Cyberthreats are spreading fast and growing more damaging to business systems and data. This guide gathers TechTarget's latest insights and advice on the subject of cyber vulnerabilities and how to mitigate them. It's intended to aid information security professionals by bringing them up to date on the cyberattacks they must prepare for now. Topics covered include nation-state cyberattacks and NSA spyware.
Understanding the source of possible threats to company's networks, data centers and other enterprise resources is step one. Infosec pros must also get a handle on their particular enterprise's key cyber vulnerabilities. With this information, they can then assess the promise of available countermeasures.
Cyber vulnerabilities are growing in both number, amplitude
Cyber vulnerabilities and the lethality of cyberattacks are increasing by the month, according to recent reports. It seems like every aspect of company networks are data are under threat, from cloud-based resources to on-premises systems. Preparing for the worst is essential. In this segment learn more about the very real threat from ransomware, web application and DDoS attacks.
New research found that web application attacks present a significant threat to cloud environments. Rob Shapland explains the risks and what enterprises should do about them. Continue Reading
NotPetya, WannaCry and other ransomware have caused unprecedented damage to businesses, infrastructure and users, say threat researchers Continue Reading
Other nations' governments are a growing cyberthreat
Nation-states used to go to war; now the battle is often waged via the internet. But although the conflict is virtual, the stakes are very real. Learn about the cyber vulnerabilities that state-sponsored hackers seek to exploit. This section gathers the insights from major experts on the threat that nation-state cyberattacks pose to companies now and what infosec pros can do about them.
At the 2017 Cloud Identity Summit, former covert CIA officer Valerie Plame discussed the increasing risks of nation-state cyberattacks focused on geopolitical influence. Continue Reading
Microsoft's Brad Smith spoke at RSA Conference 2017 about the effects of nation-state cyberattacks and what businesses and governments can do about them. Continue Reading
Speaking at RSA Conference 2017, former NSA Director Keith Alexander warned of increased nation-state cyberattacks and called for an overhaul of U.S. government cybersecurity. Continue Reading
3National security agency-
NSA: Threat source or cyberattack victim?
The U.S. National Security Agency is the government department responsible for collecting information on foreign entities and protecting American communications networks and information services. This usually low-profile agency found itself in newspaper headlines lately both for being the victim of a breach and as the source of spyware used on Americans. Read more here about the cyber vulnerabilities this NSA spyware created.
In this week's Risk & Repeat podcast, SearchSecurity editors discuss reports implicating Kaspersky antivirus scans in the recently disclosed breach at the National Security Agency. Continue Reading
A new security tool will let users scan their systems for the presence of NSA spyware found in the latest Equation Group leak, and tens of thousands are already infected. Continue Reading
Means for minimizing your cyber vulnerabilities
While the cyberthreats seem to never-ending, those intent on fighting them, and defending company systems and data, are taking action. In this section, read up on the latest methods for minimizing cyber vulnerabilities, including cognitive technology and machine learning.
Cognitive technology can aid IT teams in zero-day attack prevention and vulnerability detection -- if you know the right way to deploy it. Continue Reading
Vendors are pitching machine learning for cybersecurity applications to replace traditional signature-based threat detection. But how can enterprises evaluate this new tech? Continue Reading
Threat intelligence technology can analyze data to forecast future attacks and provide actionable countermeasures. Learn if it is suitable for your enterprise. Continue Reading