Premium Content

Access "New ways to navigate advanced security threats"

Kathleen Richards, features editor Published: 29 Jan 2014

One month into 2014 and we have already faced landmark data breaches of major U.S. retailer Target Corp. and online search turned media company, Yahoo. The extent of both attacks is further reaching than first (publicly) thought in December. Target admits that it faced a malware attack that exposed the credit and debit card data of 40 million, make that 70 million, no wait, it's 110 million customers. The fallout continues as the public at large gives a collective shrug and considers returning to cash when they shop at the once-beloved retailer. Kathleen Richards These advanced threats will keep on coming in 2014. "Defending a network has never been harder," says Johannes B. Ullrich, dean of research at the SANS Technology Institute and the Internet Storm Center. Ullrich examines the advanced threat techniques to watch out for this year. High on his list, more watering hole attacks and sophisticated spear phishing, driven by social engineering and automation to produce mass customization of emails as malware lures. Meanwhile, global scanning services and ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Secure file transfer: Send large files fast, but keep your system safe
    secure_file_transfer.png
    E-Handbook

    FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-ins is real. This guide to secure ...

  • Is your mobile security strategy combating the wrong enemy?
    ism_0414.png
    E-Zine

    As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...

  • What's the best focus for MDM strategy now?
    best_focus_for_MDM.png
    E-Handbook

    This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...