Advanced Persistent Threat (APT) stories - Page 7
IBM Security: Cybercriminals focusing on cryptojacking
Mon, 4th Mar 2019
#
ibm security
#
report
#
powershell
IBM Security's 2019 report indicates a shift in cybercriminal tactics, with cryptojacking attacks doubling those of ransomware as hackers seek easier profits.
Bridging the gap to AI security
Tue, 8th Jan 2019
#
ddos
#
ai
#
solarwinds
AI cyber-attacks are not constrained by resources and compromises and can go on indefinitely without the need for pause.
TCS collaborates with Red Hat to build digital transformation solutions
Wed, 19th Dec 2018
#
devops
#
digital transformation
#
apm
Tata Consultancy Services teams up with Red Hat to drive digital transformation with advanced open-source solutions, focusing on agility and cybersecurity.
Stirling University opts with APT for data centre upgrade
Mon, 24th Sep 2018
#
datacentre infrastructure
#
advanced persistent threat protection
#
power / energy
After converging the campus' IT infrastructure from three data centres to two, the University of Stirling looked into a power upgrade.
Cybersecurity should be priority in US$8b smart utility spend
Thu, 23rd Aug 2018
#
ddos
#
smart cities
#
iot
Utilities are becoming increasingly connected worldwide, and also becoming increasingly vulnerable - so why are governments letting security slide?.
Make the pre-emptive strike against cyberattacks with threat hunting
Mon, 23rd Jul 2018
#
firewalls
#
network infrastructure
#
network security
Threat hunting starts with the assumption that bad actors have already breached perimeter defences and are operating inside the environment.
Now you see me, now you don't: Security beyond the physical network
Wed, 16th May 2018
#
uc
#
vpns
#
verizon
A big shift in the way people work means organisations can no longer rely on the same legacy security models they have been using to date.
Cloud security alert - why log files are not the answer
Thu, 5th Apr 2018
#
cloud security
#
ixia
#
opinion
Anyone responsible for IT security needs a strategy for monitoring what is happening in their company's cloud.
Unisys teams up with Cylance to offer managed security services with endpoint protection
Thu, 29th Mar 2018
#
endpoint protection
#
ai security
#
edr
Unisys and Cylance partner to launch a global managed security service, combining endpoint protection with advanced AI and machine learning technologies.
Businesses face 'cyber black holes' without complete visibility
Fri, 23rd Mar 2018
#
iot security
#
forescout technologies
#
network visibility
High-profile breaches tend to have a similar storyline: old, unpatched vulnerabilities, advanced persistent threats, and a lack of visibility.
Analyst taps Webroot as “trail blazer” in APT protection
Thu, 15th Mar 2018
#
endpoint protection
#
ai security
#
edr
Webroot says it was recognised by Radicati Group for its real-time, cloud-based approach to preventing malware.
Cybersecurity experts opine on confession it's not if but when UK is attacked
Wed, 24th Jan 2018
#
cybersecurity
#
venafi
#
industry experts
Ciaran Martin says the UK has been 'fortunate' to avoid an attack that could cause devastating disruption to elections or critical infrastructure.
How to keep your company safe from complex cyber threats
Mon, 6th Nov 2017
#
sonicwall
#
hack
#
computers
An advanced persistent threat is a set of stealthy and continuous computer hacking processes, designed to be evolving, polymorphic and dynamic...
The 'treacherous 12': Top threats to cloud computing revealed
Fri, 20th Oct 2017
#
cloud security
#
cybersecurity
#
cloud services
The most prominent threats to cloud computing have been identified in a comprehensive report from the Cloud Security Alliance (CSA).
Expert spells out how businesses can 'block the spears'
Tue, 12th Sep 2017
#
malware
#
email security
#
cybersecurity
There is no doubt about it, but spear-phishing is big business in 2017 - Menlo Security's Jason Steer explains how businesses can protect themselves.
Measure and mitigate risk to build a comprehensive cyber defense
Tue, 12th Sep 2017
#
ddos
#
network infrastructure
#
sdn
It is helpful to think of cybersecurity risk as a three-dimensional concept: a function of threat, vulnerability and consequence.
Redlock signals company growth with new appointments
Mon, 11th Sep 2017
#
cloud security
#
casb
#
healthtech
RedLock appoints Ankur Shah as VP of products and Viswa Subramanian as VP of engineering to drive product development and research.
Cylance ink OEM agreement with ContentKeeper to provide predictive malware blocking
Fri, 8th Sep 2017
#
malware
#
partner programmes
#
ai security
ContentKeeper Technologies and Cylance have partnered to embed Cylance's OEM Engine into ContentKeeper's Gateway Security Platform.
Turla threat group targets G20 Summit attendees
Mon, 21st Aug 2017
#
advanced persistent threat protection
#
threat intelligence
#
proofpoint
Participants in this year's G20 Summit in Germany are being targeted in a new wave of malware droppers, suspected to be from APT group Turla.
The three Rs of enterprise security: Rotate, repave, and repair
Mon, 10th Jul 2017
#
gaming
#
advanced persistent threat protection
#
digital entertainment
No organisation regularly repaves their services or applications from a known, good state, leading to vulnerable servers for more than five months.