London conference themed “New Era, New Edge” brings global experts together to examine assurance, risk and security
Browsing: Threat Intelligence
In-browser security specialist Trusteer has published a white paper – Stepping Up the Battle Against Advanced Threats – and which says the endpoint has become the path of least resistance for cybercriminals
A new study of the ZeroAccess rootkit, believed to have infected 2.2 million home networks worldwide at the end of last year, has demonstrated that it continues to evolve, with new techniques to evade detection and hinder removal.
My last blog argued that the technical reliance on anti-malware must end if we are to meet the challenges of contemporary cyber threats to both consumers and enterprises.
Over the last number of years there has been a noticeable rise in the number of reported targeted attacks, which are also commonly referred to as advanced persistent threats (APTs). Notable examples of said attacks include the Red October campaign or the IXESHE APT.
You can take any industry in the world and you’ll find a community for it online. These communities are filled with characters and thinkers, jokers and talkers and folk who you’ll occasionally wish had
There’s no doubt that China is on an aggressive technology acquisition track and has been for 20+ years.
Security-conscious enterprises and government agencies turn to Vormetric for protection against both insider threats and the new breed of cyber threats, such as Advanced Persistent Threat (APT) attacks – across their physical, virtual and cloud environments.
As the security industry continues to grapple with a shortage in skilled professionals, particularly within very specific niches like application security, the state of security professional development continues to keep the industry locked up in a number of hotly contested debates.