Access your Pro+ Content below.
Malware analysis beyond the sandbox
Researchers estimate that 70% of organizations will have implemented virtual servers by the end of 2015, representing a tipping point in enterprises’ adoption of virtualization. Virtual machines (VMs) must be protected from malware like other systems but attackers are coming up with new ways to avoid detection and analysis. Security researchers have long used VMs to isolate and analyze malware, which has led to the misconception that malware disappears once it detects a VM. We look at how malware is adapting to virtual networks, and at the tools and processes that can help organizations secure these environments.
Meanwhile, rogue activity of insiders continues to surprise Fortune 1000 companies. According to some studies, 80% of cybersecurity breaches are aided and abetted by insiders. Yet many CIOs continue to remain skeptical about investments in employee cybersecurity awareness training. New technologies now focus on user credentials, employee actions and behavior analytics. We look at the security culture in today's organizations and effective strategies to improve visibility, policy and prevention of insider threats.
A new class of endpoint threat detection products is designed to improve visibility across endpoints, hunt for threats, automate incident response and cut down on false alerts overwhelming security teams. How do they work? We interview CSOs who have invested in endpoint defense and remediation tools and share their views on the pros, cons and common deployment scenarios.
Access this PRO+ Content for Free!
Features in this issue
Server-oriented malware is actually more likely to infect a virtual system than a physical one in many organizations. Now what?
How do they know it’s really you? New behavioral technologies use data science to monitor user activity within the network.
While there’s a major focus on continuous endpoint monitoring and remediation today, security teams have to fight malware on all fronts.
Learn how malware is responding to the spread of virtualization in enterprise systems and how to choose the best tools to secure your virtual environment.
Columns in this issue
The data science that reprogrammed Wall St. trading models may offer lessons for security.
After decades in the hot seat, Oracle's CSO Mary Ann Davidson is still fighting systemic risk and the vulnerabilities of enterprise software.
Bitcoin 2.0 is fueling technology development and services. The block chain mechanisms that secure the Bitcoin network hold real promise for security.