Risk

Using Threat Intelligence to Get the Upper Hand on Cybercriminals

Submitted by gdsavvy@grantd… on Tue, 11/15/2016 - 20:17

Understanding your adversaries' tools, techniques, and processes (TTPs) that they're likely to weaponize is the best way to anticipate and combat threats. This whitepaper shares research on the latest attacker tools, provides architecture recommendations for organizations looking to strengthen security controls, and helps analysts use threat intelligence to more quickly and effectively identify threat trends.

Download this whitepaper now and learn how to:

The Route to Trusted IDs

Submitted by gdsavvy@grantd… on Tue, 11/15/2016 - 20:03

When it comes to describing the top fraud threats to U.K. financial institutions, it's all about compromised identities and credentials, says John Marsden of Equifax. How can organizations prove their customers are who they say they are?

In an interview about fighting fraud by authenticating identities, Marsden discusses:

  • Why traditional anti-fraud tools are ineffective against today's top schemes;
  • How organizations can prove that customers are really who they say they are;
  • How to enhance security without hurting the customer experience.

Understanding Social Engineering

Submitted by gdsavvy@grantd… on Tue, 11/15/2016 - 19:55

The title of the new book is Understanding Social Engineering Based Schemes. And its mission is three-fold, Jakobsson says. He wants to profile today's most common schemes, forecast some future trends, and help organizations build effective countermeasures.

In an interview about the contents of his new book, Jakobsson discusses:

  • The evolution of socially engineered schemes;
  • Why these scams are still so successful;
  • Technology solutions that can help detect and deter the scammers.

5 Blind Spots That Kill Cybersecurity

Submitted by gdsavvy@grantd… on Tue, 11/15/2016 - 19:16

One of the most difficult and endemic problems facing cybersecurity departments today is security's 'you don't know what you don't know syndrome.' All too often, information security practitioners are tasked with responding to incidents on their network that they may not even know exist until they've already become full-fledged breaches.

Security pros face announcements of new zero-day discoveries without any reliable means to confirm whether those newly uncovered attacks have ever impacted the organization.

Proactive Malware Hunting

Submitted by gdsavvy@grantd… on Tue, 11/15/2016 - 16:54

If malware infections and data breaches are inevitable, then why should organizations even try to be proactive? Isn't a reactive stance more appropriate? Not so, says Marcin Kleczynski, CEO of Malwarebytes.

In an interview about proactive malware detection, Kleczynski discusses:

  • Why it's not enough to react to malware;
  • The evolution of endpoint malware detection;
  • Why risks of the Internet of Things are overhyped.