Your SecurityWeek Briefing Forward to Friend Forward Email
RSS Feed
Monday, February 3, 2014 
 
Monday, February 3, 2014

Combat Today's Complex Threats with a Big Data View

The focus of this paper is a discussion of a new way of thinking about detecting unknown threats and how a big data solution like Splunk can provide insight into anomalous behavior.

Download the Whitepaper Now


The Open Source (R)evolution: From Great Technology to Greater Intelligence
Open source is a valuable tool for defenders as they work to close these gaps and to gather greater intelligence about potential threats to make better decisions and take action.
Read the Full Column
by Marc Solomon


How Difficult Is Your Maze? How To Be A 'Hard Target'
Every security team that can fog a mirror is asking the question "what just happened at Target, and how do we make sure that doesn't happen to us?"
Read the Full Column
by Dr. Mike Lloyd




Preparing for the Inevitable Data Breach: Discussion
Businesses need to understand they will experience a breach incident and plan accordingly how they would protect the data, a panel of experts said this week at a town hall event in honor of Data Privacy Day.
> Hear What Experts Said



Understanding IT Risk from the Business Perspective
Most organizations today lack the tools and processes to assess and prioritize risks and vulnerabilities from the business perspective and end up defaulting to one of three approaches.
Read the Full Column
by Nimmy Reichenberg


Redefining Malware: When Old Terms Pose New Threats
A combination of new threat actors, new attack approaches, and new masking tactics demand that enterprises redefine malware, and make all necessary investments in people, technology and systems to stay one step ahead.
Read the Full Column
by Aviv Raff


Will Security be Sochi's Most Watched Event?
One of my concerns heading into these Olympic Games is that the public has become somewhat desensitized to cyber-attacks and we may not have the same level of vigilance against cyber threats as we should.
Read the Full Column
by Mark Hatton


Steps to Implementing a Zero Trust Network
Zero Trust advocates for a segmented network, and security built into the architecture rather than an afterthought. It also advocates for some key principles built around the concept of "never trust, always verify".
Read the Full Column
by Danelle Au



Yes, Virginia, There Really is Social Engineering
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.
Read the Full Column
by Jon-Louis Heimerl



Likely Advances in the Threat Landscape and How We Respond to Them in 2014
The threats that companies face will continue to accelerate. And while that might seem like a very obvious and not so insightful observation, the devil is in the details. Here are the trends both in the threats and how we will respond to them in 2014.
Read the Full Column
by Michael Callahan


The Fallacy of the Silver Bullet for Cloud Security
The idea of encrypting data is mistaken for a one-stop solution, and the result is that a tremendous amount of money and time are being spent solving the wrong problem.
Read the Full Column
by Gil Zimmerman



Time to Rethink Vulnerability Management
Without putting vulnerabilities into the context of the risk associated with them, organizations often misalign their remediation resources.
Read the Full Column
by Torsten George




Needed: A Quadrant for Attack Mitigation Systems & Services
What's missing today is a well-defined set of selection criteria for attack mitigation solutions, mainly for the online business market. Four types of attack mitigation solutions exist in today's market. In regard to quality of attack mitigation, each one has its own characteristics.
Read the Full Column
by Avi Chesla


Anomaly Detection, Knowing Normal Is the Key to Business Trust and Success
Making decisions based on anomalies is predicated by one very important assumption--you must understand what "normal" looks like.
Read the Full Column
by Jeff Hudson



PCI-DSS 3.0: Three Things to Know to Ensure Compliance, Security and Business Agility
With the release of PCI-DSS 3.0, organizations have a framework for payment security as part of their business-as-usual activities by introducing more flexibility, and an increased focus on education, awareness and security as a shared responsibility.
Read the Full Column
by Nimmy Reichenberg


2013: A Year that Will Dictate the Future of Cyber Security
The events that occurred in 2013 will forever be reflected in the Internet DNA of the future, and how the cyber security market evolves to accommodate that future.
Read the Full Column
by Chris Coleman


Strategic Thinking: IT Planning and Risk in 2014
As 2013 wanes, it makes sense take a few steps back and look at the state of the cloud and how it fits into the plans our customers and friends have been sharing with us. As we move through 2014, will your teams be driving new value, or responding to yesterday's threats?
Read the Full Column
by Gil Zimmerman


A Cyber Security New Year's Resolution: Simplify Security
As threats and our IT environments have become increasingly sophisticated, they've collided with traditional security methods that have not followed suit. Is it possible to simplify security yet increase its 'sophistication'?
Read the Full Column
by Marc Solomon


Combat Today's Complex Threats with a Big Data View

The focus of this paper is a discussion of a new way of thinking about detecting unknown threats and how a big data solution like Splunk can provide insight into anomalous behavior.

