5 tips to better detect and respond to advanced endpoint threats

intruder

Endpoint threats are growing more sophisticated and targeted, as hackers come up with new attack techniques and tailor hacking tactics to their specific targets. Recently, ransomware attacks such as WannaCry and Petya compromised hundreds of thousands of end-user devices, leaving IT departments scrambling to resolve the outbreaks without good visibility or control of their endpoints. […]

A look at cyber warfare and Advanced Persistent Threats (APTs)

computer-code

In 2010, Stuxnet, a malicious computer worm created by the United States and Israel physically sabotaged Iran’s uranium enrichment nuclear plants. In 2012, Iranian hackers struck Saudi Arabia’s national oil company, Saudi Aramco, nearly obliterating its corporate IT infrastructure, and bringing the company close to collapse. In 2014, hackers from a group called Guardians of Peace (GOP) […]

More than one in four enterprises hit by APT attacks

A report just released from the nonprofit information security advocacy organization ISACA found that, of the 660 enterprise cybersecurity professionals surveyed, just over 1 in 4, or 28%, believe they have been hit by an attack involving an Advanced Persistent Threat, or APT. In the 2015 Advanced Persistent Threat Awareness Study, about 75% of those […]

Cybersecurity: Big Opportunities for Big Data

What has Big Data been up to? Big Data has been a major topic in the IT realm for years. The terms Big Data and Big Data analytics are generally used to describe the potential for new insights into our environment by making sense of the rapidly increasing amount of information produced by the growing […]