- Mar 15, 2011
- Mar 15, 2011
- 52 Page(s)
Sponsored by: SearchSecurity.com
Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time. Sitting back, relying on passive alerting mechanisms is not an option; you must actively defend your organization by hunting these intruders through counter-threat operations (CTOps). Learn how CTOps can make a huge impact on your security landscape and turn your incident response team into the hunter it can be.
Other articles covered in this guide include:
SCADA Insecurity: Critical Infrastructure Protection: The Stuxnet worm has highlighted how vulnerable one’s critical infrastructure can become. Discover if protection efforts against new rising threats have come too late and if the industry and federal government have taken the proper steps to ensure SCADA systems are secure.
Advanced Persistent Threat (APT): If you think you know everything about APT , think again. We’ll delve into the history of APT, debunk some common myths, and provide you insight on the most effective way to defend against it.
Banking Malware: Cybercriminals are working hard day in and day out creating more sophisticated and stealthy banking malware. Although banks have stepped up their defense against fraud, criminals continue to figure out new methods of attack such as the SilentBanker, Clampi, and Silon. Read on to learn about these sophisticated Trojans and their functionalities.
Web 2.0 Widgets: Widgets can all too easily distribute malicious code and malware through social networking sites such as Facebook and Twitter. Learn how to assess the security of widgets before incorporation them into your Web 2.0 environment.
Sponsored By: ArcSight, an HP Company, Astaro, Core Security Technologies, GeoTrust, GFI Software, Imperva, Radware, Shavlik Technoloies, Sophos, Trend Micro, Veracode & Websense