Quantcast
Channel: Security Wire Weekly
Browsing all 13 articles
Browse latest View live

Surviving cyberwar, Preparing for APTs, Stuxnet malware-style attacks

In the wake of the Stuxnet malware being documented as the most significant example of a nation-state cyberattack to date, expert Nick Lewis discusses how enterprises concerned with surviving cyberwar...

View Article



Adam O’Donnell on antimalware evolution at Black Hat 2012

Adam O’Donnell of Sourcefire talks about the future of antimalware. Malware analysis tools are improving, but enterprises need to invest in forensics teams to better understand emerging threats....

View Article

How diligent user account security thwarts password recovery attacks

The recent CloudFlare hack showed how poor user account security and password recovery can be compromised. Learn how to avoid a similar incident.

View Article

The case for using anomaly based monitoring in zero day detection

In light of recent failures by the signature-based model, expert Char Sample discusses anomaly-based monitoring technology and the potential it holds for enterprise security.

View Article

Google Aurora attackers back with zero-day exploits, new targeted attack...

The Aurora attackers, which surfaced in 2009 targeting Google and dozens of other firms are improving their techniques and showing impressive skills, according to new research from Symantec. The group...

View Article


Legal counsel vital component of incident response

Ellen Giblin an attorney at Ashcroft Law and Gant Redmon, the general counsel for Co3 Systems discuss the litigator’s role in incident response. The legal team should be contacted as soon as a...

View Article

Formulate a more effective information security incident response plan

In this Hot Type podcast, author Neal McCarthy offers real-world examples that enterprises can use to form an information security incident response plan.

View Article

Flame malware analysis, How to defend against fraudulent certificates

Security expert Nick Lewis analyzes Flame malware, plus gives tips for dealing with Flame’s most unique function: its use of fraudulent certificates.

View Article


Email attacks still highly successful attack vector

Ali Mesdaq a security researcher at FireEye Inc. explains why malicious file attachments are still a highly successful attack vector for cybercriminals. Automated attack toolkits, spambots and...

View Article


Gary McGraw on proactive defense, offensive security

Software security expert Gary McGraw explains that investing in destructive cyberweapons could have dangerous consequences. He is advocating for a proactive defense approach to cybersecurity.

View Article

Top data breaches of 2012

A spate of high profile data breaches throughout 2012 hold important lessons. Lapses in basic security measures and stolen account credentials played a significant role in most of the breaches. The...

View Article

Gartner VP Gregg Kreizman assesses corporate IAM landscape

In this SearchSecurity podcast recorded at the 2013 Gartner Security and Risk Management Summit, Gregg Kreizman, research vice president at Stamford, Conn.-based Gartner Inc., sits down with Assistant...

View Article

PCI SSC’s Bob Russo, Troy Leach discuss PCI DSS 3.0

On the eve of the release of PCI DSS 3.0, SearchSecurity spoke with Bob Russo, SSC general manager, and Troy Leach, SSC chief technology officer, about the most important changes in the new version of...

View Article

Browsing all 13 articles
Browse latest View live




Latest Images