In its Global Threat Report, CrowdStrike identified many of the tactics, techniques, and procedures used by more than 50 different threat actor groups to craft and launch sophisticated attacks against major targets around the world.
FireEye's acquisition of Mandiant and last month's acquisition of Norman Shark by Blue Coat Systems reflect the growing awareness among enterprises that they need sophisticated security technologies which go beyond antivirus and traditional perimeter-based defenses.
Industry-wide cyber attack exercises (CyberRX) will examine broad and segment-specific threats targeting information systems, medical devices and other essential technology resources of the healthcare industry.
Organizations can draw lessons from the Target data breach by considering various attack scenarios such as card readers which have been tampered with, POS systems infected with malware, and insider threats.
In addition to being a renowned theoretical physicist, Einstein was also a wizard at writing security procedures and processes. Here is a short selection of quotes from Albert Einstein, and why they are worthwhile when thinking about security.
In developing a Secure Development Lifecycle, you always start by performing an assessment of your current situation in order to establish a baseline of where you stand. Generally, there are two different types of application assessment tools on the market - static analysis and dynamic analysis tools. But what about the human element?
There are many security companies, individual researchers and certain circles in academia that hold a wealth of information on cybercrime activities that could be the difference between a bust and a cybercrime investigation that leads to a dead end. It’s not just about collaboration with other law enforcement agencies, but also about collaboration with the security industry.
The dangers for a university or college network can lurk everywhere from e-mail to the Internet infrastructure itself. When a student’s computer on a college network is compromised, it’s not just the student who pays the price—legally, so does the institution.