Tag: Cyber Threats

The Changing Nature of Incident Response, Part 2

We have become too reliant upon fully automated systems to detect and stop computer security breaches. People naturally desire a solution that will prevent all security incidents from occurring in the first place, but is it really reasonable to expect fully automated solutions to stop sophisticated attacks? READ MORE

Lessons Learned from the New York Times Hack

Unfortunately, The New York Times is not the only organization that has been the victim of a sophisticated, targeted attack of this nature, and it certainly will not be the last as regular drum beat of these kinds of incidents has been reported over the past few years. In order to combat these new and constantly evolving threats, defensive techniques need to adapt. READ MORE

When It Comes to Security, Collaboration Is Key in 2013

Collaborative initiatives will become increasingly critical as threat actors become more organized and attacks grow in sophistication. How can you incorporate greater collaboration into your security strategy to stay ahead of advanced attackers in 2013? READ MORE

APTs – The Usual Suspects are Becoming More Unusual

Cyber espionage is on the rise; not just in terms of frequency, but in terms of distribution. Just because the attack is rudimentary makes it no less of a threat. Pervasively enabling NetFlow throughout an organization not only provides visibility without the need to deploy expensive probes, but NetFlow-based network forensics goes hand-in-hand with detecting APTs and keeping your network safe. READ MORE