There have always been sophisticated hackers, just not all that many of them. Now there seem to be more than ever, and they have branched out in numerous directions to find different, novel avenues of attack. This Essential Guide takes on what's become a genuinely essential task: keeping up with each new class of attack as it's created. Here's a look at the threats to embedded systems, to the mobile device and app ecosystem, and to all manner of stealthy attacks on conventional systems that are harder than ever to detect before significant damage has been done.
Trends and detection
Even though attacks are becoming more sophisticated, sometimes involving teams of dozens of experts crafting inventive malware and other malicious tools, the pace of "innovation" doesn't seem to have slowed much, even with the added complexity. We've taken several looks at what elements in the cat-and-mouse game of threats are currently shifting the fastest.
Traditional security tools are no longer sufficient for defending against new breeds of attacks, forcing advanced threat-detection products to emerge. Continue Reading
SIEM struggles are common, but Mike Rothman explains why SIEM products are critical for advanced attack detection, and offers a SIEM tuning step-by-step. Continue Reading
The IE8 zero-day attack planted in the U.S. Labor Department's website highlights how few organizations can ward off never-before-seen attacks. Continue Reading
2DNS, DDoS, and More-
Emerging threats, not surprisingly, make headline news. Or at least, they do when they finally are detected. Some of the newer threats of late have been noticeable from Day 1, of course, as they have focused on various approaches to denial of service (DoS). Of course distributed DoS isn't the only game in town, and we've seen, to take one example, very interesting twists on the traditional man-in-the-middle attack.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
As we become aware of new kinds of attacks, inventive minds turn their attention to mitigation. Here are some examples of what's brewing to help security professionals deal with mobile, DDoS and other attacks.
Will big data analytics make security better? With data scientists in short supply, solution providers rush to provide big data analytics tools. Continue Reading