Having better security than your neighbors may not be enough anymore as malicious actors move beyond “spray and pray” tactics to advanced persistent threats aimed at specific organizations and industries. Targeted attacks, as the Sony incident illustrated, are often for financial gain through extortion and threats to expose or delete sensitive data. This Beyond the Page outlines the top threats in 2015, from the invasion of digital things and undetected data loss to advanced DDoS attacks and crypto ransomware. We cover countermeasures to help organizations defend against evolving attack techniques and detect intrusions faster to minimize the damage.
The confluence of the Internet of Things and BYOD may turn into a beachhead that attackers can use to completely compromise your network.
The next wave of cyberthreats will combine two trends in new ways, says SANS' Johannes B. Ullrich, head of the Internet Storm Center. In this video, he explains the threats and countermeasures for the Internet of Things devices and enterprise crypto ransomware.
Securing the Internet of Things is challenging for enterprises. Here's a list of controls that you should already have implemented in your network.
Read the full April edition of Information Security magazine
- E-Book: Technical Guide on Combatting Emerging Web Threats –SearchSecurity.com