Five years ago, life was much easier for security professionals. They could collectively focus on compliance and deploy mature controls like firewalls and anti-virus to defend against largely unsophisticated attackers. Security professionals now face much more sophisticated adversaries and tactics. This new
class of...
Next-generation network security devices provide comprehensive contextual awareness and deeper analysis of network traffic. This complete contextual
awareness, combined with security automation, provides the visibility and agility necessary to keep pace with today's fluid IT environment, increasing network speeds and...
This leading U.S.-based utility is consistently under regular attack from advanced malware. Its existing endpoint protection product was detecting and eliminating some threats. However, the recurrence frequency and unexplained
network activity indicated that it wasn't providing a view of the
full infection, nor...
Although the industry acknowledges that advanced malware attacks require new and innovative solutions to detect and remediate, far too many organizations default to focusing the entirety of their efforts on detection, whether traditional endpoint protection suites or new "silver bullet" defenses. That is a sure path...
Simple fact - governments across the globe have been victims of attacks in one form or another. The frequency of these attacks has varied and the motives range from a self-deluded intention of doing good for society, to monetary or political gain or for no other reason than to demonstrate the ability to pull off such...
For many years, conventional wisdom focused solely on a perimeter-based defense with the mission to keep out all attackers. Now, it's become pertinent to see these persistent threats and attacks through a different lens - expect a successful attack and penetration of your defenses and design a defense-in-depth...
What has been the most important type of vulnerability in the last 25 years? What percentage of total vulnerabilities did this represent? Which browser truly had the most critical vulnerabilities? In this research, Yves Younan, senior research engineer with Sourcefire's Vulnerability Research Team (VRT), answers these...
A full 60% of organizations haven't done the basics.
Read this ESG Brief, Advanced Malware Protection Must Extend to Incident Detection and Response, and discover:
How your organization's incident response steps stack up
Why 'stop the bleeding' approaches are inadequate
A 5-step process to enhance your...
Employees are using a range of new web-based applications to get their jobs done and you've got limited visibility, let alone control. But one thing is certain - many of these applications are evasive and firewall aware and hackers are using them to penetrate networks.
How do you encourage productivity and minimize...
Malware has changed considerably since the early PC viruses first introduced more than 25 years ago. Today, it evolves so quickly that many customers find it nearly impossible to stay ahead of the latest threat. If the explosion in advanced malware variants wasn't enough, sophisticated Client Side Attacks and...
Today's targeted threats are often multi-vectored and exploit unknown vulnerabilities - their sophistication defying typical signature-only based inspection. Whether APTs or client-side threats, they use evasive techniques to penetrate our organizations, often purporting to be or riding on applications and exploiting...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.