- Share this item with your network:
- Download

Information Security
- FeatureBeyond the Page: Cyberthreats
- FeatureCyberthreats: Know thy enemy in 2014
- FeatureThe changing face of advanced malware detection
- FeatureTor networks: Stop employees from touring the deep Web
- ColumnNew ways to navigate advanced security threats
- ColumnNew devices, new threats: How to evaluate the devices we love
- ColumnMobile security report: Data on devices
- ColumnFixing the math in the wake of Snowden's NSA surveillance reveal

iSTOCK/GETTY IMAGES
Beyond the Page: Cyberthreats
This February 2014 Information Security magazine supplement takes a deeper look into cyberthreats and examines advanced threat techniques including watering hole attacks and sophisticated spear phishing.
- Johannes B. Ullrich
This February 2014 Information Security magazine (ISM) supplement goes Beyond the Pages of ISM to take a deeper look into cyberthreats and examines advanced threat techniques including watering hole attacks and sophisticated spear phishing.
Information Security feature: Cyberthreats: Know thy enemy in 2014
“Defending a network has never been harder,” says Johannes B. Ullrich, dean of research at the SANS Technology Institute and the Internet Storm Center. In this feature, Ullrich examines the advanced threat techniques to watch out for this year.
Video: New, sophisticated attacks evade detection
Enterprises must protect themselves from sophisticated attacks that can escape notice by host-based detection systems and steal millions. Ullrich shows you how.
Technical Tip: Improving security with DMARC email authentication
Johannes B. Ullrich demonstrates how domain-based messaging authentication, reporting and conformance, or DMARC, can enhance your email security.
About the Contributor
Johannes B. Ullrich, Ph.D., GIAC, GCIA and GWEB, is the dean of research at the SANS Technology Institute and head researcher at its Internet Storm Center. Follow him on twitter @johullrich.
Start the conversation
0 comments