Connect with us

Hi, what are you looking for?


Industry Experts

Attackers are Thinking Outside of the Sandbox and so Must We...Over the years we’ve all heard claims of ‘silver bullet’ solutions to solve security problems. One of the most recent claims has been around the use of sandboxing technology alone to fight advanced malware and targeted threats.

In the most recent Palo Alto Networks Application Usage and Threat Report (Feb 2013), some of the most interesting data found was that while Internet social networking applications are assumed by many to represent the highest volume of risks, they only represent 0.4 percent of all threat logs observed. Rather, 97 percent of all exploit logs were found in ten applications -- nine of which were internal or infrastructure applications that are integral to many business functions (i.e.

The recent New York Times hack was yet another high-profile attack that demonstrated the evolution towards multi-vector, sophisticated attacks. In this case, the mission of the perpetrators was very specific -- retrieving editorial information and data related to a particular story -- but it could easily have been nastier.

What would happen if Chinese or Russian agents were to conduct a covert operation, sabotaging America’s electricity grid using targeted bombs, leading to widespread power-outages resulting in, amongst other things, patients dying in hospitals, an economic crash, traffic accidents, and people freezing in their houses. Would this neutralize a nation’s armed forces ability to retaliate?


Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.


SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.


People on the Move

Former DoD CISO Jack Wilmer has been named CEO of defensive and offensive cyber solutions provider SIXGEN.

Certificate lifecycle management firm Sectigo has hired Jason Scott as its CISO.

The State of Vermont has appointed John Toney as the state’s new CISO.

More People On The Move

Expert Insights