SecurityBrief UK - Technology news for CISOs & cybersecurity decision-makers

Advanced Persistent Threat (APT) stories - Page 7

Cryptojacking2

IBM Security: Cybercriminals focusing on cryptojacking

Mon, 4th Mar 2019
#
ibm security
#
report
#
powershell
IBM Security's 2019 report indicates a shift in cybercriminal tactics, with cryptojacking attacks doubling those of ransomware as hackers seek easier profits.
Screen shot 2019 01 08 at 11

Bridging the gap to AI security

Tue, 8th Jan 2019
#
ddos
#
ai
#
solarwinds
AI cyber-attacks are not constrained by resources and compromises and can go on indefinitely without the need for pause.
Aa2

TCS collaborates with Red Hat to build digital transformation solutions

Wed, 19th Dec 2018
#
devops
#
digital transformation
#
apm
Tata Consultancy Services teams up with Red Hat to drive digital transformation with advanced open-source solutions, focusing on agility and cybersecurity.
Stirling campus with lake   video still

Stirling University opts with APT for data centre upgrade

Mon, 24th Sep 2018
#
datacentre infrastructure
#
advanced persistent threat protection
#
power / energy
After converging the campus' IT infrastructure from three data centres to two, the University of Stirling looked into a power upgrade.
Fallback

Cybersecurity should be priority in US$8b smart utility spend

Thu, 23rd Aug 2018
#
ddos
#
smart cities
#
iot
Utilities are becoming increasingly connected worldwide, and also becoming increasingly vulnerable - so why are governments letting security slide?.
Threat detection

Make the pre-emptive strike against cyberattacks with threat hunting

Mon, 23rd Jul 2018
#
firewalls
#
network infrastructure
#
network security
Threat hunting starts with the assumption that bad actors have already breached perimeter defences and are operating inside the environment.
Thinkstockphotos 147539280

Now you see me, now you don't: Security beyond the physical network

Wed, 16th May 2018
#
uc
#
vpns
#
verizon
A big shift in the way people work means organisations can no longer rely on the same legacy security models they have been using to date.
Thinkstockphotos 900256936

Cloud security alert - why log files are not the answer

Thu, 5th Apr 2018
#
cloud security
#
ixia
#
opinion
Anyone responsible for IT security needs a strategy for monitoring what is happening in their company's cloud.
Thinkstockphotos 483166983

Unisys teams up with Cylance to offer managed security services with endpoint protection

Thu, 29th Mar 2018
#
endpoint protection
#
ai security
#
edr
Unisys and Cylance partner to launch a global managed security service, combining endpoint protection with advanced AI and machine learning technologies.
Thinkstockphotos 522489079

Businesses face 'cyber black holes' without complete visibility

Fri, 23rd Mar 2018
#
iot security
#
forescout technologies
#
network visibility
High-profile breaches tend to have a similar storyline: old, unpatched vulnerabilities, advanced persistent threats, and a lack of visibility.
Thinkstockphotos 820243528

Analyst taps Webroot as “trail blazer” in APT protection

Thu, 15th Mar 2018
#
endpoint protection
#
ai security
#
edr
Webroot says it was recognised by Radicati Group for its real-time, cloud-based approach to preventing malware.
Screen shot 2018 01 24 at 10

Cybersecurity experts opine on confession it's not if but when UK is attacked

Wed, 24th Jan 2018
#
cybersecurity
#
venafi
#
industry experts
Ciaran Martin says the UK has been 'fortunate' to avoid an attack that could cause devastating disruption to elections or critical infrastructure.
Fallback

How to keep your company safe from complex cyber threats

Mon, 6th Nov 2017
#
sonicwall
#
hack
#
computers
An advanced persistent threat is a set of stealthy and continuous computer hacking processes, designed to be evolving, polymorphic and dynamic...
Thinkstockphotos 539085410

The 'treacherous 12': Top threats to cloud computing revealed

Fri, 20th Oct 2017
#
cloud security
#
cybersecurity
#
cloud services
The most prominent threats to cloud computing have been identified in a comprehensive report from the Cloud Security Alliance (CSA).
Screen shot 2017 09 12 at 10

Expert spells out how businesses can 'block the spears'

Tue, 12th Sep 2017
#
malware
#
email security
#
cybersecurity
There is no doubt about it, but spear-phishing is big business in 2017 - Menlo Security's Jason Steer explains how businesses can protect themselves.
Thinkstockphotos 638383350

Measure and mitigate risk to build a comprehensive cyber defense

Tue, 12th Sep 2017
#
ddos
#
network infrastructure
#
sdn
It is helpful to think of cybersecurity risk as a three-dimensional concept: a function of threat, vulnerability and consequence.
Thinkstockphotos 499778666

Redlock signals company growth with new appointments

Mon, 11th Sep 2017
#
cloud security
#
casb
#
healthtech
RedLock appoints Ankur Shah as VP of products and Viswa Subramanian as VP of engineering to drive product development and research.
Thinkstockphotos 629169384

Cylance ink OEM agreement with ContentKeeper to provide predictive malware blocking

Fri, 8th Sep 2017
#
malware
#
partner programmes
#
ai security
ContentKeeper Technologies and Cylance have partnered to embed Cylance's OEM Engine into ContentKeeper's Gateway Security Platform.
Thinkstockphotos 503554754

Turla threat group targets G20 Summit attendees

Mon, 21st Aug 2017
#
advanced persistent threat protection
#
threat intelligence
#
proofpoint
Participants in this year's G20 Summit in Germany are being targeted in a new wave of malware droppers, suspected to be from APT group Turla.
Thinkstockphotos 502056875

The three Rs of enterprise security: Rotate, repave, and repair

Mon, 10th Jul 2017
#
gaming
#
advanced persistent threat protection
#
digital entertainment
No organisation regularly repaves their services or applications from a known, good state, leading to vulnerable servers for more than five months.