, which are also commonly referred to as advanced persistent threats (APTs). Notable examples of said attacks include the Red October campaign or the IXESHE APT.
You can take any industry in the world and you’ll find a community for it online. These communities are filled with characters and thinkers, jokers and talkers and folk who you’ll occasionally wish had
There’s no doubt that China is on an aggressive technology acquisition track and has been for 20+ years.
Security-conscious enterprises and government agencies turn to Vormetric for protection against both insider threats and the new breed of cyber threats, such as Advanced Persistent Threat (APT) attacks – across their physical, virtual and cloud environments.