Malware is increasingly shifting to peer-to-peer communications when receiving instructions from command-and-control servers and transferring stolen data to evade detection, Damballa said in a new report.
Information sharing is one of the key buzzwords in information security today, but there hasn't been a lot of movement towards formalizing public/private partnerships to share vulnerability and threat information.
In order to win the war with today’s cybercriminals that are using the same attack vectors on a massive scale, a real-time, automated information platform that pre-empts ongoing attacks is an imperative.
Trust comes at a price. However, while IT security professionals understand this, they often treat trust as an afterthought. As a result, companies suffer the consequences in unexpected recovery costs and failed business relationships.
Even the most security diligent organizations realize that breaches are no longer a question of ‘if’ but a question of ‘when.’ Preparing for a cyber attack must include containing the damage and more rapidly restoring systems to trusted states.
Today’s businesses must be able to rapidly adapt to changing market conditions – to support a new venture, merger/acquisition, etc. As business needs change, so too must the underlying security policies.