Targeted attack News
April 18, 2014
Sophisticated malware was behind the Michaels breach that resulted in three million compromised payment cards, according to the crafts retailer.
January 16, 2014
Expert Joseph Granneman looks back at the 2013 Verizon DBIR and provides key takeaways for companies looking to avoid being part of the 2014 edition.
November 21, 2013
A recent blog report from security vendor FireEye suggests that advanced threats are turning toward in-memory tactics.
September 25, 2013
A researcher at the 2013 (ISC)2 Security Congress said exploit kits have revolutionized malware creation, even lowering the bar for targeted attacks.
Targeted attack Get Started
Bring yourself up to speed with our introductory content
Josh Sokol reviews the security technologies needed to support a successful security analytics program focused on advanced malware detection. Continue Reading
Evaluate Targeted attack Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Choosing a VPN has become a complex undertaking. Lisa Phifer examines how SSL VPNs match up with their older IPSec cousins. Continue Reading
Problem Solve Targeted attack Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Expert Nick Lewis explains how Bit9 was recently compromised and the viability of application whitelisting as a result of the compromise. Continue Reading
Expert Michael Cobb details how to reduce out-of-office message security risk --and thus targeted attacks -- by limiting personal info given. Continue Reading
Targeted attacks can be stopped with a defense-in-depth strategy. Michael Cobb explains how to implement a targeted attack prevention plan. Continue Reading