Cyberthreats, cyber vulnerabilities, and how to fight back
-
Article
Web application attacks present a significant threat to the cloud
New research found that web application attacks present a significant threat to cloud environments. Rob Shapland explains the risks and what enterprises should do about them. Read Now
-
Article
NotPetya one of the worst ransomware attacks to date
NotPetya, WannaCry and other ransomware have caused unprecedented damage to businesses, infrastructure and users, say threat researchers Read Now
-
Article
Cyber attackers target manufacturing
Manufacturers are a key and growing target for cyber criminals, a threat intelligence report reveals Read Now
-
Article
Ransom DDoS attacks soar
The use of distributed denial of service (DDoS) attacks to extort money from organisations is on the rise, warns security firm Kaspersky Lab Read Now
Editor's note
Cyberthreats are spreading fast and growing more damaging to business systems and data. This guide gathers TechTarget's latest insights and advice on the subject of cyber vulnerabilities and how to mitigate them. It's intended to aid information security professionals by bringing them up to date on the cyberattacks they must prepare for now. Topics covered include nation-state cyberattacks and NSA spyware.
Understanding the source of possible threats to company's networks, data centers and other enterprise resources is step one. Infosec pros must also get a handle on their particular enterprise's key cyber vulnerabilities. With this information, they can then assess the promise of available countermeasures.
1Other nations' governments are a growing cyberthreat
Nation-states used to go to war; now the battle is often waged via the internet. But although the conflict is virtual, the stakes are very real. Learn about the cyber vulnerabilities that state-sponsored hackers seek to exploit. This section gathers the insights from major experts on the threat that nation-state cyberattacks pose to companies now and what infosec pros can do about them.
-
Article
Most cyberattacks come from nation-state actors
Companies of all sizes may find themselves faced with highly capable state-sponsored cyber attacks, but steps can be taken to shore up defences Read Now
-
Article
Valerie Plame warns of increased nation-state cyberattacks
At the 2017 Cloud Identity Summit, former covert CIA officer Valerie Plame discussed the increasing risks of nation-state cyberattacks focused on geopolitical influence. Read Now
-
Article
Nation-state cyberattacks have changed the security game
Microsoft's Brad Smith spoke at RSA Conference 2017 about the effects of nation-state cyberattacks and what businesses and governments can do about them. Read Now
-
Article
Former NSA director warns of rising nation-state cyberattacks
Speaking at RSA Conference 2017, former NSA Director Keith Alexander warned of increased nation-state cyberattacks and called for an overhaul of U.S. government cybersecurity. Read Now
2NSA: Threat source or cyberattack victim?
The U.S. National Security Agency is the government department responsible for collecting information on foreign entities and protecting American communications networks and information services. This usually low-profile agency found itself in newspaper headlines lately both for being the victim of a breach and as the source of spyware used on Americans. Read more here about the cyber vulnerabilities this NSA spyware created.
-
Article
NSA data breach ramps up Russia fears
An NSA contractor became the target of a cyberattack after storing agency spying software on a personal device, and this NSA breach has caused a rise in fears regarding Russia. Read Now
-
Article
Kaspersky explains how NSA data was uploaded
Malware detection triggered an upload of data from a National Security Agency contractor’s home computer, Kaspersky Lab says an internal investigation has revealed Read Now
-
Podcast
Kaspersky antivirus scans implicated in NSA breach
In this week's Risk & Repeat podcast, SearchSecurity editors discuss reports implicating Kaspersky antivirus scans in the recently disclosed breach at the National Security Agency. Listen Now
-
Article
WannaCry ransomware based on NSA exploit
Microsoft blames the U.S. government for cyberweapon stockpiling as WannaCry ransomware infections continue to spread, though some experts say Microsoft shares responsibility. Read Now
-
Article
NSA spyware found infecting tens of thousands worldwide
A new security tool will let users scan their systems for the presence of NSA spyware found in the latest Equation Group leak, and tens of thousands are already infected. Read Now
3Means for minimizing your cyber vulnerabilities
While the cyberthreats seem to never-ending, those intent on fighting them, and defending company systems and data, are taking action. In this section, read up on the latest methods for minimizing cyber vulnerabilities, including cognitive technology and machine learning.
-
Article
Blocking zero-day attacks with cognitive technology
Cognitive technology can aid IT teams in zero-day attack prevention and vulnerability detection -- if you know the right way to deploy it. Read Now
-
Article
Securing SQL Server
In this excerpt from chapter nine of Securing SQL Server, author Denny Cherry discusses why SQL injection attacks are so successful. Read Now
-
Video
How to spot attacks that are targeted
Cybercriminals use targeted attacks to endanger the future of your organization. Learn what defensive moves you can put in place now to avoid more severe attacks later on. Watch Now
-
Video
Using threat intelligence to mitigate possible risk
Threat intelligence technology can analyze data to forecast future attacks and provide actionable countermeasures. Learn if it is suitable for your enterprise. Watch Now
-
Article
Security analytics needs serious resources
What key things should organisations be doing in terms of cyber defences to ensure they are resilient? Read Now