Download the Whitepaper Now




See All Recent Articles at SecurityWeek.Com



  Browse the full Security Resource Library

Internet Titans Shine Light on Secret US Requests: Read More

Corero Launches New DDoS Protection Appliances for Service Providers: Read More

Man Sentenced to 30 Months for Hacking Scheme Targeting Brokerage Firms: Read More

Microsoft Publishes Data About Secret FISA Orders: Read More

Use Microsoft Error Reporting to Improve Network Visibility: Websense: Websense is providing free source code, queries and lookups designed to help organizations use Microsoft Error Reporting to identify USB devices connecting to their networks. Read More

Researcher Discloses Critical Vulnerabilities in Oracle Forms and Reports: Security researcher Dana Taylor recounted what became a two-year odyssey between her and the company to fix software vulnerabilities in Oracle Forms and Reports. Read More

Nigerian Police Arrest Online 'Romance Scammer': Nigerian police arrested a 28-year-old man wanted in connection with the death of an Australian woman and for defrauding her of $90,000 in an online dating scam. Read More

Kaspersky Lab Investigating 'Extremely Sophisticated Malware': Kaspersky Lab said on Monday that it has been investigating a sophisticated cyber-espionage operation that it is calling “one of the most advanced threats at the moment”. Read More

Canada's Eavesdropping Agency Blasts Tradecraft Leak: Canada's ultra-secret eavesdropping agency blasted the disclosure of its tradecraft, after it was reported the agency had tracked airline passengers connected to Wi-Fi services at airports. Read More

FireEye Enhances OS, Expands Email Threat Protection Capabilities: FireEye, announced major update to the FireEye OS that the company says enhances the management and functionality of several of its products. Read More

Canada Captured Data From Airport Travelers via WiFi: Canadian intelligence agencies can follow the movements of travelers who passed through airports and connected to Wifi systems with mobile phones, tablets and laptops. Read More

Hackers Hit Yahoo Mail With Mass Account Checker Attack: Yahoo is warning of a attack targeting users of its email service, and initiating password resets for potentially affected accounts. Read More

Vice Admiral Michael Rogers Named New NSA Chief: President Barack Obama has nominated a US Navy officer, Vice Admiral Michael Rogers, to take over as head of the embattled National Security Agency, the Pentagon said Thursday. Read More

RSA Uncovers Infrastructure Behind New Point-of-Sale Attack Operation: Researchers from RSA say they have discovered the server infrastructure behind a point-of-sale (PoS) attack campaign that has infected systems mostly in the United Sates, but also in 10 other countries including Russia, Canada and Australia. Read More

Target: Attackers Used Stolen Vendor Credentials in Data Breach: Target Corporation on Wednesday said that the attacker(s) behind the recent massive data breach at the retailer likely compromised its systems by using stolen credentials from a vendor. Read More

Security Startups: Interview with nPulse Technologies President and CEO Tim Sullivan: nPulse Technologies is a provider of packet capture and Big Data security analytics solutions. SecurityWeek sat down with Tim Sullivan, President and CEO to discuss the security startup. Read More

Defense.Net Launches New Service to Combat DDoS Attacks: Defense.Net has launched DDoS Frontline, a new mitigation service designed to help customers fend off powerful and always-changing DDoS attacks. Read More

US 'Committed' to Hunting Down Target Hackers: Authorities are committed to hunting down the hackers blamed for a massive data breach at US retail giant Target, Attorney General Eric Holder said Wednesday. Read More

IBM and Lockheed Martin Invest in Israeli Cyber Complex: Lockheed Martin and IBM both announced they would invest in CyberSpark R&D facilities in Israel. Read More

Cross Platform 'Java-bot' Launches DDoS Attacks from Windows, Mac and Linux: Researchers from Kaspersky Lab have uncovered a new malware that has the ability to infect systems running Windows, Mac OS X, and Linux and launch DDoS attacks from any infected devices. Read More

CloudLock Raises $16.5 Million to Expand Enterprise Cloud Security Business: CloudLock, a Waltham, Massachusetts-based firm that helps companies secure data stored in the cloud, has raised $16.5 million in a Series C funding round led by Bessemer Venture Capital. Read More

Advertisement

Hackers Steal Law Enforcement Inquiry Documents from Microsoft: Microsoft on Friday said that attackers breached the email accounts of a "select number" of employees, and obtained access to documents associated with law enforcement inquiries. Read More

Gartner 2014 Magic Quadrant for Endpoint Protection Platforms: Access a complimentary copy of the Gartner 2014 Magic Quadrant for Endpoint Protection Platforms to gain deeper knowledge of the endpoint protection market. Get the Free Report

Podcast: CrowdStrike's Adam Meyers Discusses Attacks Emanating from China, Russia and the Middle East: Adam Meyers, Vice President of Intelligence at CrowdStrike, discusses the company's Global Threat Report and the APT landscape, and offers details on attacks emanating from China, Russia and the Middle East. Listen Now





To help make sure the SecurityWeek Briefing reaches you, please add [email protected] to your address book.

The SecurityWeek Briefing is published Twice Weekly.
© 2014 Wired Business Media